Next Article in Journal
Leveraging Distributions in Physical Unclonable Functions
Next Article in Special Issue
A Cryptographic System Based upon the Principles of Gene Expression
Previous Article in Journal
Beyond Bitcoin: A Critical Look at Blockchain-Based Systems
Article Menu

Export Article

Open AccessArticle
Cryptography 2017, 1(3), 16;

A Text-Independent Speaker Authentication System for Mobile Devices

Department of Computer Science and Mathematics, Université du Québec à Chicoutimi, Chicoutimi, QC G7H 2B1 Canada
Authors to whom correspondence should be addressed.
Received: 6 July 2017 / Revised: 12 September 2017 / Accepted: 19 September 2017 / Published: 22 September 2017
(This article belongs to the Special Issue Biometric and Bio-inspired Approaches in Cryptography)
Full-Text   |   PDF [854 KB, uploaded 25 September 2017]   |  


This paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network communication. Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier. Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand. To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments. Public speech corpora were also employed to compare this implementation to existing methods. Results were efficient regarding mobile resources’ consumption. The overall classification performance obtained was accurate with a small number of samples. Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism. View Full-Text
Keywords: speaker authentication; text independent; mobile devices; LPCCs; naive Bayes; voice; security speaker authentication; text independent; mobile devices; LPCCs; naive Bayes; voice; security

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Thullier, F.; Bouchard, B.; Menelas, B.-A.J. A Text-Independent Speaker Authentication System for Mobile Devices. Cryptography 2017, 1, 16.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics



[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top