A Text-Independent Speaker Authentication System for Mobile Devices
This paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2017-09-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | https://www.mdpi.com/2410-387X/1/3/16 |
id |
doaj-e93ba73058c64114b4f11b947c362470 |
---|---|
record_format |
Article |
spelling |
doaj-e93ba73058c64114b4f11b947c3624702020-11-25T01:12:09ZengMDPI AGCryptography2410-387X2017-09-01131610.3390/cryptography1030016cryptography1030016A Text-Independent Speaker Authentication System for Mobile DevicesFlorentin Thullier0Bruno Bouchard1Bob-Antoine J. Menelas2Department of Computer Science and Mathematics, Université du Québec à Chicoutimi, Chicoutimi, QC G7H 2B1 CanadaDepartment of Computer Science and Mathematics, Université du Québec à Chicoutimi, Chicoutimi, QC G7H 2B1 CanadaDepartment of Computer Science and Mathematics, Université du Québec à Chicoutimi, Chicoutimi, QC G7H 2B1 CanadaThis paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network communication. Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier. Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand. To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments. Public speech corpora were also employed to compare this implementation to existing methods. Results were efficient regarding mobile resources’ consumption. The overall classification performance obtained was accurate with a small number of samples. Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism.https://www.mdpi.com/2410-387X/1/3/16speaker authenticationtext independentmobile devicesLPCCsnaive Bayesvoicesecurity |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Florentin Thullier Bruno Bouchard Bob-Antoine J. Menelas |
spellingShingle |
Florentin Thullier Bruno Bouchard Bob-Antoine J. Menelas A Text-Independent Speaker Authentication System for Mobile Devices Cryptography speaker authentication text independent mobile devices LPCCs naive Bayes voice security |
author_facet |
Florentin Thullier Bruno Bouchard Bob-Antoine J. Menelas |
author_sort |
Florentin Thullier |
title |
A Text-Independent Speaker Authentication System for Mobile Devices |
title_short |
A Text-Independent Speaker Authentication System for Mobile Devices |
title_full |
A Text-Independent Speaker Authentication System for Mobile Devices |
title_fullStr |
A Text-Independent Speaker Authentication System for Mobile Devices |
title_full_unstemmed |
A Text-Independent Speaker Authentication System for Mobile Devices |
title_sort |
text-independent speaker authentication system for mobile devices |
publisher |
MDPI AG |
series |
Cryptography |
issn |
2410-387X |
publishDate |
2017-09-01 |
description |
This paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network communication. Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier. Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand. To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments. Public speech corpora were also employed to compare this implementation to existing methods. Results were efficient regarding mobile resources’ consumption. The overall classification performance obtained was accurate with a small number of samples. Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism. |
topic |
speaker authentication text independent mobile devices LPCCs naive Bayes voice security |
url |
https://www.mdpi.com/2410-387X/1/3/16 |
work_keys_str_mv |
AT florentinthullier atextindependentspeakerauthenticationsystemformobiledevices AT brunobouchard atextindependentspeakerauthenticationsystemformobiledevices AT bobantoinejmenelas atextindependentspeakerauthenticationsystemformobiledevices AT florentinthullier textindependentspeakerauthenticationsystemformobiledevices AT brunobouchard textindependentspeakerauthenticationsystemformobiledevices AT bobantoinejmenelas textindependentspeakerauthenticationsystemformobiledevices |
_version_ |
1725168285208543232 |