2015 17th International Conference on Advanced Communication Technology (ICACT) 2015
DOI: 10.1109/icact.2015.7224867
|View full text |Cite
|
Sign up to set email alerts
|

Home IoT device certification through speaker recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…Studies on speaker verification [20]- [26] compare the voice of a speaker with that of a pre-registered person for authentication. Speaker verification is used for Internet of things (IoT) device authentication [27], network security [28], and user authentication [29]. For example, the literature [26] combines mel-frequency cepstral coefficients (MFCC) and linear predictive coding (LPC) to improve the performance of speaker verification for low-quality input speech signals.…”
Section: A Speaker Recognition Using Stationary Devicementioning
confidence: 99%
“…Studies on speaker verification [20]- [26] compare the voice of a speaker with that of a pre-registered person for authentication. Speaker verification is used for Internet of things (IoT) device authentication [27], network security [28], and user authentication [29]. For example, the literature [26] combines mel-frequency cepstral coefficients (MFCC) and linear predictive coding (LPC) to improve the performance of speaker verification for low-quality input speech signals.…”
Section: A Speaker Recognition Using Stationary Devicementioning
confidence: 99%
“…To the best of our knowledge, there are only two researchers who adopted voice biometrics as an authentication mechanism for the IoT ecosystem. Shin and Jun [33] have implemented voice recognition technology to verify authorized users for controlling and monitoring an automated home environment. The researcher proposed a voice recognition system that is divided into server and device parts.…”
Section: Related Workmentioning
confidence: 99%
“…As research in home IoT intensifies, many studies are being done on user recognition. Although user recognition using image processing such as facial recognition and also voice recognition [7,18,19] has been extensively studied, problems exist that are likely to cause errors depending on the conditions, including camera angle, the shape of the user’s head, and the user’s physical condition. Many studies have addressed these concerns, including studies on proximity-based neighbor identification protocol (PNIP) [12,20], which detects a low frequency device and transmits an advertising signal with the user’s ID, and radio-frequency identification passive (RFID passive) [21], a system that uses specific device and radio frequency (RF) to identify the user.…”
Section: Related Researchmentioning
confidence: 99%
“…In particular, smart-home technology for the elderly has the potential to improve the quality of life in an aging society. IoT smart-home service for specific users such as senior citizens and dementia patients [6,7] should be able to distinguish between seniors who need customized services and other family members who need only regular services. Therefore, it is necessary to accurately determine who is in need of a service in real time and to provide enhanced services accordingly.…”
Section: Introductionmentioning
confidence: 99%