Title :
Authentication of cellular users through voice verification
Author_Institution :
Dept. of Comput. Sci., California State Univ., Fullerton, CA, USA
Abstract :
The paper discusses a speaker verification technique that was developed to battle fraud, a common problem that the cellular operating companies have to deal with. The technique uses the user voice to perform authentication. By comparing a live voiceprint with reference voiceprints, a speaker verifier determines whether the user is “legitimate” (voiceprints match) or an “imposter” (voiceprints do not match). Speaker verification can be used as an extra layer of protection against fraud, when used with authentication that uses mathematical algorithms and fraud pin code, or as a complete substitute because a voice is unique to a person and is hard to duplicate
Keywords :
authorisation; cellular radio; fraud; message authentication; speaker recognition; cellular operating companies; cellular user authentication; fraud pin code; fraud prevention; live voiceprint; mathematical algorithms; reference voiceprints; speaker verification technique; speaker verifier; user voice; voice verification; Authentication; Base stations; Cellular phones; Computer science; Land mobile radio cellular systems; Poles and towers; Protection; Radio transmitters; Spectrogram; Telephony;
Conference_Titel :
Systems, Man, and Cybernetics, 2000 IEEE International Conference on
Conference_Location :
Nashville, TN
Print_ISBN :
0-7803-6583-6
DOI :
10.1109/ICSMC.2000.885028