2017
DOI: 10.1007/978-3-319-52464-1_8
|View full text |Cite
|
Sign up to set email alerts
|

Speaker Authentication System Based on Voice Biometrics and Speech Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Because of the unique and hard-forged characteristics of human biology, biometrics has emerged as a novel and robust technology in many verification tasks. At present, biometric verification methods based on fingerprint [ 22 ], face [ 23 ], and voice [ 24 ] have been used widely and proved to have relatively high accuracy. Yet, recent study showed that the above methods forged security risks [ 9 , 25 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Because of the unique and hard-forged characteristics of human biology, biometrics has emerged as a novel and robust technology in many verification tasks. At present, biometric verification methods based on fingerprint [ 22 ], face [ 23 ], and voice [ 24 ] have been used widely and proved to have relatively high accuracy. Yet, recent study showed that the above methods forged security risks [ 9 , 25 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Nowadays, speaker verification has become a crucial task in many applications, such as security, authentication, surveillance, forensics, multi-speaker tracking, personalized user interfaces, voice assistants, door access control systems and others [4][5][6][7]. Nonetheless, the most important capability of speaker verification is the ability to identify and distinguish between different speakers accurately to be able to pinpoint a specific speaker.…”
Section: Introductionmentioning
confidence: 99%
“…Compared to the highlighted properties in related areas, such as the undetectability in steganography [4] and the amount capacity in data hiding [5], an image watermarking scheme often considers the robustness that ensures correct watermark extraction and recognition when the marked-image is distorted or disturbed. Audio watermarks: From the aspect of applications, an audio watermark facilitates different downstream scenarios by providing multiple information, for example, two-factor authentication [6], [7] by providing the speaker and content information. For research investigation, there is quite a number of work that separately focused on cover-image and cover-audio watermarking [8]- [10].…”
Section: Introductionmentioning
confidence: 99%