2019 IEEE SmartWorld, Ubiquitous Intelligence &Amp; Computing, Advanced &Amp; Trusted Computing, Scalable Computing &Amp; Commu 2019
DOI: 10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00243
|View full text |Cite
|
Sign up to set email alerts
|

My Voiceprint Is My Authenticator: A Two-Layer Authentication Approach Using Voiceprint for Voice Assistants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Chang [127] proposed a two-layer authentication method using a voiceprint to mitigate replay attacks. Similarly, the VoiceLive system addressed a replay attack using extracts of the TDoA of each phoneme sound to distinguish between a passphrase spoken by a live user and a replayed one.…”
Section: Securitymentioning
confidence: 99%
“…Chang [127] proposed a two-layer authentication method using a voiceprint to mitigate replay attacks. Similarly, the VoiceLive system addressed a replay attack using extracts of the TDoA of each phoneme sound to distinguish between a passphrase spoken by a live user and a replayed one.…”
Section: Securitymentioning
confidence: 99%
“…This is analogous to two-factor authentication, in that the phrase identification (PID) and the speaker identification (SID), both, have to match for the user to gain access. The applications of TD-ASV include, but are not limited to, biometric verification in healthcare [1], banking, forensics [2], and privacy protection in personalized voice-assistants [3].…”
Section: Introductionmentioning
confidence: 99%