Active voice authentication
نویسندگان
چکیده
منابع مشابه
Statistical Modeling of Speaker's Voice with Temporal Co-Location for Active Voice Authentication
Active voice authentication (AVA) is a new mode of talker authentication, in which the authentication is performed continuously on very short segments of the voice signal, which may have instantaneously undergone change of talker. AVA is necessary in providing real-time monitoring of a device authorized for a particular user. The authentication test thus cannot rely on a long history of the voi...
متن کاملAudio Voice Authentication ( November 2004 )
In this present day of vast technological advances that demand the highest security possible to protect legitimate users and their data from impostors, current security technologies may not prove to be sufficient. The current, widely used authentication schemes are based upon the establishment of one’s identity by “what he has” and “what he knows” – the most common example of such is the bank c...
متن کاملLiveness Assurance in Voice Authentication
The process of verifying whether the voice sample presented to an authentication system is real (i.e., alive), or whether it is replayed or synthetic, and thus fraudulent. When authentication through a voice authentication system is requested, it is important to be sure that the person seeking the authentication actually provides the required voice sample at the time and place of the authentica...
متن کاملVoice Biometrics for User Authentication
Voice biometrics for user authentication is a task in which the goal is to perform convenient, robust and secure authentication of speakers. In this work we investigate the use of state-of-theart text-independent and text-dependent speaker verification technology for user authentication. We evaluate three different authentication conditions: global digit strings, speaker specific digit stings a...
متن کاملSecure voice based authentication for mobile devices: Vaulted Voice Verification
As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital Signal Processing
سال: 2020
ISSN: 1051-2004
DOI: 10.1016/j.dsp.2020.102672