New Developments in Voice Biometrics for User Authentication

被引:0
|
作者
Aronowitz, Hagai [1 ]
Hoory, Ron [1 ]
Pelecanos, Jason
Nahamoo, David
机构
[1] IBM Res Haifa, Haifa, Israel
关键词
Speaker verification; speaker recognition; text dependent; text independent; HMM supervectors;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Voice biometrics for user authentication is a task in which the object is to perform convenient, robust and secure authentication of speakers. In this work we investigate the use of state-of-the-art text-independent and text-dependent speaker verification technology for user authentication. We evaluate four different authentication conditions: speaker specific digit stings, global digit strings, prompted digit strings, and text-independent. Harnessing the characteristics of the different types of conditions can provide benefits such as authentication transparent to the user (convenience), spoofing robustness (security) and improved accuracy (reliability). The systems were evaluated on a corpus collected by Wells Fargo Bank which consists of 750 speakers. We show how to adapt techniques such as joint factor analysis (JFA), Gaussian mixture models with nuisance attribute projection (GMM-NAP) and hidden Markov models with NAP (HMM-NAP) to obtain improved results for new authentication scenarios and environments.
引用
收藏
页码:24 / +
页数:2
相关论文
共 50 条
  • [1] User authentication in mobile telecommunication environments using voice biometrics and smartcards
    Lapere, M
    Johnson, E
    [J]. INTELLIGENCE IN SERVICES AND NETWORKS: TECHNOLOGY FOR COOPERATIVE COMPETITION, 1997, 1238 : 437 - 443
  • [2] Multimodal Biometrics for User Authentication
    Parkavi, R.
    Babu, K. R. Chandeesh
    Kumar, J. Ajeeth
    [J]. PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 501 - 505
  • [3] Trust and Voice Biometrics Authentication for Internet of Things
    Wells, Alec
    Usman, Aminu Bello
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2023, 17 (01)
  • [4] User authentication through typing biometrics features
    Araújo, LCF
    Sucupira, LHR
    Lizárraga, MG
    Ling, LL
    Yabu-Uti, JBT
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) : 851 - 855
  • [5] A behaviour biometrics dataset for user identification and authentication
    Nnamoko, Nonso
    Barrowclough, Joseph
    Liptrott, Mark
    Korkontzelos, Ioannis
    [J]. DATA IN BRIEF, 2022, 45
  • [6] A flexible biometrics remote user authentication scheme
    Lin, CH
    Lai, YY
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 27 (01) : 19 - 23
  • [7] Comparing passwords, tokens, and biometrics for user authentication
    Esch, J
    [J]. PROCEEDINGS OF THE IEEE, 2003, 91 (12) : 2019 - 2020
  • [8] User authentication through typing biometrics features
    Araújo, LCF
    Sucupira, LHR
    Lizárraga, MG
    Ling, LL
    Yabu-uti, JBT
    [J]. BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 694 - 700
  • [9] Remote User Authentication Using a Voice Authentication System
    Kaman, Shilpa
    Swetha, K.
    Akram, Syed
    Varaprasad, G.
    [J]. INFORMATION SECURITY JOURNAL, 2013, 22 (03): : 117 - 125
  • [10] A Concept of Continuous User Authentication Based on Behavioral Biometrics
    Eremin, Aleksandr
    Kogos, Konstantin
    Filina, Alina
    [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 62 - 68