Phoneme Spotting for Speech-Based Crypto-key Generation

  • L. Paola García-Perera
  • Juan A. Nolazco-Flores
  • Carlos Mex-Perera
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3773)

Abstract

In this research we propose to use phoneme spotting to improve the results in the generation of a cryptographic key. Phoneme spotting selects the phonemes with highest accuracy in the user classification task. The key bits are constructed by using the Automatic Speech Recognition and Support Vector Machines. Firstly, a speech recogniser detects the phoneme limits in each speech utterance. Afterwards, the support vector machine performs a user classification and generates a key. By selecting the highest accuracy phonemes for a a set of 10, 20, 30 and 50 speakers randomly chosen from the YOHO database, it is possible to generate reliable cryptographic keys.

Keywords

Support Vector Machine Hide Markov Model Support Vector Machine Model Automatic Speech Recognition Speech Recogniser 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Boser, B., Guyon, I., Vapnik, V.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory (1992)Google Scholar
  2. 2.
    Campbell, J.P.: Jr.: Features and Measures for Speaker Recognition. Ph.D. Dissertation, Oklahoma State University (1992)Google Scholar
  3. 3.
    Cortes, C., Vapnik, V.: Support-vector network. Machine Learning 20, 273–297 (1995)MATHGoogle Scholar
  4. 4.
    Higgins, A., Porter, J.,, J.: Bahler L.: YOHO Speaker Authentication Final Report. ITT Defense Communications Division (1989)Google Scholar
  5. 5.
    Young, S., Woodland, P.: HTK Hidden Markov Model Toolkit home page, http://htk.eng.cam.ac.uk/
  6. 6.
    Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation From Voice. In: Proceedings of the IEEE Conference on Security and Privacy, Oakland, CA (2001)Google Scholar
  7. 7.
    Osuna, E.: Freund R., and Girosi F.: Support vector machines: Training and applications. Technical Report AIM-1602, MIT A.I. Lab (1996)Google Scholar
  8. 8.
    Osuna, E.: Training Support Vector Machines: An Application to Face Recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 130–136 (1997)Google Scholar
  9. 9.
    Furui, S.: Digital Speech Processing, Synthesis, and Recognition. Mercel Dekker, Inc., New York (2001)Google Scholar
  10. 10.
    Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257–286 (1989)CrossRefGoogle Scholar
  11. 11.
    Rabiner, L.R., Juang, B.-H.: Fundamentals of speech recognition. Prentice-Hall, New-Jersey (1993)Google Scholar
  12. 12.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6) (2004)Google Scholar
  13. 13.
    Lee, K., Hon, H., Reddy, R.: An overview of the SPHINX speech recognition system. IEEE Transactions on Acoustics, Speech and Signal Processing 38(1), 35–45 (1990)CrossRefGoogle Scholar
  14. 14.
    Joachims, T.: SVMLight: Support Vector Machine, SVM-Light Support Vector Machine University of Dortmund (1999), http://svmlight.joachims.org/
  15. 15.
    Wilcox, L., Smith, I., Bush, M.: Wordspotting for voice editing and audio indexing, CHI 1992. In: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 655–656. ACM Press, New York (1992)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • L. Paola García-Perera
    • 1
  • Juan A. Nolazco-Flores
    • 1
  • Carlos Mex-Perera
    • 1
  1. 1.Computer Science DepartmentITESMMonterreyMéxico

Personalised recommendations