Secure-Access System via Fixed and Mobile Telephone Networks

نویسندگان

  • Anastasis Kounoudes
  • Anixi Antonakoudi
  • Vasilis Kekatos
چکیده

This paper presents a double-digit system for textdependent speaker verification and text validation that can be accessed with security via a telephone network. A speech recognition and a user authentication scheme are proposed that utilize concatenated phoneme HMMs and operate in a sound-prompted mode. The recognition performance of the system is evaluated through extended simulations on Hidden Markov Models (HMMs) using Perceptual Linear Prediction (PLP), Mel Frequency Cepstral Coefficients (MFCC), as well as Cepstral Mean Subtraction (CMS). The effect of various factors such as the length of the training data, the number of embedded re-estimations, and Gaussian mixtures in training of the HMMs, the use of world models, bootstrapping, and user-dependent thresholds on the performance of speech recognition and speaker verification is also examined.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Resilience Enhancement of Active Distribution Networks Via Mobile Energy Storage Systems and Protection Coordination Consideration

Owing to the portability and flexibility of mobile energy storage systems (MESSs), they seem to be a promising solution to improve the resilience of the distribution system (DS). So, this paper presents a rolling optimization mechanism for dispatching MESSs and other resources in microgrids in case of a natural disaster occurrence. The proposed mechanism aims to minimize the total system cost b...

متن کامل

Vehicular Networks: A Survey on Architecture, Communication Technologies and Applications

The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable. This system consists of many fixed and mobile nodes (Vehicles, Trains, Vessels, Air planes), Wireless and Wired Telecommunication Technologies to exchange information between mobile nodes or betwee...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

Network Investigation and Performance Analysis of ZigBee Technology using OPNET

Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking (WSN) system, and most important thing in communication is to be free from interference, attenu...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006