Active voice authentication

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Statistical Modeling of Speaker's Voice with Temporal Co-Location for Active Voice Authentication

Active voice authentication (AVA) is a new mode of talker authentication, in which the authentication is performed continuously on very short segments of the voice signal, which may have instantaneously undergone change of talker. AVA is necessary in providing real-time monitoring of a device authorized for a particular user. The authentication test thus cannot rely on a long history of the voi...

متن کامل

Audio Voice Authentication ( November 2004 )

In this present day of vast technological advances that demand the highest security possible to protect legitimate users and their data from impostors, current security technologies may not prove to be sufficient. The current, widely used authentication schemes are based upon the establishment of one’s identity by “what he has” and “what he knows” – the most common example of such is the bank c...

متن کامل

Liveness Assurance in Voice Authentication

The process of verifying whether the voice sample presented to an authentication system is real (i.e., alive), or whether it is replayed or synthetic, and thus fraudulent. When authentication through a voice authentication system is requested, it is important to be sure that the person seeking the authentication actually provides the required voice sample at the time and place of the authentica...

متن کامل

Voice Biometrics for User Authentication

Voice biometrics for user authentication is a task in which the goal is to perform convenient, robust and secure authentication of speakers. In this work we investigate the use of state-of-theart text-independent and text-dependent speaker verification technology for user authentication. We evaluate three different authentication conditions: global digit strings, speaker specific digit stings a...

متن کامل

Secure voice based authentication for mobile devices: Vaulted Voice Verification

As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital Signal Processing

سال: 2020

ISSN: 1051-2004

DOI: 10.1016/j.dsp.2020.102672