Next Article in Journal
Leveraging Distributions in Physical Unclonable Functions
Next Article in Special Issue
A Cryptographic System Based upon the Principles of Gene Expression
Previous Article in Journal
Beyond Bitcoin: A Critical Look at Blockchain-Based Systems
Article

A Text-Independent Speaker Authentication System for Mobile Devices

Department of Computer Science and Mathematics, Université du Québec à Chicoutimi, Chicoutimi, QC G7H 2B1 Canada
*
Authors to whom correspondence should be addressed.
Cryptography 2017, 1(3), 16; https://doi.org/10.3390/cryptography1030016
Received: 6 July 2017 / Revised: 12 September 2017 / Accepted: 19 September 2017 / Published: 22 September 2017
(This article belongs to the Special Issue Biometric and Bio-inspired Approaches in Cryptography)
This paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network communication. Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier. Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand. To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments. Public speech corpora were also employed to compare this implementation to existing methods. Results were efficient regarding mobile resources’ consumption. The overall classification performance obtained was accurate with a small number of samples. Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism. View Full-Text
Keywords: speaker authentication; text independent; mobile devices; LPCCs; naive Bayes; voice; security speaker authentication; text independent; mobile devices; LPCCs; naive Bayes; voice; security
Show Figures

Figure 1

MDPI and ACS Style

Thullier, F.; Bouchard, B.; Menelas, B.-A.J. A Text-Independent Speaker Authentication System for Mobile Devices. Cryptography 2017, 1, 16. https://doi.org/10.3390/cryptography1030016

AMA Style

Thullier F, Bouchard B, Menelas B-AJ. A Text-Independent Speaker Authentication System for Mobile Devices. Cryptography. 2017; 1(3):16. https://doi.org/10.3390/cryptography1030016

Chicago/Turabian Style

Thullier, Florentin; Bouchard, Bruno; Menelas, Bob-Antoine J. 2017. "A Text-Independent Speaker Authentication System for Mobile Devices" Cryptography 1, no. 3: 16. https://doi.org/10.3390/cryptography1030016

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop