Reading-Based Voice Authentication on a Smartphone: A Case Study of Older Adults

Authors

  • Jedsada Boonsiri Faculty of Information Technology and Digital Innovation, King Mongkut’s University of Technology North Bangkok
  • Thippaya Chintakovid Faculty of Arts, Chulalongkorn University
  • Nalinpat Bhumpenpein Faculty of Information Technology and Digital Innovation, King Mongkut’s University of Technology North Bangkok

Keywords:

authentication, voice authentication, smartphone, older adult

Abstract

Background and Objectives : Authentication is a vital component of smartphones to protect devices from unauthorized access. Nevertheless, existing schemes are unsuitable for elderly users due to their age-related difficulties. As a result, many older adults employ insecure practices, including disabling device authentication systems. One promising solution is voice authentication, which has been consistently suggested as a more usable option for older adults. However, voice authentication has a drawback regarding vulnerability to an imitation or recording of an enrolled speaker. Among many solutions for this issue, reading-based voice authentication is relatively simple and theoretically usable for older adults. Still, there is insufficient information to confirm the possibility, including older adults' perceptions and the reactions of Thai subjects toward the system. Therefore, this research intends to confirm that possibility and find whether reading-based voice authentication is usable enough for older adults.

Methodology : Three different styles of reading-based voice authentication were developed, and the testing was conducted to evaluate their usability relative to older adults. Participants were divided into three groups for each authentication style. Then, they would use the systems by enrolling and verifying themselves, where the researcher observed their actions and noted their opinions, along with the systems' performance metrics (Success Rate, Task Time, Error).

Main Results : The results of the test were encouraging. In terms of performance, all three styles achieved high task completion rates; almost all participants successfully enrolled in the system and verified themselves. There were significant differences regarding the time needed to complete enrollment. Nonetheless, the verification process used the same amount of time on average. Most errors occurred during the manual voice recording, where participants either forgot to press a button or pressed at the wrong moment. Both the scores from SEQ and SUS questionnaires indicated that all three styles of reading-based voice authentication were easy to use. The statistical tests to compare the results of all three authentication styles indicated that they were comparably usable, and mechanisms, like random passphrases, could be employed without adverse effects on usability. However, the ability to freely choose a passphrase negatively impacts usability as it requires text input and is thus unsuitable for older adults. Most participants expressed positive thoughts about reading-based voice authentication, like the ease of use and convenience.

Conclusions : Despite the promising results, this research still has limitations. The number of participants was smaller than intended, which affected the study's statistical power. Furthermore, this research needs more experiments to compare reading-based voice authentication with other authentication methods, assess its security aspect, and test the system in other settings, such as outdoor locations.

References

Akhtar, M. (2017). Text Independent Biometric Authentication System Based On Voice Recognition [Master's Thesis, Masaryk University].

Anand, S. A., Liu, J., Wang, C., Shirvanian, M., Saxena, N., & Chen, Y. (2021). EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 67–81.

Aranyanak, I., & Charoenporn, P. (2020). UX-Based Design of A Mobile Application for Thai Seniors. Proceedings of the 6th International Conference on Frontiers of Educational Technologies, 160–163.

Balata, J., Mikovec, Z., & Slavicek, T. (2015). KoalaPhone: Touchscreen mobile phone UI for active seniors. Journal on Multimodal User Interfaces, 9(4), 263–273.

Bangor, A., Kortum, P., & Miller, J. (2009). Determining what individual SUS scores mean: Adding an adjective rating scale. Journal of Usability Studies, 4(3), 114–123.

Bella, Hendryli, J., & Herwindiati, D. E. (2020). Voice Authentication Model for One-time Password Using Deep Learning Models. Proceedings of the 2020 2nd International Conference on Big Data Engineering and Technology, 35–39.

Brooke, J. (1995). SUS: A quick and dirty usability scale. Usability Eval. Ind., 189.

Fisk, A. D., Rogers, W. A., Charness, N., Czaja, S. J., & Sharit, J. (2009a). Chapter 2 Characteristics of Older Adult Users. In Designing for Older Adults: Principles and Creative Human Factors Approaches, Second Edition (Human Factors & Aging) (2nd ed., p. 13). CRC Press.

Fisk, A. D., Rogers, W. A., Charness, N., Czaja, S. J., & Sharit, J. (2009b). Chapter 5 Design of Output and Input Devices. In Designing for Older Adults: Principles and Creative Human Factors Approaches, Second Edition (Human Factors & Aging) (2nd ed., p. 61). CRC Press.

