Fuzzy Methods for Voice-Based Person Authentication
نویسندگان
چکیده
منابع مشابه
Person authentication by voice: a need for caution
Because of recent events and as members of the scientific community working in the field of speech processing, we feel compelled to publicize our views concerning the possibility of identifying or authenticating a person from his or her voice. The need for a clear and common message was indeed shown by the diversity of information that has been circulating on this matter in the media and genera...
متن کاملA voice verifier for face/voice based person verification system
A person verification system based on voice and facial images has been developed within CSIRO Telecommunications and Industrial Physics, Australia, for use in low-to-medium security systems. It provides a unique ID, which is non-intrusive, fast, and has no need for memorising passwords. A stand-alone version of the voice verifier has an error rate of less than 8%, while the face verifier has an...
متن کاملHybrid Biometric Person Authentication Using Face and Voice Features
In this paper, a hybrid person authentication prototype integrating multiple biometric devices is presented. This prototype is based on several levels of abstractions: data representations, vectors and classifiers. Frontal face and text -dependent voice biometrics are chosen to authenticate a user. For each of the biometric feature, an extractor, a classifier and a simple negotiation scheme hav...
متن کاملFacial Expression based Person Authentication
High quality automatic facial expression based person authentication system is practically difficult mainly due to poses in face. This work paves way to develop a more perfect automatic person authentication system using facial expressions. In this work, ways to extract automatically pose free face images from video taken in normal room condition, determining mouth region, extracting features a...
متن کاملFacial Movement Based Person Authentication
In this position paper, we present an authentication method using spatial temporal facial movements. Facial movements are defined by a facial coding system and are obtained by making a facial expression in front of a 3D camera. Facial muscle movements are impossible to be replicated, thus our method is invulnerable to spoofing attacks. We briefly discuss our current work and present preliminary...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEJ Transactions on Electronics, Information and Systems
سال: 2004
ISSN: 0385-4221,1348-8155
DOI: 10.1541/ieejeiss.124.1958