{"id":5105,"date":"2015-05-05T03:00:06","date_gmt":"2015-05-05T07:00:06","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=5105"},"modified":"2025-04-23T07:55:43","modified_gmt":"2025-04-23T11:55:43","slug":"voice-biometrics-expands-functionality-as-a-trusted-identification-credential","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/","title":{"rendered":"Voice Biometrics Expands Functionality as a Trusted Identification Credential"},"content":{"rendered":"<p>The following guest post was submitted by <a title=\"Link to Sense of Security Web site\" href=\"https:\/\/www.senseofsecurity.com.au\/\"><strong>Sense of Security<\/strong><\/a>, a leading independent provider of IT security and risk management solutions in Australia.<\/p>\n<p><strong>The Applications and Future of Speech Recognition Software<\/strong><\/p>\n<p>Speech recognition (also known as &#8220;voice biometrics&#8221;) software is used in homes and businesses for various applications. Many of these programs allow users to control computer functions such as opening files and folders with voice commands. Other programs control access to computer features and prevent unwanted users from accessing personal information.<\/p>\n<p><strong>How Speech Recognition Works<br \/>\n<\/strong><br \/>\nComputers with speech software go through many steps before converting speech into on-screen text or commands. Vibrations are created in the air when words are spoken, and these waves are converted into digital data to be analyzed by the computer. It digitizes the sound by taking measurements of the waves at intervals, and the speech software then filters the sound by removing background noises.<\/p>\n<p>The information is divided into small segments that are matched with known sound expressions in the target language. These segments are called phonemes, and the speech program will analyze phonemes based on similar ones around them. It runs the phoneme through a statistical set and compares it to a larger library of known phrases or words. It uses this information to determine what the speaker was most likely saying before responding with text output or issuing a command to the computer.<\/p>\n<p><strong>Speech Software for IT Security<br \/>\n<\/strong><br \/>\nOne of the most practical uses for voice recognition software is the ability to protect sensitive information on computer systems. Standard software is used to determine what a person is saying, but programs meant for security purposes are used for speaker verification. With this technology, the computer and access to information will only be available to the owner of the system. The program will facilitate this by recognizing and distinguishing the unique characteristics of the user&#8217;s voice. Such voice biometrics software analyzes an individual&#8217;s vocal behavior to validate claims of identity.<\/p>\n<p>The technology creates a digital model of the user&#8217;s voice and stores it as a template of that unique voice identity for subsequent matching. Words are broken down into different frequencies that comprise the user&#8217;s unique vocal patterns to improve accurate matching. Speaker verification programs may be text-dependent or independent. Text-dependent programs use numbers and phrases as passwords that are compared to initial vocal samples. Independent systems do not require passwords, but they analyze the speaker&#8217;s free speaking patterns to distinguish unique components.<\/p>\n<p><strong>Future Applications<br \/>\n<\/strong><br \/>\nThere are numerous potential applications for the development of speech recognition systems. Those with disabilities that are not able to type and the visually impaired that cannot use Braille keyboards can use the software for dictation and to control computer functions.<\/p>\n<p>The Defense Advanced Research Projects Agency (or <strong>DARPA<\/strong>) performs research with a program they refer to as GALE, or Global Autonomous Language Exploitation. Three teams work on the program with hopes to eventually take information from foreign news broadcasts and translate it into desired languages. The teams also hope to create software that instantly translates languages with 90 percent accuracy. This technology would have significant applications in military efforts by allowing soldiers to communicate better with civilians. The software could eventually <a href=\"https:\/\/www.m2sys.com\/blog\/single-sign-on-sso\/biometrics-is-the-future-of-user-authentication\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=voice%20biometrics%20expands\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>become useful<\/strong><\/a> for the average consumer.<\/p>\n<p>There are voice recognition programs available for download as free software, and many are compatible with Windows 7 or higher. Penetration testing for this type of computer security shows it to be an effective method of stopping would-be data intruders from accessing delicate information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following guest post was submitted by Sense of Security, a leading independent provider of IT security and risk management<\/p>\n","protected":false},"author":398,"featured_media":16337,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"voice biometrics","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Voice biometrics is adding new functions and applications that render it as a rising biometric modality for individual identification.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[6,196,574,241,575],"class_list":["post-5105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-biometrics","tag-guest-post","tag-speech-recognition","tag-voice-biometrics","tag-voice-recognition"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Voice Biometrics Expands Functionality as a Trusted Identification Credential - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"Voice biometrics is adding new functions and applications that render it as a rising biometric modality for individual identification.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Voice Biometrics Expands Functionality as a Trusted Identification Credential - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Voice biometrics is adding new functions and applications that render it as a rising biometric modality for individual identification.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2015-05-05T07:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T11:55:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/05\/Voice-Biometrics-Expands-Functionality-as-a-Trusted-Identification-Credential.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"447\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\"},\"headline\":\"Voice Biometrics Expands Functionality as a Trusted Identification Credential\",\"datePublished\":\"2015-05-05T07:00:06+00:00\",\"dateModified\":\"2025-04-23T11:55:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/\"},\"wordCount\":591,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometrics\",\"guest post\",\"speech recognition\",\"voice biometrics\",\"voice recognition\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/\",\"name\":\"Voice Biometrics Expands Functionality as a Trusted Identification Credential - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2015-05-05T07:00:06+00:00\",\"dateModified\":\"2025-04-23T11:55:43+00:00\",\"description\":\"Voice biometrics is adding new functions and applications that render it as a rising biometric modality for individual identification.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Voice Biometrics Expands Functionality as a Trusted Identification Credential\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Voice Biometrics Expands Functionality as a Trusted Identification Credential - Digital Transformation of Government Services","description":"Voice biometrics is adding new functions and applications that render it as a rising biometric modality for individual identification.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/","og_locale":"en_US","og_type":"article","og_title":"Voice Biometrics Expands Functionality as a Trusted Identification Credential - Digital Transformation of Government Services","og_description":"Voice biometrics is adding new functions and applications that render it as a rising biometric modality for individual identification.","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2015-05-05T07:00:06+00:00","article_modified_time":"2025-04-23T11:55:43+00:00","og_image":[{"width":800,"height":447,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/05\/Voice-Biometrics-Expands-Functionality-as-a-Trusted-Identification-Credential.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b"},"headline":"Voice Biometrics Expands Functionality as a Trusted Identification Credential","datePublished":"2015-05-05T07:00:06+00:00","dateModified":"2025-04-23T11:55:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/"},"wordCount":591,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometrics","guest post","speech recognition","voice biometrics","voice recognition"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/","name":"Voice Biometrics Expands Functionality as a Trusted Identification Credential - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2015-05-05T07:00:06+00:00","dateModified":"2025-04-23T11:55:43+00:00","description":"Voice biometrics is adding new functions and applications that render it as a rising biometric modality for individual identification.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/voice-biometrics-expands-functionality-as-a-trusted-identification-credential\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Voice Biometrics Expands Functionality as a Trusted Identification Credential"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Abu Baker Siddique","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/5105"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=5105"}],"version-history":[{"count":12,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/5105\/revisions"}],"predecessor-version":[{"id":16339,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/5105\/revisions\/16339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16337"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=5105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=5105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=5105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}