Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

Iberoamerican Congress on Pattern Recognition

CIARP 2005: Progress in Pattern Recognition, Image Analysis and Applications pp 770–777Cite as

  1. Home
  2. Progress in Pattern Recognition, Image Analysis and Applications
  3. Conference paper
Phoneme Spotting for Speech-Based Crypto-key Generation

Phoneme Spotting for Speech-Based Crypto-key Generation

  • L. Paola García-Perera18,
  • Juan A. Nolazco-Flores18 &
  • Carlos Mex-Perera18 
  • Conference paper
  • 1045 Accesses

  • 1 Citations

Part of the Lecture Notes in Computer Science book series (LNIP,volume 3773)

Abstract

In this research we propose to use phoneme spotting to improve the results in the generation of a cryptographic key. Phoneme spotting selects the phonemes with highest accuracy in the user classification task. The key bits are constructed by using the Automatic Speech Recognition and Support Vector Machines. Firstly, a speech recogniser detects the phoneme limits in each speech utterance. Afterwards, the support vector machine performs a user classification and generates a key. By selecting the highest accuracy phonemes for a a set of 10, 20, 30 and 50 speakers randomly chosen from the YOHO database, it is possible to generate reliable cryptographic keys.

Keywords

  • Support Vector Machine
  • Hide Markov Model
  • Support Vector Machine Model
  • Automatic Speech Recognition
  • Speech Recogniser

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Boser, B., Guyon, I., Vapnik, V.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory (1992)

    Google Scholar 

  2. Campbell, J.P.: Jr.: Features and Measures for Speaker Recognition. Ph.D. Dissertation, Oklahoma State University (1992)

    Google Scholar 

  3. Cortes, C., Vapnik, V.: Support-vector network. Machine Learning 20, 273–297 (1995)

    MATH  Google Scholar 

  4. Higgins, A., Porter, J.,, J.: Bahler L.: YOHO Speaker Authentication Final Report. ITT Defense Communications Division (1989)

    Google Scholar 

  5. Young, S., Woodland, P.: HTK Hidden Markov Model Toolkit home page, http://htk.eng.cam.ac.uk/

  6. Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation From Voice. In: Proceedings of the IEEE Conference on Security and Privacy, Oakland, CA (2001)

    Google Scholar 

  7. Osuna, E.: Freund R., and Girosi F.: Support vector machines: Training and applications. Technical Report AIM-1602, MIT A.I. Lab (1996)

    Google Scholar 

  8. Osuna, E.: Training Support Vector Machines: An Application to Face Recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 130–136 (1997)

    Google Scholar 

  9. Furui, S.: Digital Speech Processing, Synthesis, and Recognition. Mercel Dekker, Inc., New York (2001)

    Google Scholar 

  10. Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257–286 (1989)

    CrossRef  Google Scholar 

  11. Rabiner, L.R., Juang, B.-H.: Fundamentals of speech recognition. Prentice-Hall, New-Jersey (1993)

    Google Scholar 

  12. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6) (2004)

    Google Scholar 

  13. Lee, K., Hon, H., Reddy, R.: An overview of the SPHINX speech recognition system. IEEE Transactions on Acoustics, Speech and Signal Processing 38(1), 35–45 (1990)

    CrossRef  Google Scholar 

  14. Joachims, T.: SVMLight: Support Vector Machine, SVM-Light Support Vector Machine University of Dortmund (1999), http://svmlight.joachims.org/

  15. Wilcox, L., Smith, I., Bush, M.: Wordspotting for voice editing and audio indexing, CHI 1992. In: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 655–656. ACM Press, New York (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Computer Science Department, ITESM, Campus Monterrey, Av. Eugenio Garza Sada 2501 Sur, Col. Tecnológico, Monterrey, N.L., C.P. 64849, México

    L. Paola García-Perera, Juan A. Nolazco-Flores & Carlos Mex-Perera

Authors
  1. L. Paola García-Perera
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Juan A. Nolazco-Flores
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Carlos Mex-Perera
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dept. System Engineering and Automation, Universitat Politècnica de Catalunya (UPC) Barcelona, Spain

    Alberto Sanfeliu

  2. Pattern Recognition Group, ICIMAF, Havana, Cuba

    Manuel Lazo Cortés

Rights and permissions

Reprints and Permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

García-Perera, L.P., Nolazco-Flores, J.A., Mex-Perera, C. (2005). Phoneme Spotting for Speech-Based Crypto-key Generation. In: Sanfeliu, A., Cortés, M.L. (eds) Progress in Pattern Recognition, Image Analysis and Applications. CIARP 2005. Lecture Notes in Computer Science, vol 3773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11578079_80

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11578079_80

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29850-2

  • Online ISBN: 978-3-540-32242-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

  • The International Association for Pattern Recognition

    Published in cooperation with

    http://www.iapr.org/

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature