SlideShare a Scribd company logo
TECHNOLOGY WHITEPAPER




                         ArmorVox – “Black-List” Fraud Detection




AURAYA SYSTEMS
One Tara Boulevard | Nashua, New Hampshire 03062 | +1 603 123 7654 | twitter.com/armorvox | linkedin/in/armorvox
The Problem
When the economy takes a “downturn”, there is one thing that can be guaranteed to take an “upturn” -
and that is fraud. As Internet security has become stronger, criminals and fraudsters are increasingly
targeting soft options, such as contact centers to gain access to accounts and personal information.
Using stolen personal information, which is readily available on the Web either through criminal groups
or through the myriad of burgeoning social networking sites, a fraudster can easily gain access millions
of accounts simply by quoting the personal information to a contact center agent. The problem is that
the agent cannot differentiate between a legitimate caller and the fraudster, especially when the correct
personal information is being quoted. As the uptake of mobility increases this problem becomes
widespread in other channels such as the Internet and contact mediums like web chat, the problem is
only going to get worse.


In this whitepaper, Auraya describes the application of its speaker adaptive voice authentication
technology to provide a solution to this problem. The solution allows the contact center agent to take a
call and using the speech provided by the caller during the conversation, and compare their voice in the
background against a “black-list” of known fraudsters and suspicious callers to see if the voice
matches. Where there is a close match the agent or call center manager can be notified and
appropriate action taken.




Simulating Fraudulent Calls
Set up - To assess the effectiveness of black-list detection, Auraya set-up a simulation. The first step
was to configure the Auraya system to perform the “black-list” detection process. Figure 1 shows the
architecture. In this arrangement speech spoken by a caller is compared against each of the acoustic
models of the fraudulent “black-list” speakers. The output from this process is a list of scores
representing how well the speech matches each of the “black-list” acoustic models. The list is ranked in
descending order and a threshold is set to detect if the match is close enough to raise an alarm that the
speaker’s voice matches the voice of one of the speakers in the “black-list”.




2
ARMORVOX – “BLACK-LIST” FRAUD DETECTION
© 2012 Auraya Systems www.ArmorVox.com
Figure 1. ArmorVox “black-list” Architecture




For this exercise a speech database of some 200 speakers collected in a telephone call
center environment was used. The simulation was set-up in three stages:


Stage 1: Black-List Enrollment -This stage involved selecting ten speakers from the
database to act as the “black-list” fraudsters. The selection was purely arbitrary. There are no special
circumstances and includes both male and female speakers.


Table 1 (on the next page) shows the selection made:




3
ARMORVOX – “BLACK-LIST” FRAUD DETECTION
© 2012 Auraya Systems www.ArmorVox.com
“Black-List” Reference ID                      Speaker ID (from Speech Database)
                        101                                                106
                        102                                                117
                        103                                                120
                        104                                                160
                        105                                                294
                        106                                                385
                        107                                                386
                        108                                                398
                        109                                                415
                        110                                                438
                                          Table1. Fraudster Selection


In this arrangement; speaker ID 106 from the database was enrolled as “Black-list” reference
101, speaker ID 117 as “Black-list” reference 102 and so on to create the “Black-list” of ten.


Stage 2 - “Black-List” Detection - Once this was complete, the second stage involved processing the
database of 200 speakers (which included the “black-list” speakers) and systematically comparing each
speaker against each of the “black-list” voiceprints with the results of this process loaded into a
database for further analysis.


The process generates two thousand authentication results, that is, 200 speakers each compared
against the ten “Black-list” enrollments. The results generated by this process were then sorted into
descending order, with the highest scores (closed matches) ranked at the top.


Table 2 shows an analysis for “Black-List” ID 101 (which is speaker 106 from database)). In this table
only the top ten closest matches are listed (from the 200 matches generated). The table shows that the
highest score was generated by wave file 10611-2-1-1.wav, i.e. speaker ID 106 (with a score or
1.3374); with ID 214 with voice file 21411-2-1-1.wav being the second closest match (with a score of
0.5512) and so on.




4
ARMORVOX – “BLACK-LIST” FRAUD DETECTION
© 2012 Auraya Systems www.ArmorVox.com
This test confirmed that Auraya’s technology was successful in a database of 200 callers in detecting
ID 106 from the database as fraudster 101. . Further the fraudster match was over double that of the
second closest match, showing that there was a very positive authentication of the fraudster’s voice in
this test.


