SPEAKER IDENTIFICATION AND VERIFICATION OVER SHORT
DISTANCE TELEPHONE LINES USING ARTIFICIAL NEURAL
NETWORKS
Ganesh K Venayagamoorthy, Narend Sunderpersadh, and Theophilus N Andrew gkumar@ieee.org sundern@telkom.co.za theo@wpo.mlsultan.ac.za
Electronic Engineering Department,
M L Sultan Technikon,
P O Box 1334, Durban, South Africa.
ABSTRACT
Crime and corruption have become rampant today in our society and countless money is lost each year due to white collar crime, fraud, and embezzlement.
This paper presents a technique of an ongoing work to combat white-collar crime in telephone transactions by identifying and verifying speakers using Artificial Neural Networks (ANNs). Results are presented to show the potential of this technique.
1. INTRODUCTION
Several countries today are facing rampant crime and corruption. Countless money is lost each year due to white collar crime, fraud, and embezzlement. In today’s complex economic times, businesses and individuals are both falling victims to these devastating crimes.
Employees embezzle funds or steal goods from their employers, then disappear or hide behind legal issues.
Individuals can easily become helpless victims of identity theft, stock schemes and other scams that rob them of their money
White collar crime occurs in the gray area where the criminal law ends and civil law begins. Victims of white collar crimes are faced with navigating a daunting legal maze in order to effect some sort of resolution or recovery. Law enforcement is often too focused on combating “street crime” or does not have the expertise to investigate and prosecute sophisticated fraudulent acts. Even if criminal prosecution is pursued, a criminal conviction does not mean that the victims of fraud are able to recover their losses. They have to rely on th criminal courts awarding restitution after the conviction and by then the perpetrator has disposed of or hidde most of the assets available for recovery. From the civil law perspective, resolution and recovery can just be a difficult as pursuing criminal prosecution. Perpetrators of white collar crime are often difficult to locate and served with civil process. Once the perpetrators have been located and served, proof must be provided that the fraudulent act occurred and recovery/damages are needed. This usually takes a lengthy legal fight, which often can cost the victim more money than t...
... middle of paper ...
...phone speech”, IEEE
Signal Processing Letters, vol. 2 no. 3 March 1995, pp.
46 - 48.
[2] J.M.Naik, L.P.Netsch, G.R.Doddington, “Speaker verification over long distance telephone lines”,
Proceedings of IEEE International Conference on
Acoustics, Speech, and Signal Processing (ICASSP),
23-26 May 1989, pp. 524 - 527.
[3] A.L.Mcilraith, H.C.Card, “Birdsong Recognition
Using Backpropagation and Multivariate Statistics”,
Proceedings of IEEE Trans on Signal Processing, vol.
45, no. 11, November 1997.
[4] G.K.Venayagamoorthy, V.Moonasar,
K.Sandrasegaran, “Voice Recognition Using Neural
Networks”, Proceedings of IEEE South African
Symposium on Communications and Signal Processing
(COMSIG 98), 7-8 September 1998, pp. 29 - 32.
[5] V.Moonasar, G.K.Venayagamoorthy, “Speaker identification using a combination of different parameters as feature inputs to an artificial neural network classifier”, accepted for publication in the
Proceedings of IEEE Africon 99 conference, Cape
Town, 29 September – 2 October 99.
[6] H.Demuth, M.Beale, MATLAB Neural Network
Toolbox User’s Guide, The Maths Works Inc., 1996.
[7] T.Kohonen, Self-organizing and associate memory
Spring Verlag, Berlin, third edition, 1989.
Fraud is one of Canada's most severe acts of financial criminality as the economic impact of this crime could potentially handicap an entire society. According to the Canadian Anti-Fraud Centre Annual Statistic Report (CAFC), a report established to monitor fraud with the aid of the Royal Canadian Mounted Police (RCMP), and Competition Bureau of Canada, it reported an annual loss of 74 million dollars affecting over 14,472 victims (Canadian Anti-Fraud Centre, 2014). Given this alarming statistic, it is worrisome that we as a society still ignore or turn a blind eye towards those who commit fraud as seen in the low conviction (Canada Revenue Agency, 2014), and focus our efforts on petty thefts as seen with the high rate of convictions
Professor and Director of the Distance Learning Masters Program at The University of Cincinnati, Michael L. Benson has his Ph. D. in Sociology and is the author of "Denying the Guilty Mind: Accounting for Involvement in White-Collar Crime." In a classic study based on interviews with 30 convicted white-collar offenders all men, Benson examines the excuses and justifications used by White-Collar criminals to not only explain their involvement in the crime but also claim their innocence. It focuses mainly on the techniques that are used to deny they did anything wrong in categories separated by antitrust violators, tax violators, violations of financial trust and those committing fraud. Antitrust Violators focused on the everyday character and historical continuity of their offenses. They claimed to be following es...
White collar crime is a term created by Edwin Sutherland in 1939 that refers to crimes committed by people of higher social status, companies, and the government according to the book “White-Collar Crime in a Nutshell” by Ellen Podgor and Jerold Israel. White collar crimes are usually non-violent crimes committed in order to have a financial-gain (Podgor and Israel 3). A very well known white collar crime that has even been taught in many history classes is the Watergate scandal. This is a white collar crime that was committed by government authorities. Watergate was a crime that shocked the nation.
