2016
DOI: 10.1007/s11042-016-3350-1
|View full text |Cite
|
Sign up to set email alerts
|

Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition

Abstract: (QIM) are used to embed the watermark in an angle of the wavelet's sub-bands where more speaker specific information is available. For copyright protection of the speech, a blind and robust speech watermarking are used by applying DWPT and multiplication. Where less speaker specific information is available the robust watermark is embedded through manipulating the amplitude of the wavelet's sub-bands. Experimental results on TIMIT, MIT, and MOBIO demonstrate that there is a trade-off among recognition performa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…Due to the introduction of the IoT service, users can also interactively control other devices in the 5G network, such as controlling the startup of the home appliance in the smart home scenario, so stricter authentication methods, such as biometric authentication, are required to ensure that the identity is true. Besides, there are a large number of authentication schemes based on the same authentication factors proposed in [10][11][12][13][14]. ese schemes can achieve efficient and highstrength entity authentication, but cannot complete dynamic multifactor authentication which can adjust the security strength in the 5G multiservice network.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the introduction of the IoT service, users can also interactively control other devices in the 5G network, such as controlling the startup of the home appliance in the smart home scenario, so stricter authentication methods, such as biometric authentication, are required to ensure that the identity is true. Besides, there are a large number of authentication schemes based on the same authentication factors proposed in [10][11][12][13][14]. ese schemes can achieve efficient and highstrength entity authentication, but cannot complete dynamic multifactor authentication which can adjust the security strength in the 5G multiservice network.…”
Section: Related Workmentioning
confidence: 99%
“…Nematollahi et al [13] has developed a Multi factor authentication by a combination of OTP (One Time Password), PIN and a speaker biometric through the speech watermarks. The proposed authentication scheme approves security against communication and spoofing attack.…”
Section: Related Studymentioning
confidence: 99%
“…Nematollahiet al [19] has developed a scheme called Multi factor authentication by a combination of OTP (One Time Password) and PIN (Personal Identification Number) and a speaker biometric through the speech watermarks. The proposed authentication scheme approves security against communication and spoofing attack.…”
Section: Prosanta Gope Et Al (2018) Rfid Authentication Schemementioning
confidence: 99%