    Black List ID     Speaker ID (Database Reference)      “Black-List” Raw Score      Delta
    101               10611-2-1-1.wav                      1.3374                      0.7862
    101               21411-2-1-1.wav                      0.5512                      0.7885
    101               28711-2-1-1.wav                      0.5489                      0.8198
    101               24744-2-1-1.wav                      0.5176                      0.8582


    101               21311-2-1-1.wav                      0.4792                      0.9032
    101               17444-2-1-1.wav                      0.4342                      0.9119


    101               24644-2-1-1.wav                      0.4255                      0.9786
    101               21813-2-1-1.wav                      0.3588                      1.0162
    101               11044-2-1-1.wav                      0.3212                      1.041
    101               12011-2-1-1.wav                      0.2964                      1.0693


                           Table 2. Results for “Black-List” ID 101 showing voice file of
                                    speaker 106 to be highest scoring match.


An analysis of the complete data set shows that the result achieved for ID 106 was consistent across all
“Black-list” IDs. That is, in each case, the Auraya technology was able to clearly identify the correct
speaker from the total voice database against the corresponding “blacklist” speaker. Table 3a shows
the top three speaker ID’s for each “black-list” ID. In every case the corresponding speaker ID was
ranked number one in each data set.


This database is based on account number. A second test was run to see if the technology could
reliably detect “black-list” speakers when they were quoting a different account number.
This tested the performance of the technology in matching the voice quality, not the content of
the speech files.




5
ARMORVOX – “BLACK-LIST” FRAUD DETECTION
© 2012 Auraya Systems www.ArmorVox.com
The results are generated are detailed in Table 3b (on the next page).


In all but ID 110 the “Black-List” speaker was successfully selected as the number one ranked match by
a large margin despite the fact that the speaker was saying different information to the information
enrolled, a clear and positive identification. In the case of 110, ID 513 was placed ahead of the real
fraudster’s ID which was 438. Note that ID 513 was ranked third in the initial test, suggesting that the
voice of ID 513 appears to be highly confusable with the voice of the nominated ID 438. Further, it
would appear that “Black-list” ID 110 also produced a weak voiceprint resulting in low match score
(0.7403 compared to around 1.5) in the first test. This is something that we will come back to later in the
business rule analysis.




6
ARMORVOX – “BLACK-LIST” FRAUD DETECTION
© 2012 Auraya Systems www.ArmorVox.com
BLACK   SPEAKER ID            Raw        Ranking           BLACK    SPEAKER ID             Raw      Ranking
LIST    (Database             Score                        LIST     (Database              Score
ID      Reference)                                         ID       Reference)
101     10611-2-1-.wav        1.3374     First             101      10611-2-2-1.wav        1.6778   First
101     21411-2-1-1.wav       0.5512     Second            101      10930-2-2-1.wav        0.7576   Second
101     28711-2-1-1.wav       0.5489     Third             101      17444-2-2-1.wav        0.7552   Third
102     11711-2-1-1.wav       1.4163     First             102      11711-2-2-1.wav        1.2436   First
102     29411-2-1-1.wav       0.5328     Second            102      33644-2-2-1.wav        0.4595   Second
102     29311-2-1-1.wav       0.4347     Third             102      10411-2-2-1.wav        0.4266   Third
103     12011-2-1-1.wav       1.9814     First             103      12011-2-2-1.wav        1.6463   First
103     28711-2-1-1.wav       0.5514     Second            103      36144-2-2-1.wav        0.6992   Second
103     29011-2-1-1.wav       0.4936     Third             103      10011-2-2-1.wav        0.683    Third
104     16011-2-1-1.wav       1.0953     First             104      16011-2-2-1.wav        1.231    First
104     12011-2-1-1.wav       0.3928     Second            104      12011-2-2-1.wav        0.5576   Second
104     55644-2-1-1.wav       0.2712     Third             104      21411-2-2-1.wav        0.4029   Third
105     29411-2-1-1.wav       1.8086     First             105      29411-2-2-1.wav        1.8922   First
105     22822-2-1-1.wav       0.7991     Second            105      33644-2-2-1.wav        0.5514   Second
105     29311-2-1-1.wav       0.6144     Third             105      34944-2-2-1.wav        0.4285   Third
106     38511-2-1-1.wav       1.0417     First             106      38511-2-2-1.wav        0.9484   First
106     38111-2-1-1.wav       0.4209     Second            106      51344-2-2-1.wav        0.6673   Second
106     39411-2-1-1.wav       0.3661     Third             106      38111-2-2-1.wav        0.557    Third
107     38611-2-1-1.wav       2.5391     First             107      38611-2-2-1.wav        2.5511   First
107     45311-2-1-1.wav       1.0601     Second            107      39611-2-2-1.wav        0.9081   Second
107     39611-2-1-1.wav       0.9634     Third             107      58644-2-2-1.wav        0.8672   Third
108     39844-2-1-1.wav       0.7882     First             108      39844-2-2-1.wav        0.9732   First
108     82144-2-1-1.wav       0.5045     Second            108      41711-2-2-1.wav        0.4509   Second
108     40011-2-1-1.wav       0.5007     Third             108      49644-2-2-1.wav        0.441    Third
109     41511-2-1-1.wav       2.4704     First             109      41511-2-2-1.wav        1.6375   First
109     61744-2-1-1.wav       0.933      Second            109      61744-2-2-1.wav        0.7019   Second
109     41844-2-1-1.wav       0.6561     Third             109      39611-2-2-1.wav        0.5715   Third
110     43844-2-1-1.wav       0.7403     First             110      51344-2-2-1.wav        0.8005   First
110     58644-2-1-1.wav       0.4773     Second            110      43844-2-2-1.wav        0.6628   Second
110     51344-2-1-1.wav       0.4204     Third             110      81444-2-2-1.wav        0.605    Third
                          Table 3 a. and 3 b. Top three matches for each “Black-list” ID
7
ARMORVOX – “BLACK-LIST” FRAUD DETECTION
© 2012 Auraya Systems www.ArmorVox.com
Stage 3 - Business Rules Development - Showing that the technology works effectively for
“Black-List” detection in one thing - developing an effective set of rules that can take the results
generated by the technology and turn that into a solution that provides a reliable alarm for the call
center agent or operator, is another.


One approach developed by Auraya for tuning authentication applications has been the use
of “speaker space” analysis. In “speaker space” analysis, the “position” of each speaker in a “speaker
space” can be plotted from the results generated by the authentication technology. Using this analysis
the “position” in the “space” of the non-”Black-list” speakers and compared to the “position” of the
“black-list” speakers and appropriate rules developed that maximize the separation of the speaker in
the space.


Figure 2 shows this analysis. In this figure, blue dots represent non- “black-list” speakers, while the red
diamonds represent the “black-list” speakers. In this analysis there are approximately 2000 non-“Black-
List” speakers (blue dots) and ten “black-list” speech samples (red diamonds).




                                         Figure 2 “Black-list” Scatter Analysis

8
ARMORVOX – “BLACK-LIST” FRAUD DETECTION
© 2012 Auraya Systems www.ArmorVox.com
This analysis demonstrated the distribution of the non- “black-list” speakers compared to the “Black-
List” speakers. From inspection of these distributions, a threshold (shown as the broken black line) can
be developed as a prototype business rule that separates the non- “black-list” speakers from the
“Black-List” speakers.


Given this prototype business rule and the database used in the analysis, all “black-list” speakers would
have been successfully detected, with four (out of 2000) non-black list speaker being falsely detected
as “black-list” speakers i.e. false alarms. In this analysis, the false alarms are those blue dots that are
above the business rule threshold. This equates to a fraud detection rate of 100% with a false alarm
rate of 0.2%.


Whilst good, we were looking to see if a business rue could be constructed that would reduce the false
alarm rate to zero. The analysis shows that that black list ID’s 108 and 110 are the most problematic
and most confusable with the non-”Black-list” speakers. A separate analysis of ID 110 only(shown in
Figure 3) demonstrates that the current rule does reliably separate the “black-list” ID 110 from all the
non- “Black-List” speakers, indicating that this rule would result in successful detection of this the
“Black-List” fraudster with no false alarms.




                                   Figure 3. Fraudster ID 110 Scatter Analysis

9
ARMORVOX – “BLACK-LIST” FRAUD DETECTION
© 2012 Auraya Systems www.ArmorVox.com
However, an analysis of “black-list” ID 107 (shown in Figure 4) which appears to generate a very strong
match resulting in the response appearing towards the top right hand corner of speaker space also
shows that it is easily separated from non- “black-list” speakers.




