Text Dependent Voice Based Biometric Authentication System Using Spectrum Analysis and Image Acquisition

Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 166)

Abstract

Biometrics is concerned with identifying a person based on the physical or behavioral traits of him such as face, fingerprints, voice and iris. With the pronounced need for robust human recognition techniques in critical applications such as secure access control, international border crossing and law enforcement. Biometrics is a viable technology that can be used into large-scale identity management systems. Biometric systems work under the assumption that many of the physical or behavioral traits of humans are distinctive to an individual, and that they can be precisely acquired using sensors and represented in a numerical format that helps in automatic decision-making in the context of authentication. In the presented approach effort has been made to design a Voice based Biometric Authentication system with desired aspiration level.

Keywords

Authentication Biometric Image acquisition Spectrum 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ramachandran, R.P., Zilovic, M.S., Mammone, R.J.: A Comparative Study of Robust Linear Predictive Analysis Methods with Applications to Speaker Identification. IEEE Transactions on Speech and Audio Processing 3(2), 117–125 (1995)CrossRefGoogle Scholar
  2. 2.
    Atal, B.S.: Effectiveness of linear prediction characteristics of the speech wave for automatic speaker identification and verification. J. Acoust. Soc. Amer. 55, 1304–1312 (1974)CrossRefGoogle Scholar
  3. 3.
    Rabiner, L.R., Schafer, R.W.: Digital Processing of Speech Signals. Prentice-Hall, Englewood Cliffs (1978)Google Scholar
  4. 4.
    Gupta, S., Bhattachryya, M., Chatterjee, S.: Variable length cumulative key size and seed based symmetric key cryptographic algorithm using composite 3-D transposition substitution and Chaining Technique. In: Proc. of the IEEE International Conference on Advances in Communication, Network and Computing (CNC) 2010, pp. 109–113 (2010)Google Scholar
  5. 5.
    Gupta, S., Sengupta, S., Bhattachryya, M., Chatterjee, S., Sen Sharma, B.: Cellular Phone Based Web Authentication System Using 3-D Encryption Technique under Stochastic Framework. In: Proc. of the 1st IEEE Asian Himalayas International Conference on Internet (AH-ICI) 2009, pp. 1–5 (2009)Google Scholar
  6. 6.
    Doddington, G.R.: Speaker recognition—Identifying people by their voices. Proc. of IEEE 73, 1651–1664 (1985)CrossRefGoogle Scholar
  7. 7.
    Lee, C.-H.: On robust linear prediction of speech. IEEE Trans. Acoust., Speech, Signal Processing 36, 642–650 (1988)CrossRefMATHGoogle Scholar
  8. 8.
    Ma, C., Kamp, Y., Willems, L.F.: Robust signal selection for linear prediction analysis of voiced speech. Speech Commun. 12(2), 69–81 (1993)CrossRefGoogle Scholar
  9. 9.
    Rosenberg, A.E., Soong, F.K.: Evaluation of a vector quantization talker recognition system in text independent and text dependent modes. Comp. Speech Language 22, 143–157 (1987)CrossRefGoogle Scholar
  10. 10.
    Furui, S.: Cepstral analysis technique for automatic speaker verification. IEEE Trans. Acoust., Speech Signal Processing ASSP-29, 254–272 (1981)CrossRefGoogle Scholar
  11. 11.
    Assaleh, K.T., Mammone, R.J.: New LP-derived features for speaker identification. IEEE Trans. Speech Audio Processing 2, 630–638 (1994)CrossRefGoogle Scholar
  12. 12.
    Ho, P., Armington, J.: A Dual-Factor Authentication System Featuring Speaker Verification and Token Technology. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, Springer, Heidelberg (2003)Google Scholar
  13. 13.
    Rothacker, R.J., Mammone, R.J., Davidovici, S.: Spectrum enhancement using linear programming. In: IEEE Int. Cunf. Acoust. Speech Signal Processing, Tokyo, Japan, pp. 43.10.1–43.10.4 (1986)Google Scholar
  14. 14.
    Therrien, C.W.: Discrete Random Signals and Statistical Signal Processing. Prentice-Hall, Englewood Cliffs (1992)MATHGoogle Scholar
  15. 15.
    Rabiner, L.R., Juang, B.-H.: Fundamentals of Speech Recognition. Prentice-Hall, Englewood Cliffs (1993)Google Scholar
  16. 16.
    Duda, R.O., Hart, P.E.: Pattern Classification and Scene Analysis. Wiley, New York (1973)MATHGoogle Scholar
  17. 17.
    Oppenheim, A.V., Schafer, R.W.: Discrete-Time Signal Processing. Prentice-Hall, Englewood Cliffs (1989)MATHGoogle Scholar
  18. 18.
    Farrell, K.R., Mammone, R.J., Assaleh, K.T.: Speaker recognition using neural networks versus conventional classifiers. IEEE Trans. Speech Audio Processing 2, 194–205 (1994)CrossRefGoogle Scholar
  19. 19.
    Zilovic, M.S., Ramachandran, R.P., Mammone, R.J.: A fast algorithm for finding the adaptive component weighted cepstrum for speaker recognition. IEEE Trans. Speech Audio Processing 5, 84–86 (1997)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Department of Information TechnologyJIS College of EngineeringKalyaniIndia
  2. 2.Department of Information TechnologyBengal Engineering and Science UniversityHowrahIndia

Personalised recommendations