A Text-Independent Speaker Authentication System for Mobile Devices
AbstractThis paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network communication. Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier. Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand. To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments. Public speech corpora were also employed to compare this implementation to existing methods. Results were efficient regarding mobile resources’ consumption. The overall classification performance obtained was accurate with a small number of samples. Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism. View Full-Text
Scifeed alert for new publicationsNever miss any articles matching your research from any publisher
- Get alerts for new papers matching your research
- Find out the new papers from selected authors
- Updated daily for 49'000+ journals and 6000+ publishers
- Define your Scifeed now
Thullier, F.; Bouchard, B.; Menelas, B.-A.J. A Text-Independent Speaker Authentication System for Mobile Devices. Cryptography 2017, 1, 16.
Thullier F, Bouchard B, Menelas B-AJ. A Text-Independent Speaker Authentication System for Mobile Devices. Cryptography. 2017; 1(3):16.Chicago/Turabian Style
Thullier, Florentin; Bouchard, Bruno; Menelas, Bob-Antoine J. 2017. "A Text-Independent Speaker Authentication System for Mobile Devices." Cryptography 1, no. 3: 16.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.