TALENTIQ: AN INTELLIGENT RESUME INTELLIGENCE & FAIR CANDIDATE RANKING SYSTEM
In this paper, the authors introduce a secure voice transaction system that uses deepfake technology to increase the validity of authentication in online financial transactions. Passwords and OTPs, which are commonly used as traditional authentication tools, are under increased cyber threat, such as voice spoofing attacks and AI-generated impersonation attacks. To solve these issues, the proposed system involves a two-layered security system that is based on a combination of biometric voice identification and deep learning-based fake voice recognition. In the verification of identity, Mel-Frequency Cepstral Coefficients (MFCC) are computed on the voice inputs of the user and the comparison between them is carried out by the use of cosine similarity. At the same time, a Convolutional Neural Network (CNN) is used to analyze Mel-spectrogram representations of the audio to identify it as an original or an artificial one. Approving a transaction requires fulfillment of background checks, as well as authenticity and deep fake checks. The system is installed on flask-based backend and voice capture over the browser. The experimental findings show better strength and resiliency to the contemporary voice-based fraud attacks.
I, S., Kannan, P. K., P, T. & Swathi.G, (2026). Talentiq: An Intelligent Resume Intelligence & Fair Candidate Ranking System. International Journal of Science, Strategic Management and Technology, 02(04). https://doi.org/10.55041/ijsmt.v2i4.024
I, Srivarshini, et al.. "Talentiq: An Intelligent Resume Intelligence & Fair Candidate Ranking System." International Journal of Science, Strategic Management and Technology, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i4.024.
I, Srivarshini,Pillai Kannan,Tamilselvi P, and Swathi.G. "Talentiq: An Intelligent Resume Intelligence & Fair Candidate Ranking System." International Journal of Science, Strategic Management and Technology 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i4.024.
[2] O. O. Oyebode, “Adapting a Cell Phone with Voice Biometric Verification,” 2025.
[3] K. Murugesan et al., “Homomorphic encryption, privacy-preserving feature extraction, and decentralized architecture for enhancing privacy in voice authentication,” International Journal of Electrical and Computer Engineering, vol. 15, no. 2, pp. 2150–2160, 2025.
[4] S. A. Park et al., “Toward almost-zero fault acceptance of deep learning-based voice authentication using small training dataset,” Soft Computing, vol. 29, no. 8, pp. 4021–4032, 2025.
[5] B. Sombo, S. T. Apeh, and I. A. Edeoghon, “Artificial Neural Network-Based Voiceprint Generation Models for Speaker Recognition,” Journal of Engineering and Technology, vol. 16, no. 2, 2025.
[6] P. Pal, R. Bhattacharya, and A. K. Mallick, “A Secure and Efficient Voice Authentication Framework Based on Frequency Shift Keying Modulation and Modified Optimized RSA Encryption,” 2025.
[7] S. Ardekar, R. Sanghani, S. Nair, and R. Karani, “WoC SVC: A Model for Enhancing Lullabies Through Personalized Voice Cloning,” Procedia Computer Science, vol. 258, pp. 1565–1575, 2025.
[8] L. Jacob, “Leveraging GenAI for Biometric Voice Print Authentication,” 2025.
[9] K. Kamel et al., “A survey of threats against voice authentication and anti-spoofing systems,” arXiv preprint arXiv:2508.16843, 2025.
[10] H. Maltby et al., “Robust Deepfake Speech Algorithm Recognition: Classifying Generative Algorithms via Speaker X-Vectors and Deep Learning,” in Proc. Int. Joint Conf. Neural Networks (IJCNN), 2025, pp. 1–8.