Active Voice Authentication

04/25/2020
by   Zhong Meng, et al.
0

Active authentication refers to a new mode of identity verification in which biometric indicators are continuously tested to provide real-time or near real-time monitoring of an authorized access to a service or use of a device. This is in contrast to the conventional authentication systems where a single test in form of a verification token such as a password is performed. In active voice authentication (AVA), voice is the biometric modality. This paper describes an ensemble of techniques that make reliable speaker verification possible using unconventionally short voice test signals. These techniques include model adaptation and minimum verification error (MVE) training that are tailored for the extremely short training and testing requirements. A database of 25 speakers is recorded for developing this system. In our off-line evaluation on this dataset, the system achieves an average windowed-based equal error rates of 3-4 considering that only 1 second of voice data is used to make every single authentication decision. On the NIST SRE 2001 Dataset, the system provides a 3.88 second. A real-time demonstration system has been implemented on Microsoft Surface Pro.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/05/2019

V2S attack: building DNN-based voice conversion from automatic speaker verification

This paper presents a new voice impersonation attack using voice convers...
research
05/31/2020

Evaluation of biometric user authentication using an ensemble classifier with face and voice recognition

This paper presents a biometric user authentication system based on an e...
research
11/30/2012

Secure voice based authentication for mobile devices: Vaulted Voice Verification

As the use of biometrics becomes more wide-spread, the privacy concerns ...
research
09/09/2022

Defend Data Poisoning Attacks on Voice Authentication

With the advances in deep learning, speaker verification has achieved ve...
research
06/16/2020

A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication

Modern browsers give access to several attributes that can be collected ...
research
09/21/2023

t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators

Presentation attack (spoofing) detection (PAD) typically operates alongs...
research
09/15/2020

When Automatic Voice Disguise Meets Automatic Speaker Verification

The technique of transforming voices in order to hide the real identity ...

Please sign up or login with your details

Forgot password? Click here to reset