Password-based voice verification using SpeakerKey

نویسندگان

  • Alan L. Higgins
  • Lawrence G. Bahler
چکیده

The ITT Industries SpeakerKey verifier was tested using the Polyvar/Picasso data set. This paper presents a brief description of the SpeakerKey algorithm, the test procedures used, and the results of the testing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Speech detection for text-dependent speaker verification

The performance of text-dependent speaker verification systems degrades in noisy environment and when the true speaker utters words that are not part of the verification password. Energy-based voice activity detection (VAD) algorithms cannot distinguish between the true speaker’s speech and other background speech or between the speaker’s verification password and other words uttered by the spe...

متن کامل

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

Speaker Recognition: A Survey

Today many people have access to their company’s information system by logging in from home. Also Internet services and telephone banking are widely used by corporate and private sectors. Therefore to protect one’s resources or information with simple password is not reliable and secure in the world of today. Biometric systems are used for recognizing a user based upon his/her unique physiologi...

متن کامل

A voice verifier for face/voice based person verification system

A person verification system based on voice and facial images has been developed within CSIRO Telecommunications and Industrial Physics, Australia, for use in low-to-medium security systems. It provides a unique ID, which is non-intrusive, fast, and has no need for memorising passwords. A stand-alone version of the voice verifier has an error rate of less than 8%, while the face verifier has an...

متن کامل

Three-Factor User Authentication Method Using Biometrics Challenge Response

We propose a three-factor authentication method by pointing out the weakness in the two-factor authentication method that uses telephony currently used in Internet banking by adding voice verification, creating a threeauthentication method (password, possession of phone, and voice printing) . The use of the two-factor authentication (two-path authentication) method using telephony has recently ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001