IEEE_MBBA_multimodal biometric authentication Presentation.pptx

likipiki689 1 views 11 slides Oct 15, 2025
Slide 1
Slide 1 of 11
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11

About This Presentation

ieee research paper of multimodal biometric authentication


Slide Content

Multimodal Behavioral Biometric Authentication Using Typing Rhythm and Live Voice with AI-Generated Random Prompts Authors: Abhigna M N & Hanumantha S Affiliation: Global Academy of Technology, Bengaluru, India Emails: [email protected], [email protected] Conference/Journal, Date

Abstract Novel MBBA system fusing keystroke and live voice biometrics. AI challenges for liveness, drastic reduction in EER (<1%). Secures CPPS and EVCS environments.

Motivation / Problem Statement • Static passwords/tokens easily breached. • Unimodal biometrics lack liveness; replay/deepfake threats. • High-stakes environments (power systems, EV charging) need dynamic, unforgeable authentication.

Related Work / Unimodal Limitations • Keystroke-only: easy to mimic. • Voice-only: vulnerable to replay/deepfake. • Multi-layered security lacking in current approaches.

Proposed MBBA Solution • Fuses involuntary typing rhythm with random phrase voice challenge. • Score-level fusion; attacker must bypass both simultaneously. • Liveness through AI-generated prompt.

System Architecture • Parallel processing: typing stream & voice stream. • Feature extraction, SNN for typing, x-vector for voice. • Fusion engine computes final score. (Include block diagram if allowed.)

Methodology • Typing: Dwell, flight time features → SNN classifier. • Voice: TTS random prompt → MFCC extraction → x-vector model + STT text match. • Score fusion, adaptive threshold for risk levels.

Results & Evaluation Method EER (%) Resilience Keystroke Only ~5-6 Low Voice Only ~3-4 Low MBBA Hybrid <1 High Reliability: 95%+ across environments. Processing: End-to-end <2s.

Security Analysis • Prevents replay/deepfake/MITM. • Encrypted templates, anonymized math representations. • High resilience against spoofing & impersonation.

Applications & Future Work • Secure SCADA, AMIS, EVCS gateways. • Template adaptation, privacy. • Plans for continuous authentication, standards compliance.

Conclusion • Robust hybrid-biometrics, AI liveness, spoof-resistant. • Promising for real-world CPS/EV infrastructure. • Further research: expanding to continuous, multi-session authentication.