                                   Figure 4. Fraudster ID 107 Scatter Analysis


However, whilst the rule works effectively for “black-list” ID 110, that this rule would generate
a number of false alarms as shown by the speakers circled. In fact, it appears that in this analysis all
false alarms are associated with matches to the “black-list” ID 107. In this case a successful business
rule can be achieved by increasing the settings essentially moving the threshold closer to the to right
hand corner of the speaker space.




10
ARMORVOX – “BLACK-LIST” FRAUD DETECTION
© 2012 Auraya Systems www.ArmorVox.com
Conclusions
The simulation clearly demonstrates the effectiveness of the speaker adaptive voice authentication
technology to detect “black-list” callers. By customizing the business rule for the “black-list” ID’s all
“black-list” ID’s are successfully detected as fraudsters with no false alarms.


As the economic downturn worsens and the problem of identity fraud intensifies, call center operators
can rest assured that Auraya will continue to develop new technologies and new solutions to help
enhance security. Auraya’s “black-list” detection solution not only enhances security and addresses the
insidious problem of identity fraud, but does this unobtrusively in the background enables caller center
agents to focus on offering the best possible personal service confident that the caller is indeed “who
they say they are”.




               Dr. Clive Summerfield is Auraya Systems’ Founder and Chief Executive Officer.
               Clive is an internationally recognized authority on voice technology and holds numerous
               patents in Australia, USA and UK in radar processing, speech chip design and speech
               recognition and voice biometrics.


As a former Founder Deputy Director of the National Centre for Biometric Studies (NCBS) at University
of Canberra, in 2005 Clive undertook at the time the world’s largest scientific analysis of the voice
biometric systems leading to the adoption of voice biometrics by for secure services. That experience
lead Clive in 2006 founding Auraya, a business exclusively focused on advanced voice biometric
technologies for enterprise and cloud based services. Visit ArmorVox.com for Clive Summerfield’s full
bio.


About Auraya Systems
Founded in 2006, Auraya Systems, the creators of ArmorVox™ Speaker Identity System is a global
leader in the delivery of advanced voice biometric technologies for security and identity management
applications in a wide range of markets including banks, government, and health services. Offices are
located near Boston USA, Canberra and Sydney Australia. For more information, please
visit www.armorvox.com.com.



11
ARMORVOX – “BLACK-LIST” FRAUD DETECTION
© 2012 Auraya Systems www.ArmorVox.com

More Related Content

Recently uploaded

AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 

Recently uploaded (20)

AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 

Featured

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
Alireza Esmikhani
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Project for Public Spaces & National Center for Biking and Walking
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Armor vox whitepaper_blacklist-fraud-detection_

