Password-based voice verification using SpeakerKey
نویسندگان
چکیده
The ITT Industries SpeakerKey verifier was tested using the Polyvar/Picasso data set. This paper presents a brief description of the SpeakerKey algorithm, the test procedures used, and the results of the testing.
منابع مشابه
Speech detection for text-dependent speaker verification
The performance of text-dependent speaker verification systems degrades in noisy environment and when the true speaker utters words that are not part of the verification password. Energy-based voice activity detection (VAD) algorithms cannot distinguish between the true speaker’s speech and other background speech or between the speaker’s verification password and other words uttered by the spe...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملSpeaker Recognition: A Survey
Today many people have access to their company’s information system by logging in from home. Also Internet services and telephone banking are widely used by corporate and private sectors. Therefore to protect one’s resources or information with simple password is not reliable and secure in the world of today. Biometric systems are used for recognizing a user based upon his/her unique physiologi...
متن کاملA voice verifier for face/voice based person verification system
A person verification system based on voice and facial images has been developed within CSIRO Telecommunications and Industrial Physics, Australia, for use in low-to-medium security systems. It provides a unique ID, which is non-intrusive, fast, and has no need for memorising passwords. A stand-alone version of the voice verifier has an error rate of less than 8%, while the face verifier has an...
متن کاملThree-Factor User Authentication Method Using Biometrics Challenge Response
We propose a three-factor authentication method by pointing out the weakness in the two-factor authentication method that uses telephony currently used in Internet banking by adding voice verification, creating a threeauthentication method (password, possession of phone, and voice printing) . The use of the two-factor authentication (two-path authentication) method using telephony has recently ...
متن کامل