A Speaker Verification Biometric In 40 Bytes

نویسنده

  • T. C. Phipps
چکیده

This paper describes a novel Speaker Verification (SV) architecture that minimises many of the challenging problems faced by SV implementors in the Card Security arena. The architecture is unusual in two respects. First, the verification engine is not fed with conventional frequency-domain descriptors. Instead the output of a Time-Encoded Signal Processing and Recognition (TESPAR) coder is used. The TESPAR coder is a low-complexity, vector quantiser capable of converting the speech waveform into a highly informative set of time-domain descriptors. A simple 29-element matrix representation of TESPAR descriptors is described which, when used in conjunction with a Fast Artificial Neural Network (FANN), provides a wide degree of cross-speaker separation and strong same-speaker consistency [1]. The paper focuses on a novel SV engine that secures a robust verification performance by encoding the classification power of 100 orthogonal artificial neural networks into a biometric of only 40 bytes, offering a high level of protection to low-tech Dumb Cards as well as to state-of-the-art Smart-Card embodiments. The architectural rationale that enables this is presented, together with indications that a final verification decision can be delivered in under 1 second. The key features of the TESPAR/FANN combination and a system implementation in silicon for Smart-Card and Dumb-Card based systems are also discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

iButton Enrolment and Verification Requirements for the Pressure Sequence Smartcard Biometric

With the growing number of smartcard applications there comes an increasing need to restrict access to the card itself. In previous work we proposed the pressure sequence biometric, within which a biometric sensor is integrated onto the card in a low-cost and mechanically compliant manner. Using an off-card verifier we demonstrated reasonable discrimination between users. In this paper we consi...

متن کامل

Kernel-based Speaker Verification Using Spatiotemporal Lip Information

The lip-region can be interpreted as either a genetic or behavioural biometric trait. Despite this breadth of biometric content, lip-based biometric systems are scarcely developed in the literature. A recent trend in lip biometrics is to use a spatiotemporal texture representation of visual speech to generate biometric features. In this paper we make two contributions related to the above biome...

متن کامل

Intelligent Speaker Verification based Biometric System for Electronic Commerce Applications

Electronic commerce is growing rapidly with on-line sales already heading for hundreds of billion dollars per year. Due to the huge amount of money transferred everyday, an increased security level is required. In this work we present the architecture of an intelligent speaker verification system, which is able to accurately verify the registered users of an e-commerce service using only their ...

متن کامل

Fuzzy logic decision fusion in a multimodal biometric system

This paper presents a multi-biometric verification system that combines speaker verification, fingerprint verification with face identification. Their respective equal error rates (EER) are 4.3%, 5.1% and the range of (5.1% to 11.5%) for matched conditions in facial image capture. Fusion of the three by majority voting gave a relative improvement of 48% over speaker verification (i.e. the best-...

متن کامل

Secure Computation for Biometric Data Security - Application to Speaker Verification

The goal of this research is to develop provable secure computation techniques for two biometric security tasks in complex distributed systems involving multiple parties; namely biometric data retrieval and authentication. We first present models for privacy and security that delineate the conditions under which biometric data disclosure are allowed. We then discuss the secure computation techn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999