  • 1. TECHNOLOGY WHITEPAPER ArmorVox – “Black-List” Fraud Detection AURAYA SYSTEMS One Tara Boulevard | Nashua, New Hampshire 03062 | +1 603 123 7654 | twitter.com/armorvox | linkedin/in/armorvox
  • 2. The Problem When the economy takes a “downturn”, there is one thing that can be guaranteed to take an “upturn” - and that is fraud. As Internet security has become stronger, criminals and fraudsters are increasingly targeting soft options, such as contact centers to gain access to accounts and personal information. Using stolen personal information, which is readily available on the Web either through criminal groups or through the myriad of burgeoning social networking sites, a fraudster can easily gain access millions of accounts simply by quoting the personal information to a contact center agent. The problem is that the agent cannot differentiate between a legitimate caller and the fraudster, especially when the correct personal information is being quoted. As the uptake of mobility increases this problem becomes widespread in other channels such as the Internet and contact mediums like web chat, the problem is only going to get worse. In this whitepaper, Auraya describes the application of its speaker adaptive voice authentication technology to provide a solution to this problem. The solution allows the contact center agent to take a call and using the speech provided by the caller during the conversation, and compare their voice in the background against a “black-list” of known fraudsters and suspicious callers to see if the voice matches. Where there is a close match the agent or call center manager can be notified and appropriate action taken. Simulating Fraudulent Calls Set up - To assess the effectiveness of black-list detection, Auraya set-up a simulation. The first step was to configure the Auraya system to perform the “black-list” detection process. Figure 1 shows the architecture. In this arrangement speech spoken by a caller is compared against each of the acoustic models of the fraudulent “black-list” speakers. The output from this process is a list of scores representing how well the speech matches each of the “black-list” acoustic models. The list is ranked in descending order and a threshold is set to detect if the match is close enough to raise an alarm that the speaker’s voice matches the voice of one of the speakers in the “black-list”. 2 ARMORVOX – “BLACK-LIST” FRAUD DETECTION © 2012 Auraya Systems www.ArmorVox.com
  • 3. Figure 1. ArmorVox “black-list” Architecture For this exercise a speech database of some 200 speakers collected in a telephone call center environment was used. The simulation was set-up in three stages: Stage 1: Black-List Enrollment -This stage involved selecting ten speakers from the database to act as the “black-list” fraudsters. The selection was purely arbitrary. There are no special circumstances and includes both male and female speakers. Table 1 (on the next page) shows the selection made: 3 ARMORVOX – “BLACK-LIST” FRAUD DETECTION © 2012 Auraya Systems www.ArmorVox.com
  • 4. “Black-List” Reference ID Speaker ID (from Speech Database) 101 106 102 117 103 120 104 160 105 294 106 385 107 386 108 398 109 415 110 438 Table1. Fraudster Selection In this arrangement; speaker ID 106 from the database was enrolled as “Black-list” reference 101, speaker ID 117 as “Black-list” reference 102 and so on to create the “Black-list” of ten. Stage 2 - “Black-List” Detection - Once this was complete, the second stage involved processing the database of 200 speakers (which included the “black-list” speakers) and systematically comparing each speaker against each of the “black-list” voiceprints with the results of this process loaded into a database for further analysis. The process generates two thousand authentication results, that is, 200 speakers each compared against the ten “Black-list” enrollments. The results generated by this process were then sorted into descending order, with the highest scores (closed matches) ranked at the top. Table 2 shows an analysis for “Black-List” ID 101 (which is speaker 106 from database)). In this table only the top ten closest matches are listed (from the 200 matches generated). The table shows that the highest score was generated by wave file 10611-2-1-1.wav, i.e. speaker ID 106 (with a score or 1.3374); with ID 214 with voice file 21411-2-1-1.wav being the second closest match (with a score of 0.5512) and so on. 4 ARMORVOX – “BLACK-LIST” FRAUD DETECTION © 2012 Auraya Systems www.ArmorVox.com
