Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementIdentity ManagementEducation:University

Securing and facilitating online education with voice biometrics

By Clive Summerfield
online education securing with voice biometrics
February 11, 2021

Before the Internet, all education was delivered face-to-face. You went to university or college and attended classes and exams in person.  There were no PINs, no passwords and no one time access codes. With the evolution of the Internet, all aspects of our lives changed, from education to shopping and travel – you name it, it went online.

However, along with this wholesale shift to online services comes the inevitable explosion in online fraud, security threats and identity theft. While online identity fraud problem used to be primarily a problem for businesses, the move online spawned by the COVID-19 pandemic exposes educational institutions - such as universities and healthcare providers - to greater risk of fraud as well.

Despite a continued focus on online fraud and security as well as regulations, many organizations still rely on passwords to prove identity.  To make matters worse, many users reuse the same password for multiple accounts or use passwords that don’t meet the basic security requirements for complexity.

Biometrics

Biometrics, technologies that utilizes physical and/or behavioral “characteristics” unique to an individual, have long been vaulted as a solution to the password problem. The best-known biometrics - fingerprints, face recognition and voice biometrics - have all found application in access control and telephone security, but have not been widely adopted for internet security.

For example, fingerprint sensors have been used for many years for physical security, such as access to premises and time and attendance in workforce management. In 2013, fingerprint technology came of age when Apple introduced Touch ID to unlock smartphones and then expanded it to unlock Apps Store and Payment applications a year later.  Some banks use the fingerprint to secure online mobile transactions, but these are the exception and the technology is a long way from being used as a universal authentication technology for secure online services.

Similarly, face recognition has been widely adopted in passports and border control.  Recent developments have also seen face biometrics appear in some IT security and online identity authentication applications, but the applications are far from universal.

In the telephone customer service, voice biometrics is becoming more prevalent.  Many banks in the U.K., Australia, Canada and New Zealand, along with some government agencies, have adopted voice biometrics for automatic call identity authentication.

In telephone services, voice biometrics has a strong business case as it eliminates the need for customers to answer personal information questions (such as mother’s maiden name) which not only speeds up the service delivery saving the business money, but is more accurate and effective at detecting and tracking identity fraud in the telephone channel.

A new paradigm for online security

While biometrics are proven as a powerful identity authentication technology for specific applications such as access to devices, border control and telephone call centers, the wide-spread use of biometrics has yet to be maximized as a technology to secure online services and applications.

There have been recent developments on a new paradigm for online identity authentication.  Higher education in particular requires a seamless continuous verification of the user’s identity whilst browsing a secure website.

This can be achieved via a relatively simple concept.  On an enabled website, a code downloads to the browser on the user’s device, be it PC, laptop, tablet or smartphone and switches on the camera and microphone on that device. (Naturally, these are only switched on with the user’s permission.) This, in effect, allows the website to see and hear the user accessing the website, much like a familiar video conference call, but now with a website.

Behind the scenes, a unique combination of biometric and non-biometric technologies is used to continuously track and validate the user’s identity.  Fused speaker and speech recognition technologies recognize who the speaker is and what they are saying. This works in tandem with face biometrics to validate that the voice matches the face.  After all, voices come from faces and the right voice must come from the right face.

To enhance privacy, “gaze technology” can analyze eye movement to ensure that the voice is only monitored when user is looking at the camera and speaking to the website.  The latest technology ignores the speaker if their face is turned away.  It only recognizes and validates the user’s spoken commands when the user is addressing the website. 

Depending on business rules, voice biometrics technologies can blank the screen unless the verified face is detected. Rules can also be applied that blank the screen if multiple faces appear. This is particularly useful when accessing confidential information from an insecure location, such as viewing medical records, financial reports, or government information from a home office or a public place.

The experience nowadays can be much like video conferences, such as Zoom, WebEx, Teams (to name a few), which people have become more familiar and comfortable with over recent months. But instead of interacting with another human, the user interacts with a biometric engine that is informing a secure website of the identity verification status of the person accessing that website.  This can be useful for educational institutions conducting online testing and for enterprises trying to manage secure access to sensitive data. Voice biometrics can also be helpful for online delivery of confidential health services or records, as well as for payment services and banking.

One of the benefits of this newer technology for the enterprise, is the technology can use the existing browser technology and existing hardware on the user’s device. Users do not need additional hardware or software, one-time passwords or access to email.

Preventing identity fraud in online education

While originally developed with online banking and financial services in mind, the COVID-19 pandemic has driven significant interest in the latest biometrics from the education sector. 

COVID-19 has caused many large educational institutions to accelerate the transition to online delivery of educational services. This has highlighted the issue of student identity and specifically the identity of students during online examination and testing.  How do you know that it is the registered student taking the online examination?

Leading universities around the world, require continuous authentication of students undertaking online examinations. Using the camera and microphone on the student’s computer, technology can detect if the correct face is in front of the computer and blanks the screen when there is no face or when an incorrect face or multiple faces are detected.  Voice biometrics augments the face recognition to positively assert the student identity and to detect if the student is speaking during the examination.

These concepts are in their infancy, but present a unique possibility for educational institutions around the globe who are looking to implement secure technologies for online learning. The next stages involve marrying with AI chat bots, speech synthesis and avatar technology to provide a secure two-way multi-media conversational user experience.  In effect, this creates a synthetic customer service agent that recognizes who the person is,  what they want and responds using spoken and visual cues.  

KEYWORDS: biometrics college security online privacy online security online shopping University security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dr. Clive Summerfield is founder of Voice Biometrics. Currently based at commercial technology accelerator BetaDen (in Malvern, U.K.), Voice Biometrics seeks to accelerate the adoption of voice biometrics and speech recognition technologies to meet increasingly stringent regulations for secure online customer service delivery. With a PhD in Electronic Engineering, Speech Recognition from the University of Sydney, he has over 30 years’ experience developing, implementing and deploying voice biometrics and speech recognition into a wide range of markets and applications. He is also Managing Director EMA-ANZ of LumenVox - a speech automation and multi-factor biometric authentication solutions company.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • call-center-freepik1170x658v8.jpg

    Best practices for securing voice networks

    See More
  • Voice Biometrics to Address On-Line Banking Fraud

    See More
  • Spoofing attacks with mobile devices

    Research explores the potential of continuous liveness detection for voice biometrics

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!