Speaker recognition techniques for remote authentication of users in computer networks

  • Authors:
  • Adriano Petry;Sidcley S. Soares;Gilberto F. Marchioro;Analúcia S. M. De Franceschi

  • Affiliations:
  • Área de Tecnologia e Computação, Universidade Luterana do Brasil, Canoas, RS, Brazil and Curso de Engenharia de Sistemas Digitais, Universidade Estadual do Rio Grande do Sul, Gua ...;Área de Tecnologia e Computação, Universidade Luterana do Brasil, Canoas, RS, Brazil;Área de Tecnologia e Computação, Universidade Luterana do Brasil, Canoas, RS, Brazil;Área de Tecnologia e Computação, Universidade Luterana do Brasil, Canoas, RS, Brazil

  • Venue:
  • WSEAS TRANSACTIONS on SYSTEMS
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

This work shows the main characteristics of a system designed to improve security in Internet transactions using a biometric measure: the speech. First, it is given a general overview of the proposed system, developed using Java and C++ programming languages. After that, the main characteristics of the system building blocks are shown, focusing on the techniques for speaker recognition, database, client/server communication and management, and user interface application. The processing load is distributed in this system. The client side is basically responsible for speech acquisition and feature parameters extraction. The server side is responsible for voiceprint generation (on the training phase) or similarity measure between a voiceprint and some feature parameters (on recognition phase). In order to reduce the amount of data transmission, this distributed architecture presents the advantage of transmitting only the feature parameters over the network, instead of the complete wave signal. The acceptance or rejection of a speech identity is based on a pre-defined similarity threshold. Tests using speech database composed of 50 different speakers presented equal error rate (EER) of approximately 1.3%. At the end, the main results obtained from the interaction of the system with several different users are discussed. Besides that, accuracy test results are shown, and future works are addressed.