2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS) 2013
DOI: 10.1109/btas.2013.6712713
|View full text |Cite
|
Sign up to set email alerts
|

Voice authentication using short phrases: Examining accuracy, security and privacy issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Also, the verification of the content of the spoken phrase can serve as a form of security against replay attacks, as older phrases cannot be reused. Another variation of this scheme is to challenge the users with various questions and use voice responses to extract both context information and voice print to enhance system's performance and increase security against replay attacks [158]. An interesting attack vector for M-V-B schemes is computerized imitation [156] (either by targeted impersonation or physical observation).…”
Section: M-v-b Schemes: Text-independent Speaker Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, the verification of the content of the spoken phrase can serve as a form of security against replay attacks, as older phrases cannot be reused. Another variation of this scheme is to challenge the users with various questions and use voice responses to extract both context information and voice print to enhance system's performance and increase security against replay attacks [158]. An interesting attack vector for M-V-B schemes is computerized imitation [156] (either by targeted impersonation or physical observation).…”
Section: M-v-b Schemes: Text-independent Speaker Authenticationmentioning
confidence: 99%
“…This concept was introduced in a system called "text-constrained" speaker recognition [166]. Another example of this is to use a challengeresponse based authentication protocol where the model is created based on a limited number of short-phrases [158]. In whisper authentication, one important question to address is its usability: is it convenient and non-intrusive to use?…”
Section: Avenues For Researchmentioning
confidence: 99%
“…Vaulted Voice Verification, introduced in [15] and expanded on in [16], is a voice-based extension of a technique called Vaulted Verification, which was developed for privacy and security enhanced biometric identification [2,17]. Vaulted Voice Verification is an extension of the Vaulted Verification concept, combining it with with technology for speaker identification and with recognition techniques from the voice community [18,19,20,21].…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…There have been several variations of the VV protocol over the years, including extensions to iris [26], fingerprint [2], and voice [12,11,10] biometrics. The latter extensions incorporated public key cryptography, and reduced communication overhead by using index tables.…”
Section: Introductionmentioning
confidence: 99%