Analysis of the effectiveness of the Resemblyzer library for short-command voice authentication

Keywords: voice control, user authentication, Resemblyzer, short voice commands, Internet of Things (IoT), resource-constrained devices, voice verification, voice embedding, cosine similarity

Abstract

Relevance. Voice interaction is widely used in Internet of Things systems and autonomous embedded devices. However, its practical deployment is constrained by security and privacy requirements as well as the limited computational resources of edge platforms. This creates a demand for fully local voice authentication solutions capable of operating without reliance on cloud services. Goal. The objective of this study is to evaluate the capabilities of the open-source Python library Resemblyzer for implementing autonomous user voice authentication based on short voice commands under conditions of no access to cloud computing and limited hardware resources. Research methods. The study was conducted using several audio datasets with varying duration, quality, and file size. Voice embeddings generated by the Resemblyzer library were used for feature representation. Quantitative similarity assessment between recordings was performed using the cosine similarity metric in scenarios involving comparisons of recordings from the same speaker and from different speakers.

Results. The results demonstrate that reliable voice authentication is achieved for audio recordings with a duration of at least 2.63 seconds and a file size of no less than 495 kB. Short fragments with durations of 1-1.5 seconds were found to be insufficiently informative for stable speaker discrimination, particularly when compared against a high-quality reference recording. A clear dependence of authentication performance on the amount of acoustic information contained in the voice signal was identified.

Conclusions. The obtained results confirm the aplicability of Resemblyzer for the development of fully autonomous real-time voice biometric authentication systems. Practical requirements for the minimum duration and informational richness of voice commands are formulated, which may be interpreted as technical constraints on the entropy of voice passwords in secure IoT applications.

Downloads

Download data is not yet available.

Author Biographies

Mykhaylo Trusov, V. N. Karazin Kharkiv National University, 4 Svobody Sq., Kharkiv, 61022, Ukraine

PhD student

Oleksiy Turuta, Kharkiv National University of Radioelectronics, 14 Nauky Ave., Kharkiv 61166, Ukraine

к.т.н., доцент, доцент кафедри програмної інженерії

Dmitro Uzlov, V. N. Karazin Kharkiv National University, 4 Svobody Sq., Kharkiv, 61022, Ukraine

Associate Professor of the Department of Theoretical and Applied Informatics

References

/

References

Published
2025-12-22
How to Cite
Trusov, M., Turuta, O., & Uzlov, D. (2025). Analysis of the effectiveness of the Resemblyzer library for short-command voice authentication. Bulletin of V.N. Karazin Kharkiv National University, Series «Mathematical Modeling. Information Technology. Automated Control Systems», 68, 84-97. https://doi.org/10.26565/2304-6201-2025-68-09
Section
Статті