Voice Biometrics over the Internet in the Framework of COST Action 275

نویسندگان

  • Laurent Besacier
  • Aladdin M. Ariyaeeinia
  • John S. D. Mason
  • Jean-François Bonastre
  • Pedro Mayorga
  • Corinne Fredouille
  • Sylvain Meignier
  • Johann Siau
  • Nicholas W. D. Evans
  • Roland Auckenthaler
  • Robert P. Stapert
چکیده

The emerging field of biometric authentication over the Internet requires both robust person authentication and secure computer network protocols. This paper presents investigations of vocal biometric person authentication over the Internet, both at the protocol and authentication robustness levels. As part of this study, an appropriate client-server architecture for biometrics on the Internet is proposed and implemented. It is shown that the transmission of raw biometric data in this application is likely to result in unacceptably long delays in the process. On the other hand, by using data models (or features), the transmission time can be reduced to an acceptable level. The use of encryption/decryption for enhancing the data security in the proposed client-server link and its effects on the transmission time are also examined. Furthermore, the scope of the investigations includes an analysis of the effects of packet loss and speech coding on speaker verification performance. It is experimentally demonstrated that whilst the adverse effects of packet loss can be negligible, the encoding of speech, particularly at a low bit rate, can reduce the verification accuracy considerably. The paper details the experimental investigations conducted and presents an analysis of the results.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Methodology for Evaluating Speaker Verification Robustness over Ip Networks

In the framework of biometric person authentication over Internet, speech and more precisely speaker recognition play an important role. Internet is an application context relatively new for speech and speaker recognition and several new questions appear with it. This paper presents the efforts of COST 275 action and ELISA consortium in the field of performance assessment. Two points are partic...

متن کامل

A Process for Developing the Statement of Internet Research Ethics based on Action Research Method

Background: Research ethics in cyberspace or Internet research ethics (IRE) is a subset of applied ethics that aims to study, introduce, and apply ethical codes for guiding research activities in cyberspace. The compilation of the ethical statement is based on two methods of documentary research and action research. The action research process is implemented in four stages: 1) diagnosis, 2) act...

متن کامل

A Proposed Security Framework for VoIP

VoIP stands for Voice over Internet Protocol and is a way to carry voice traffic over computer networks like the Internet. Over the last decade VoIP has become increasingly popular, gaining millions of subscribers every year (e.g. LINE and WECHAT provide voicecall facilities) and has certainly caught the eye of telecommunication service providers all over the world. The driving factor for the s...

متن کامل

A Framework for Secure VoIP

VoIP stands for Voice over Internet Protocol and is a way to carry voice traffic over computer networks like the Internet. Over the last decade VoIP has become increasingly popular, gaining millions of subscribers every year (e.g. LINE and WECHAT provide voicecall facilities) and has certainly caught the eye of telecommunication service providers all over the world. The driving factor for the s...

متن کامل

طراحی یک روش آموزش ناموازی جدید برای تبدیل گفتار با عملکردی بهتر از آموزش موازی

Introduction: The art of voice mimicking by computers, has with the computer have been one of the most challenging topics of speech processing in recent years. The system of voice conversion has two sides. In one side, the speaker is the source that his or her voice has been changed for mimicking the target speaker’s voice (which is on the other side). Two methods of p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Adv. Sig. Proc.

دوره 2004  شماره 

صفحات  -

تاریخ انتشار 2004