Identity Authentication Scheme Expansion Based on Speaker Verification
نویسندگان
چکیده
Although in theory, the speaker verification accuracy will not decrease with the number of users increasing, in fact, is not the case. In view of this situation, this paper expands the identity authentication scheme based on speaker recognition which is safe but deficient. After expansion, the identity authentication scheme based on speaker verification is more effective and practical.
منابع مشابه
On combining classifiers for speaker authentication
Speaker Verification and Utterance Verification are examples of techniques that can be used for Speaker Authentication purposes. Speaker Verification consists of accepting or rejecting the claimed identity of a speaker by processing samples of his/her voice. Usually, these systems are based on HMM models that try to represent the characteristics of the speakers’ vocal tracts. Utterance Verifica...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملURU Plus – a scalable component-based speaker-verification system for BT’s 21st century network
Identity security is an issue that affects us all. In many everyday transactions, you have to prove that you are you (URU). BT has already established a market position with the award-winning URU product, that provides identity validation. A major extension to URU is URU Plus. This allows users to verify their identity through the use of speaker-verification technology. Following initial identi...
متن کاملA novel technique for the combination of utterance and speaker verification systems in a text-dependent speaker verification task
In this paper we present a novel technique for combining a Speaker Verification System with an Utterance Verification System in a Speaker Authentication system over the telephone. Speaker Verification consists in accepting or rejecting the claimed identity of a speaker by processing samples of his/her voice. Usually, these systems are based on HMM's that try to represent the characteristics of ...
متن کاملVerbal Information Verification for High - performance Speaker Authentication
of thesis entitled: Verbal Information Verification for High-performance Speaker Authentication Submitted by QIN Chao for the degree of Master of Philosophy in Electronic Engineering at The Chinese University of Hong Kong in June 2005. Automatic speaker authentication is to authenticate the identity of a claimed speaker by verifying the identity-related information embedded in his/her spoken ut...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCP
دوره 8 شماره
صفحات -
تاریخ انتشار 2013