Galbally, J., Haraksim, R., & Beslay, L. (2019). A Study of Age and Ageing in Fingerprint Biometrics. IEEE Transactions on Information Forensics and Security, 14(5), 1351–1365.

Garfinkel, S., & Lipford, H. R. (2014). Chapter 4 Lessons Learned. In Usable Security: History, Themes, and Challenges (pp. 87–91). Morgan & Claypool Publishers.

Grindrod, K., Hengartner, U., Khan, H., & Vogel, D. (2016, June 22). Evaluating Smartphone Authentication Schemes with Older Adults. the 12th Symposium on Usable Privacy and Security, Denver, CO.

Haider, A., & Sabahat, N. (2022). A Usability and Accuracy Measurement of Smartphones Face Recognition. 2022 2nd International Conference on Artificial Intelligence (ICAI), 19–25.

Jaspreet Singh & Yvonne Hwei-Syn Kam. (2019). Usable Authentication Methods for Seniors. International Journal of Recent Technology and Engineering, 8(3S), 94–100.

Komninos, A., Dunlop, M., Katsaris, K., & Garofalakis, J. (2018). A glimpse of mobile text entry errors and corrective behaviour in the wild. Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, 221–228.

Kowalski, J., Jaskulska, A., Skorupska, K., Abramczuk, K., Biele, C., Kopeć, W., & Marasek, K. (2019). Older Adults and Voice Interaction: A Pilot Study with Google Home. Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 1–6.

Nicol, E., Dunlop, M. D., & Komninos, A. (2016). A Participatory Design and Formal Study Investigation into Mobile Text Entry for Older Adults. International Journal of Mobile Human Computer Interaction, 8(2), 20–46.

Rehman, U. U., & Lee, S. (2019). Natural Language Voice Based Authentication Mechanism for Smartphones (Poster). Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, 600–601.

Renz, A., Baldauf, M., Maier, E., & Alt, F. (2022). Alexa, It's Me! An Online Survey on the User Experience of Smart Speaker Authentication. Proceedings of Mensch Und Computer 2022, 14–24.

Sauro, J., & Lewis, J. R. (2016a). Chapter 2—Quantifying user research. In J. Sauro & J. R. Lewis (Eds.), Quantifying the User Experience (Second Edition) (pp. 9–18). Morgan Kaufmann.

Sauro, J., & Lewis, J. R. (2016b). Chapter 5—Is there a statistical difference between designs? In J. Sauro & J. R. Lewis (Eds.), Quantifying the User Experience (Second Edition) (pp. 61–102). Morgan Kaufmann.

Sauro, J., & Lewis, J. R. (2016c). Chapter 8—Standardized usability questionnaires. In J. Sauro & J. R. Lewis (Eds.), Quantifying the User Experience (Second Edition) (pp. 185–248). Morgan Kaufmann.

Schlögl, S., Chollet, G., Garschall, M., Tscheligi, M., & Legouverneur, G. (2013). Exploring Voice User Interfaces for Seniors. Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 52:1-52:2.

Stigall, B., Waycott, J., Baker, S., & Caine, K. (2019). Older Adults' Perception and Use of Voice User Interfaces: A Preliminary Review of the Computing Literature. Proceedings of the 31st Australian Conference on Human-Computer-Interaction, 423–427.

Tu, Y., Lin, W., & Mak, M.-W. (2022). A Survey on Text-Dependent and Text-Independent Speaker Verification. IEEE Access, 10, 99038–99049.

Tullis, T., & Albert, B. (2013). Chapter 4—Performance Metrics. In T. Tullis & B. Albert (Eds.), Measuring the User Experience (Second Edition) (pp. 63–97). Morgan Kaufmann.

Yan, Z., & Zhao, S. (2016). A Usable Authentication System Based on Personal Voice Challenge. 2016 International Conference on Advanced Cloud and Big Data (CBD), 194–199.

Yıldırım, M., & Mackie, I. (2019). Encouraging users to improve password security and memorability. International Journal of Information Security, 18(6), 741–759.

Zhao, C., Li, Z., Ding, H., Xi, W., Wang, G., & Zhao, J. (2021). Anti-Spoofing Voice Commands: A Generic Wireless Assisted Design. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(3), 139:1-139:22.

Downloads

Published

2024-01-09

How to Cite

Boonsiri, J. . ., Chintakovid, T. . ., & Bhumpenpein, N. . . (2024). Reading-Based Voice Authentication on a Smartphone: A Case Study of Older Adults. Burapha Science Journal, 29(1), 1–17. Retrieved from https://li05.tci-thaijo.org/index.php/buuscij/article/view/309

Issue

Section

Research Articles