The installment of new security could even be a problem, for people who operate these new security systems could also be a potential thief. There is an approach among many enterprises that it is simpler to easily excuse the employee who committed the offense, instead of dealing with the law and the officers; and follow through with the money and time by prosecuting in order to seek restitution. Sometimes the firm does not to acquire the negative publicity that has to do with the internal offense, especially when their reputation is predominant to their company model. White-collar crime is often categorized as a crime without a victim, damaging only large, objective corporations. Recent news broadcasts portray nothing could be farther from the absolute truth.
White collar and corporate crimes are crimes that many people do not associate with criminal activity. Yet the cost to the country due to corporate and white collar crime far exceeds that of “street” crime and benefit fraud. White collar and corporate crimes refer to crimes that take place within a business or institution and include everything from Tax fraud to health and safety breaches.
White collar crime has been discussed more frequently in the last few years. The news has made society aware that white collar crime occurs almost as often as other criminal activity. In fact, white collar crime is one of the most costly crimes. It is a billion dollar criminal industry. White collar criminals seem to continue to engage in the criminal practices because there is no set standard in the penalties given to those that are caught. A look into the public’s perception on whether the penalties given is harsh enough for white collar criminals since most types of crimes have a set of standard penalties for those convicted. A standard set of penalties needs to be looked at for white collar crimes to help in eliminating the criminal behavior and saving society billions of dollars a year.
The idea behind information security is that data, either personal or commercial, will only be viewed by those for whom it was intended and keeping unwanted eyes away. One of the most popular methods to secure data is the use of passwords and/or PIN numbers that only designated persons know. This type of securing information worked well when the password and/or PIN numbers follow a secure policy, but this method quickly fails when the designated persons that use the secure information mistreat the password and/or PIN numbers.5 The user may write down the key needed to access the information or simply tell it to someone who does not have access; then the information is no longer secure and problems arise. In the case of an organization, they may notice that information is being leaked to a rival and would need to find the source of the leak to prevent it from occurring again.
Identity theft may be a widespread drawback devastating close to eight million individuals every year. a standard situation involves a wrongdoer
This case illustrated that there were real consequences to white collar crime. In addition to paying the fifty million dollar fine, he relinquished another fifty million dollars of his illegal trading profits. (He still had millions remaining, however, from his illegal gains.) His actual prison sentence was three years, yet he served only twenty-two months in the federal prison at Lompoc, California, which was known to have a “country-club” atmosphere.
In politics, there are many factors that contribute to what issues an individual favors or dislikes and what an individual will use to pick their political candidates during election times. But a specifically interesting thing that one decides on is their party identification. The question on what exactly influences an individual’s party identification is a question that many scholars and researchers ponder. Literature on this topic suggests that an individual’s party identification is determined or influenced by four predominant and different factors. Some scholars believe that parental socialization is the deciding factor on how an individual will identify.
In all other states and territories, identity theft is not recognised as an offence. Some possible technological solutions for overcoming this issue range from all forms of biometrics (fingerprints and iris recognition technology), encryption of transactions, authentication and public infrastructure, data profiling and firewall security. The only limitation to practicing these innovations is the issue of
Fraud and white-collar crime are common forms of crimes that people commit in various aspects and positions in the corporate world. Fraud and white-collar crimes have similar meaning as they refer to the non-violent crimes that people commit with the basic objective of gaining money using illegal means. The cases of white-collar crimes have been increasing exponentially in the 21st century due to the advent of technology because fraudsters apply technological tools in cheating, swindling, embezzling, and defrauding people or organizations. White-collar crime is a complex issue in society because its occurrence is dependent on many factors such as organizational structure, organization culture, and personality traits. Thus, the literature review examines how organizational structure, organizational culture, and personality traits contribute to the occurrence of white-collar crimes.
Identity Theft is known as “someone tak[ing] another’s personal information without consent and us[ing] it in an illegal way” (Dean, Buck, & Dean, 2014). Since the rise in technology over the past few decades, more people have become victims of identity theft. The four main items that are stolen under identity theft are: Name, address, social security number, and sometimes even one’s bank account information. Identity Theft is divided into three types: financial identity theft, criminal identity theft, and identity cloning. Also, there are two ways in which criminals get the information they are trying to steal from a victim: low-tech and hi-tech. Hi-tech has to do with criminals being able to get information through technology and include methods such as skimmers, phishing, and hacking. To prevent identity theft, there are many ways in which someone can do so. One way is to not disclose personal information to anyone. Also, people should “destroy any documents such as mail which may contain personal information which a thief can use” (Dean et al., 2014). Creating difficult passwords that only the user can remember will prevent identity theft. Moreover, companies need to make sure their technology is secure, as they hold personal information of their
...ble to realize that the case was genuine though tracing the criminal will be the problem since he was able to hack into systems and perform all his fraud without leaving any trace.
With the number of people who possess a computer or mobile devices rapidly growing, the number of cybercrimes being committed on a daily basis is following close behind it. With all the different types of cybercrimes there is no doubt that this problem is becoming quite serious in the modern day world. Cybercrimes can affect anyone/anything such as the government, businesses, and even your very own self. If any device is connected to the network, it can potentially be affected by cybercrimes such as Hacking, Theft, Identity Theft, Cyber Stalking, Malicious Software, and Child Soliciting and Abuse. There are many cases starting to appear around the globe of cybercrimes taking place. “The likely annual cost of cybercrime and economic espionage to the world economy is at more than $445 billion — or almost 1 percent of global income.” , although the percentage doesn’t not seem massive, this is becoming one of the major threats to society and almost matches the percentage Drugs and Drug Trafficking have on the global income.