dfm covers

Voice Biometry and its use in Digital Forensics

Written by Petr Schwarz

Voice Biometry and its use in Digital Forensics

Sound is a vibration that propagates as an audible wave of pressure through air.

The sound has a source that is often a vibrating solid object. When the frequency and time evolvement of the wave are observed, the source may often be identified. It may have unique spectral or temporal characteristics. 

In the case of humans, we speak about the human voice. The sound is produced when the air goes from the lungs through the glottis. Then it is further modulated, the wave is reflected, attenuated, and new frequencies are created, when the air goes through the human vocal tract. It means through the larynx, oral cavity, transformed by the tongue, gums, teeth, and lips.  Each person has a different shape and configuration of these organs. For example, women or children have a smaller body, shorter larynx, and, therefore, their voice has a higher fundamental frequency. The anatomy may vary with the human race (place of living) too, for example, American vs. Asian people. Then people move their vocal organs during speech. These movements are also unique. Some of them are learnt during childhood (dialect, the pronunciation of some words, pronunciation defects), and some of them may not be changed. Therefore, current voice biometry techniques investigate both the frequency representation of speech and its temporal evolvement.

Find out more - subscribe to DFM today and read the full article. Or if you're a subscriber, login and read the article online.

Please make cache directory writable.

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Scott C. Zimmerman

Scott C. Zimmerman is a CISSP qualified Information Security consultant and presenter


Coming up in the Next issue of Digital Forensics Magazine

Graph Database Technology

Attackers examine how your assets are connected, looking for a vulnerable part of the network, and navigating via methods such as “spear phishing.” What they’re really doing is abstracting out the graph of your networked systems, which is the set of security dependencies. Read More »

Fraudulent Use of Digital Images and Detection Survey

This article looks at the basic concepts related to image forgery; the types, detection procedure algorithms and all possible techniques to detect malicious signatures ibased on forgery types and detection techniques. Read More »

Subscribe today

Discovery in the Cloud: An Investigator’s Close Look at Unexpected Risks and Challenges

Documents residing in cloud storage accounts are increasingly coming into scope in digital forensic investigations such as IP theft, regulatory, corruption, merger clearance and civil matters.  Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the future issues