DocumentCode :
2297773
Title :
CipherVOX: scalable low-complexity speaker verification
Author :
Fette, B.A. ; Broun, C.C. ; Campbell, W.M. ; Jaskie, C.
Author_Institution :
Motorola SSG, Scottsdale, AZ, USA
Volume :
6
fYear :
2000
fDate :
2000
Firstpage :
3634
Abstract :
Biometrics is gaining strong support for access control in the industry. It is not uncommon for individual users to be faced with a half-dozen or more passwords and personal identification numbers (PINs) controlling access to the systems required for them to do their job. The ubiquity of passwords actually relaxes system security since many users tend to use the same password across all applications, or collect the various passwords in a single location (perhaps a password protected spreadsheet, or a piece of paper in a desk drawer). The latter case is of extreme concern since security around the collection is much more easily compromised than that of the system. The use of biometrics not only recovers the ability to secure sensitive systems and data, but also does so in a user-friendly manner. In order to use biometrics successfully in server-based environments, several key concerns must be addressed. First, the authentication strategy must maintain acceptable levels of security. Second, the user community must accept the chosen biometric (unless there is a captive audience). The last major consideration is the scalability of the solution. In this paper we introduce CipherVOX, a speaker verification access control solution for server and standalone computing environments. We discuss the use of our polynomial-based classifier that combines high-accuracy and low-complexity via discriminative techniques, and give performance results for both a proprietary performance database and the standard YOHO database. We also review the challenges in designing for user acceptance, including the design of the speaker verification user interface, as well as the application programming interface (API)
Keywords :
biometrics (access control); security of data; speaker recognition; access control; access control solution; application programming interface; authentication strategy; biometrics; cipherVOX; design; discriminative techniques; high-accuracy; low-complexity; performance; polynomial-based classifier; proprietary performance database; scalability; scalable low-complexity speaker verification; server computing environments; server-based environments; speaker verification user interface; standalone computing environments; standard YOHO database; system security; user acceptance; Access control; Authentication; Biometrics; Control systems; Data security; Databases; Electrical equipment industry; Industrial control; Pins; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Acoustics, Speech, and Signal Processing, 2000. ICASSP '00. Proceedings. 2000 IEEE International Conference on
Conference_Location :
Istanbul
ISSN :
1520-6149
Print_ISBN :
0-7803-6293-4
Type :
conf
DOI :
10.1109/ICASSP.2000.860189
Filename :
860189
Link To Document :
بازگشت