  • 5. This test confirmed that Auraya’s technology was successful in a database of 200 callers in detecting ID 106 from the database as fraudster 101. . Further the fraudster match was over double that of the second closest match, showing that there was a very positive authentication of the fraudster’s voice in this test. Black List ID Speaker ID (Database Reference) “Black-List” Raw Score Delta 101 10611-2-1-1.wav 1.3374 0.7862 101 21411-2-1-1.wav 0.5512 0.7885 101 28711-2-1-1.wav 0.5489 0.8198 101 24744-2-1-1.wav 0.5176 0.8582 101 21311-2-1-1.wav 0.4792 0.9032 101 17444-2-1-1.wav 0.4342 0.9119 101 24644-2-1-1.wav 0.4255 0.9786 101 21813-2-1-1.wav 0.3588 1.0162 101 11044-2-1-1.wav 0.3212 1.041 101 12011-2-1-1.wav 0.2964 1.0693 Table 2. Results for “Black-List” ID 101 showing voice file of speaker 106 to be highest scoring match. An analysis of the complete data set shows that the result achieved for ID 106 was consistent across all “Black-list” IDs. That is, in each case, the Auraya technology was able to clearly identify the correct speaker from the total voice database against the corresponding “blacklist” speaker. Table 3a shows the top three speaker ID’s for each “black-list” ID. In every case the corresponding speaker ID was ranked number one in each data set. This database is based on account number. A second test was run to see if the technology could reliably detect “black-list” speakers when they were quoting a different account number. This tested the performance of the technology in matching the voice quality, not the content of the speech files. 5 ARMORVOX – “BLACK-LIST” FRAUD DETECTION © 2012 Auraya Systems www.ArmorVox.com
  • 6. The results are generated are detailed in Table 3b (on the next page). In all but ID 110 the “Black-List” speaker was successfully selected as the number one ranked match by a large margin despite the fact that the speaker was saying different information to the information enrolled, a clear and positive identification. In the case of 110, ID 513 was placed ahead of the real fraudster’s ID which was 438. Note that ID 513 was ranked third in the initial test, suggesting that the voice of ID 513 appears to be highly confusable with the voice of the nominated ID 438. Further, it would appear that “Black-list” ID 110 also produced a weak voiceprint resulting in low match score (0.7403 compared to around 1.5) in the first test. This is something that we will come back to later in the business rule analysis. 6 ARMORVOX – “BLACK-LIST” FRAUD DETECTION © 2012 Auraya Systems www.ArmorVox.com
  • 7. BLACK SPEAKER ID Raw Ranking BLACK SPEAKER ID Raw Ranking LIST (Database Score LIST (Database Score ID Reference) ID Reference) 101 10611-2-1-.wav 1.3374 First 101 10611-2-2-1.wav 1.6778 First 101 21411-2-1-1.wav 0.5512 Second 101 10930-2-2-1.wav 0.7576 Second 101 28711-2-1-1.wav 0.5489 Third 101 17444-2-2-1.wav 0.7552 Third 102 11711-2-1-1.wav 1.4163 First 102 11711-2-2-1.wav 1.2436 First 102 29411-2-1-1.wav 0.5328 Second 102 33644-2-2-1.wav 0.4595 Second 102 29311-2-1-1.wav 0.4347 Third 102 10411-2-2-1.wav 0.4266 Third 103 12011-2-1-1.wav 1.9814 First 103 12011-2-2-1.wav 1.6463 First 103 28711-2-1-1.wav 0.5514 Second 103 36144-2-2-1.wav 0.6992 Second 103 29011-2-1-1.wav 0.4936 Third 103 10011-2-2-1.wav 0.683 Third 104 16011-2-1-1.wav 1.0953 First 104 16011-2-2-1.wav 1.231 First 104 12011-2-1-1.wav 0.3928 Second 104 12011-2-2-1.wav 0.5576 Second 104 55644-2-1-1.wav 0.2712 Third 104 21411-2-2-1.wav 0.4029 Third 105 29411-2-1-1.wav 1.8086 First 105 29411-2-2-1.wav 1.8922 First 105 22822-2-1-1.wav 0.7991 Second 105 33644-2-2-1.wav 0.5514 Second 105 29311-2-1-1.wav 0.6144 Third 105 34944-2-2-1.wav 0.4285 Third 106 38511-2-1-1.wav 1.0417 First 106 38511-2-2-1.wav 0.9484 First 106 38111-2-1-1.wav 0.4209 Second 106 51344-2-2-1.wav 0.6673 Second 106 39411-2-1-1.wav 0.3661 Third 106 38111-2-2-1.wav 0.557 Third 107 38611-2-1-1.wav 2.5391 First 107 38611-2-2-1.wav 2.5511 First 107 45311-2-1-1.wav 1.0601 Second 107 39611-2-2-1.wav 0.9081 Second 107 39611-2-1-1.wav 0.9634 Third 107 58644-2-2-1.wav 0.8672 Third 108 39844-2-1-1.wav 0.7882 First 108 39844-2-2-1.wav 0.9732 First 108 82144-2-1-1.wav 0.5045 Second 108 41711-2-2-1.wav 0.4509 Second 108 40011-2-1-1.wav 0.5007 Third 108 49644-2-2-1.wav 0.441 Third 109 41511-2-1-1.wav 2.4704 First 109 41511-2-2-1.wav 1.6375 First 109 61744-2-1-1.wav 0.933 Second 109 61744-2-2-1.wav 0.7019 Second 109 41844-2-1-1.wav 0.6561 Third 109 39611-2-2-1.wav 0.5715 Third 110 43844-2-1-1.wav 0.7403 First 110 51344-2-2-1.wav 0.8005 First 110 58644-2-1-1.wav 0.4773 Second 110 43844-2-2-1.wav 0.6628 Second 110 51344-2-1-1.wav 0.4204 Third 110 81444-2-2-1.wav 0.605 Third Table 3 a. and 3 b. Top three matches for each “Black-list” ID 7 ARMORVOX – “BLACK-LIST” FRAUD DETECTION © 2012 Auraya Systems www.ArmorVox.com
  • 8. Stage 3 - Business Rules Development - Showing that the technology works effectively for “Black-List” detection in one thing - developing an effective set of rules that can take the results generated by the technology and turn that into a solution that provides a reliable alarm for the call center agent or operator, is another. One approach developed by Auraya for tuning authentication applications has been the use of “speaker space” analysis. In “speaker space” analysis, the “position” of each speaker in a “speaker space” can be plotted from the results generated by the authentication technology. Using this analysis the “position” in the “space” of the non-”Black-list” speakers and compared to the “position” of the “black-list” speakers and appropriate rules developed that maximize the separation of the speaker in the space. Figure 2 shows this analysis. In this figure, blue dots represent non- “black-list” speakers, while the red diamonds represent the “black-list” speakers. In this analysis there are approximately 2000 non-“Black- List” speakers (blue dots) and ten “black-list” speech samples (red diamonds). Figure 2 “Black-list” Scatter Analysis 8 ARMORVOX – “BLACK-LIST” FRAUD DETECTION © 2012 Auraya Systems www.ArmorVox.com
