2013
DOI: 10.1117/12.2015649
|View full text |Cite
|
Sign up to set email alerts
|

Secure voice-based authentication for mobile devices: vaulted voice verification

Abstract: As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…(Arakala et al, 2007), (Fan and Lin, 2009), (Jin et al, 2012), (Kaizhi and Aiqun, 2013), (Li et al, 2012), (Nagar et al, 2010), (Teoh and Kim, 2007), , (Yang et al, 2014) use error correction codes on the biometric. (Bringer et al, 2012), (Johnson et al, 2013b), (Nandakumar et al, 2007), (Scheirer and Boult, 2009) use error correction codes to correct a message as part the authentication process.…”
Section: Error Correcting Codesmentioning
confidence: 99%
See 2 more Smart Citations
“…(Arakala et al, 2007), (Fan and Lin, 2009), (Jin et al, 2012), (Kaizhi and Aiqun, 2013), (Li et al, 2012), (Nagar et al, 2010), (Teoh and Kim, 2007), , (Yang et al, 2014) use error correction codes on the biometric. (Bringer et al, 2012), (Johnson et al, 2013b), (Nandakumar et al, 2007), (Scheirer and Boult, 2009) use error correction codes to correct a message as part the authentication process.…”
Section: Error Correcting Codesmentioning
confidence: 99%
“…Public key cryptography is used in , (Fan and Lin, 2009), (Johnson et al, 2013b), (Li et al, 2013), , (Scheirer and Boult, 2009). …”
Section: Public Key Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are several possible applications for the methods found in this report, among those contemplated are voice biometrics as a means of user authentication [13], [9], [6], pitch detection as a means of measuring note accuracy in karaoke singing [12], a pitch corrector as a voice effect [15], [3], generating various voices from a template voice track [2], or the voice harmonizer which was implemented.…”
Section: Introductionmentioning
confidence: 99%
“…In [5], smartphone user identity was presented where gait characterization was used and the same idea can be used with voice analysis. Again in [6], voice-based authentication for the purpose of application in mobile phones was discussed. Large systems need huge databases where samples and data will be kept.…”
Section: Introductionmentioning
confidence: 99%