A Text-Independent Speaker Authentication System for Mobile Devices

This paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network...

Full description

Bibliographic Details
Main Authors: Florentin Thullier, Bruno Bouchard, Bob-Antoine J. Menelas
Format: Article
Language:English
Published: MDPI AG 2017-09-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/1/3/16
id doaj-e93ba73058c64114b4f11b947c362470
record_format Article
spelling doaj-e93ba73058c64114b4f11b947c3624702020-11-25T01:12:09ZengMDPI AGCryptography2410-387X2017-09-01131610.3390/cryptography1030016cryptography1030016A Text-Independent Speaker Authentication System for Mobile DevicesFlorentin Thullier0Bruno Bouchard1Bob-Antoine J. Menelas2Department of Computer Science and Mathematics, Université du Québec à Chicoutimi, Chicoutimi, QC G7H 2B1 CanadaDepartment of Computer Science and Mathematics, Université du Québec à Chicoutimi, Chicoutimi, QC G7H 2B1 CanadaDepartment of Computer Science and Mathematics, Université du Québec à Chicoutimi, Chicoutimi, QC G7H 2B1 CanadaThis paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network communication. Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier. Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand. To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments. Public speech corpora were also employed to compare this implementation to existing methods. Results were efficient regarding mobile resources’ consumption. The overall classification performance obtained was accurate with a small number of samples. Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism.https://www.mdpi.com/2410-387X/1/3/16speaker authenticationtext independentmobile devicesLPCCsnaive Bayesvoicesecurity
collection DOAJ
language English
format Article
sources DOAJ
author Florentin Thullier
Bruno Bouchard
Bob-Antoine J. Menelas
spellingShingle Florentin Thullier
Bruno Bouchard
Bob-Antoine J. Menelas
A Text-Independent Speaker Authentication System for Mobile Devices
Cryptography
speaker authentication
text independent
mobile devices
LPCCs
naive Bayes
voice
security
author_facet Florentin Thullier
Bruno Bouchard
Bob-Antoine J. Menelas
author_sort Florentin Thullier
title A Text-Independent Speaker Authentication System for Mobile Devices
title_short A Text-Independent Speaker Authentication System for Mobile Devices
title_full A Text-Independent Speaker Authentication System for Mobile Devices
title_fullStr A Text-Independent Speaker Authentication System for Mobile Devices
title_full_unstemmed A Text-Independent Speaker Authentication System for Mobile Devices
title_sort text-independent speaker authentication system for mobile devices
publisher MDPI AG
series Cryptography
issn 2410-387X
publishDate 2017-09-01
description This paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network communication. Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier. Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand. To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments. Public speech corpora were also employed to compare this implementation to existing methods. Results were efficient regarding mobile resources’ consumption. The overall classification performance obtained was accurate with a small number of samples. Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism.
topic speaker authentication
text independent
mobile devices
LPCCs
naive Bayes
voice
security
url https://www.mdpi.com/2410-387X/1/3/16
work_keys_str_mv AT florentinthullier atextindependentspeakerauthenticationsystemformobiledevices
AT brunobouchard atextindependentspeakerauthenticationsystemformobiledevices
AT bobantoinejmenelas atextindependentspeakerauthenticationsystemformobiledevices
AT florentinthullier textindependentspeakerauthenticationsystemformobiledevices
AT brunobouchard textindependentspeakerauthenticationsystemformobiledevices
AT bobantoinejmenelas textindependentspeakerauthenticationsystemformobiledevices
_version_ 1725168285208543232