2013
DOI: 10.1080/19393555.2013.801539
|View full text |Cite
|
Sign up to set email alerts
|

Remote User Authentication Using a Voice Authentication System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 1 publication
0
2
0
1
Order By: Relevance
“…Scholars have done a lot of optimizations based on I-Vector, including Linear Discriminant Analysis (LDA), Linear Predictive Discriminant analysis (PLDA), Metric Learning, and so on [3]. X-Vector is based on Deep Neural Network (DNN) [9], [13], which can abstract voice features from a large number of samples. DNN can accurately obtain a user's voiceprint information by using a speech with about 10 seconds and can strongly resist noise interference with high robustness.…”
Section: A Voiceprint Recognitionmentioning
confidence: 99%
“…Scholars have done a lot of optimizations based on I-Vector, including Linear Discriminant Analysis (LDA), Linear Predictive Discriminant analysis (PLDA), Metric Learning, and so on [3]. X-Vector is based on Deep Neural Network (DNN) [9], [13], which can abstract voice features from a large number of samples. DNN can accurately obtain a user's voiceprint information by using a speech with about 10 seconds and can strongly resist noise interference with high robustness.…”
Section: A Voiceprint Recognitionmentioning
confidence: 99%
“…There are many methods proposed to perform morphing detection. In order to detect Face Morphing Forgery (FMF) attacks, in [96], Neubert et al proposed a novel three-fold definition (visual, biometric and forensic qualities) for the quality of morphed images to improve morphing detection. In addition, Neubert et al introduced a novel FMF realization method in order to improve visual and biometric quality.…”
Section: Replay Attack Defensementioning
confidence: 99%
“…In addition, voice recognition is often combined with other technologies to realize liveness detection and enhance system security. For example, Kaman et al [96] designed a practical authentication system for remote online banking. When a user is trying to login, a remote server will give a phone call to the user and ask he or she to record voice.…”
Section: Replay Attack Defensementioning
confidence: 99%
“…This ranges from the use of physical features (including voiceprints, fingerprints and iris recognition) to behavioural features (including gait and handwriting recognition). Biometrics is inherently difficult to copy, share and distribute; difficult to forge; and importantly cannot be lost or forgotten because the individual has to be physically present (Kaman et al, 2013;Tassabehji and Kamala, 2012). Keystroke dynamics, a type of biometrics which also uses a behavioural trait unique to a user, is a technology that ensures that the user, post-authentication, is indeed the user authenticated (Pisani and Lorena, 2013).…”
Section: User Authenticationmentioning
confidence: 99%