2008 International Conference on Computational Intelligence and Security 2008
DOI: 10.1109/cis.2008.49
|View full text |Cite
|
Sign up to set email alerts
|

Cancelable Voiceprint Template Based on Chaff-Points-Mixture Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…The use of template Protection methods for voice can be found in two studies by the same authors [12,13]. Both are classified as biometric cryptosystems, since the original voice data is recovered in order to be used in the authentication systems.…”
Section: Recent Studies In Cancellable Biometricsmentioning
confidence: 99%
See 2 more Smart Citations
“…The use of template Protection methods for voice can be found in two studies by the same authors [12,13]. Both are classified as biometric cryptosystems, since the original voice data is recovered in order to be used in the authentication systems.…”
Section: Recent Studies In Cancellable Biometricsmentioning
confidence: 99%
“…In the second work [12], a method based on chaff points has been proposed. In the proposed method, firstly, the MFCC (Mel-Frequency Cepstrum Coeffecents) feature matrix and stochastic matrix are expanded by inserting zero rows.…”
Section: Recent Studies In Cancellable Biometricsmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the fuzzy vault scheme [11], Xu et al [12] proposed a cancellable voice template protection. Chaff points are added to the Mel Frequency Cepstral Coefficient-MFCC matrix to compose a vault and to make hard for an adversary the separation of genuine points from the MFCC.…”
Section: Related Workmentioning
confidence: 99%
“…Another cancelable biometric system was introduced in [5], which depend on a fuzzy vault scheme. A biometric protection based on adding chaff points to the Mel frequency Cepstral coefficient (MFCC) vector to align difficult for attackers to separate of actual points from MFCC was suggested in [6]. Although, the authentication at the receiver has complexity with separating the chaff points and has not able to compare between templates in transform domain.…”
Section: Introductionmentioning
confidence: 99%