2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW) 2016
DOI: 10.1109/icdmw.2016.0155
|View full text |Cite
|
Sign up to set email alerts
|

Fraud Detection in Voice-Based Identity Authentication Applications and Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
2

Relationship

3
7

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…In this work, the use of the Voxforge Spanish dataset raises some privacy concerns, since the donors accepted that their voices are part of a database destined to create language technologies however while maintaining anonymity. On the other hand, due to the type of information provided by each donor (mainly a personalised username), it could be easy to identify some of them and performing actions against them like identity fraud in certain speech systems [37]. Fortunately, some of this concerns were contemplated by the developers of the Voxforge datasets which allowed and option to opt-out, however it could hardly be enforced for all distributed copies [38].…”
Section: Ethical Discussionmentioning
confidence: 99%
“…In this work, the use of the Voxforge Spanish dataset raises some privacy concerns, since the donors accepted that their voices are part of a database destined to create language technologies however while maintaining anonymity. On the other hand, due to the type of information provided by each donor (mainly a personalised username), it could be easy to identify some of them and performing actions against them like identity fraud in certain speech systems [37]. Fortunately, some of this concerns were contemplated by the developers of the Voxforge datasets which allowed and option to opt-out, however it could hardly be enforced for all distributed copies [38].…”
Section: Ethical Discussionmentioning
confidence: 99%
“…For classification purposes we have used multiple functions provided by the Weka toolkit 2 . We have tried logistic classifier, decision tree, and multilayer perceptron (MLP) [14], [15], [16], [17].…”
Section: B Modeling Methodsmentioning
confidence: 99%
“…About countermeasure and machine learning, the machine learning algorithm of article [12] could be used to find out the best hamming distance redistribution mapping by using neural dynamic programming. Safavi et al [13] researched the fraud detection in voice-based identity authentication applications and services. In article [14], based on maximum entropy clustering, two specialized criteriainter-view collaborative learning and intra-view weighted attributes are first devised as the bases.…”
Section: Introductionmentioning
confidence: 99%