  • 9. This analysis demonstrated the distribution of the non- “black-list” speakers compared to the “Black- List” speakers. From inspection of these distributions, a threshold (shown as the broken black line) can be developed as a prototype business rule that separates the non- “black-list” speakers from the “Black-List” speakers. Given this prototype business rule and the database used in the analysis, all “black-list” speakers would have been successfully detected, with four (out of 2000) non-black list speaker being falsely detected as “black-list” speakers i.e. false alarms. In this analysis, the false alarms are those blue dots that are above the business rule threshold. This equates to a fraud detection rate of 100% with a false alarm rate of 0.2%. Whilst good, we were looking to see if a business rue could be constructed that would reduce the false alarm rate to zero. The analysis shows that that black list ID’s 108 and 110 are the most problematic and most confusable with the non-”Black-list” speakers. A separate analysis of ID 110 only(shown in Figure 3) demonstrates that the current rule does reliably separate the “black-list” ID 110 from all the non- “Black-List” speakers, indicating that this rule would result in successful detection of this the “Black-List” fraudster with no false alarms. Figure 3. Fraudster ID 110 Scatter Analysis 9 ARMORVOX – “BLACK-LIST” FRAUD DETECTION © 2012 Auraya Systems www.ArmorVox.com
  • 10. However, an analysis of “black-list” ID 107 (shown in Figure 4) which appears to generate a very strong match resulting in the response appearing towards the top right hand corner of speaker space also shows that it is easily separated from non- “black-list” speakers. Figure 4. Fraudster ID 107 Scatter Analysis However, whilst the rule works effectively for “black-list” ID 110, that this rule would generate a number of false alarms as shown by the speakers circled. In fact, it appears that in this analysis all false alarms are associated with matches to the “black-list” ID 107. In this case a successful business rule can be achieved by increasing the settings essentially moving the threshold closer to the to right hand corner of the speaker space. 10 ARMORVOX – “BLACK-LIST” FRAUD DETECTION © 2012 Auraya Systems www.ArmorVox.com
  • 11. Conclusions The simulation clearly demonstrates the effectiveness of the speaker adaptive voice authentication technology to detect “black-list” callers. By customizing the business rule for the “black-list” ID’s all “black-list” ID’s are successfully detected as fraudsters with no false alarms. As the economic downturn worsens and the problem of identity fraud intensifies, call center operators can rest assured that Auraya will continue to develop new technologies and new solutions to help enhance security. Auraya’s “black-list” detection solution not only enhances security and addresses the insidious problem of identity fraud, but does this unobtrusively in the background enables caller center agents to focus on offering the best possible personal service confident that the caller is indeed “who they say they are”. Dr. Clive Summerfield is Auraya Systems’ Founder and Chief Executive Officer. Clive is an internationally recognized authority on voice technology and holds numerous patents in Australia, USA and UK in radar processing, speech chip design and speech recognition and voice biometrics. As a former Founder Deputy Director of the National Centre for Biometric Studies (NCBS) at University of Canberra, in 2005 Clive undertook at the time the world’s largest scientific analysis of the voice biometric systems leading to the adoption of voice biometrics by for secure services. That experience lead Clive in 2006 founding Auraya, a business exclusively focused on advanced voice biometric technologies for enterprise and cloud based services. Visit ArmorVox.com for Clive Summerfield’s full bio. About Auraya Systems Founded in 2006, Auraya Systems, the creators of ArmorVox™ Speaker Identity System is a global leader in the delivery of advanced voice biometric technologies for security and identity management applications in a wide range of markets including banks, government, and health services. Offices are located near Boston USA, Canberra and Sydney Australia. For more information, please visit www.armorvox.com.com. 11 ARMORVOX – “BLACK-LIST” FRAUD DETECTION © 2012 Auraya Systems www.ArmorVox.com