IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

TALENTIQ: AN INTELLIGENT RESUME INTELLIGENCE & FAIR CANDIDATE RANKING SYSTEM

AUTHORS:
Srivarshini I
Pillai Kirthika Kannan
Tamilselvi P
Swathi.G
Mentor
Ranitha R
Affiliation
Department of Computer Science and Engineering CARE college of Engineering Tamil Nadu, India
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

In this paper, the authors introduce a secure voice transaction system that uses deepfake technology to increase the validity of authentication in online financial transactions. Passwords and OTPs, which are commonly used as traditional authentication tools, are under increased cyber threat, such as voice spoofing attacks and AI-generated impersonation attacks. To solve these issues, the proposed system involves a two-layered security system that is based on a combination of biometric voice identification and deep learning-based fake voice recognition. In the verification of identity, Mel-Frequency Cepstral Coefficients (MFCC) are computed on the voice inputs of the user and the comparison between them is carried out by the use of cosine similarity. At the same time, a Convolutional Neural Network (CNN) is used to analyze Mel-spectrogram representations of the audio to identify it as an original or an artificial one. Approving a transaction requires fulfillment of background checks, as well as authenticity and deep fake checks. The system is installed on flask-based backend and voice capture over the browser. The experimental findings show better strength and resiliency to the contemporary voice-based fraud attacks.

Keywords
Article Metrics
Article Views
21
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

I, S., Kannan, P. K., P, T. & Swathi.G, (2026). Talentiq: An Intelligent Resume Intelligence & Fair Candidate Ranking System. International Journal of Science, Strategic Management and Technology, 02(04). https://doi.org/10.55041/ijsmt.v2i4.024

I, Srivarshini, et al.. "Talentiq: An Intelligent Resume Intelligence & Fair Candidate Ranking System." International Journal of Science, Strategic Management and Technology, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i4.024.

I, Srivarshini,Pillai Kannan,Tamilselvi P, and Swathi.G. "Talentiq: An Intelligent Resume Intelligence & Fair Candidate Ranking System." International Journal of Science, Strategic Management and Technology 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i4.024.

References
[1] S. El Fakih, “Voice-Based Multi-Factor Authentication Security System,” Doctoral dissertation, 2025.

[2] O. O. Oyebode, “Adapting a Cell Phone with Voice Biometric Verification,” 2025.

[3] K. Murugesan et al., “Homomorphic encryption, privacy-preserving feature extraction, and decentralized architecture for enhancing privacy in voice authentication,” International Journal of Electrical and Computer Engineering, vol. 15, no. 2, pp. 2150–2160, 2025.

[4] S. A. Park et al., “Toward almost-zero fault acceptance of deep learning-based voice authentication using small training dataset,” Soft Computing, vol. 29, no. 8, pp. 4021–4032, 2025.

[5] B. Sombo, S. T. Apeh, and I. A. Edeoghon, “Artificial Neural Network-Based Voiceprint Generation Models for Speaker Recognition,” Journal of Engineering and Technology, vol. 16, no. 2, 2025.

[6] P. Pal, R. Bhattacharya, and A. K. Mallick, “A Secure and Efficient Voice Authentication Framework Based on Frequency Shift Keying Modulation and Modified Optimized RSA Encryption,” 2025.

[7] S. Ardekar, R. Sanghani, S. Nair, and R. Karani, “WoC SVC: A Model for Enhancing Lullabies Through Personalized Voice Cloning,” Procedia Computer Science, vol. 258, pp. 1565–1575, 2025.

[8] L. Jacob, “Leveraging GenAI for Biometric Voice Print Authentication,” 2025.

[9] K. Kamel et al., “A survey of threats against voice authentication and anti-spoofing systems,” arXiv preprint arXiv:2508.16843, 2025.

[10] H. Maltby et al., “Robust Deepfake Speech Algorithm Recognition: Classifying Generative Algorithms via Speaker X-Vectors and Deep Learning,” in Proc. Int. Joint Conf. Neural Networks (IJCNN), 2025, pp. 1–8.

 

 
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Analysis and Design of Induced Draft Cooling Tower using Staad Pro
string(15) "Parasa Vasanthi" Vasanthi, P.et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.361
E-Commerce Platform with Recommendation Engine
string(17) "Arjun K. Malhotra" Malhotra, A. K.
(2026)
DOI: 10.55041/ijsmt.v2i1.001
Ransomware Detection and Prevention Techniques Inmodern Cyber Security
string(9) "G.Sibilan" G.Sibilan,
(2026)
DOI: 10.55041/ijsmt.v2i3.321
Scroll to Top