Skip to main content

Cryptographic-Speech-Key Generation Using the SVM Technique over the lp-Cepstral Speech Space

  • Conference paper
Book cover Nonlinear Speech Modeling and Applications (NN 2004)

Abstract

In this research we propose a new scheme for generating binary vectors, which can be used as keys for cryptographic purposes. These vectors are obtained from the speech signal and from the spoken user passphrase. The key bits are built using the Automatic Speech Recognition Technology to detect the phoneme limits in the speech utterance and the Support Vector Machines technique for classification. Linear prediction cepstral coefficients, (first and second derivatives) of the speech signal are calculated to create a 39-dimensional hyperspace. Then a hyperplane is created using an RBF kernel, and the SVM classifies the user’s phonemes. Applying our method to a set of 10, 20, 30 and 50 speakers from the YOHO database, the results show that this method is sufficiently robust to reliably regenerate the cryptographic key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boser, B., Guyon, I., Vapnik, V.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory (1992)

    Google Scholar 

  2. Campbell Jr, J.P.: Features and Measures for Speaker Recognition. Ph.D. Dissertation, Oklahoma State University (1992)

    Google Scholar 

  3. Cortes, C., Vapnik, V.: Support-vector network. Machine Learning 20, 273–297 (1995)

    MATH  Google Scholar 

  4. Higgins, A., Porter, J., Bahler, L.: YOHO Speaker Authentication Final Report. ITT Defense Communications Division (1989)

    Google Scholar 

  5. Young, S.P.: Woodland HTK Hidden Markov Model Toolkit home page, http://htk.eng.cam.ac.uk/

  6. Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation From Voice. In: Proceedings of the IEEE Conference on Security and Privacy, Oakland, CA (May 2001)

    Google Scholar 

  7. Osuna, E., Freund, R., Girosi, F.: Support vector machines: Training and applications. Technical Report AIM-1602, MIT A.I. Lab (1996)

    Google Scholar 

  8. Osuna, E., Freund, R., Girosi, F.: Training Support Vector Machines: An Application to Face Recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 130–136 (1997)

    Google Scholar 

  9. Rabiner, L.R., Juang, B.-H.: Fundamentals of speech recognition. Prentice-Hall, New-Jersey (1993)

    Google Scholar 

  10. Joachims, T.: SVMLight: Support Vector Machine, SVM-Light Support Vector Machine, University of Dortmund (November 1999), http://svmlight.joachims.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

García-Perera, P.L., Mex-Perera, C., Nolazco-Flores, J.A. (2005). Cryptographic-Speech-Key Generation Using the SVM Technique over the lp-Cepstral Speech Space. In: Chollet, G., Esposito, A., Faundez-Zanuy, M., Marinaro, M. (eds) Nonlinear Speech Modeling and Applications. NN 2004. Lecture Notes in Computer Science(), vol 3445. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11520153_20

Download citation

  • DOI: https://doi.org/10.1007/11520153_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27441-4

  • Online ISBN: 978-3-540-31886-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics