Fundamentals of speech recognition
Fundamentals of speech recognition
Reliable On-Line Human Signature Verification Systems
IEEE Transactions on Pattern Analysis and Machine Intelligence
Gaussian Mixture Models for on-line signature verification
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Score normalization in multimodal biometric systems
Pattern Recognition
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Securing electronic medical records using biometric authentication
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Combined handwriting and speech modalities for user authentication
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special section: Best papers from the 2007 biometrics: Theory, applications, and systems (BTAS 07) conference
Generation and evaluation of brute-force signature forgeries
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Modelling combined handwriting and speech modalities
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hi-index | 0.00 |
In this paper we report on first experimental results of a novel multimodal user authentication system based on a combined acquisition of online handwritten signature and speech modalities. In our project, the so-called CHASM signatures are recorded by asking the user to utter what he is writing. CHASM actually stands for Combined Handwriting and Speech Modalities where the pen and voice signals are simultaneously recorded. We have built a baseline CHASM signature verification system for which we have conducted a complete experimental evaluation. This baseline system is composed of two Gaussian Mixture Models sub-systems that model independently the pen and voice signal. A simple fusion of both sub-systems is performed at the score level. The evaluation of the verification system is conducted on CHASM signatures taken from the MyIDea multimodal database, accordingly to the protocols provided with the database. This allows us to draw our first conclusions in regards to time variability impact, to skilled versus unskilled forgeries attacks and to some training parameters. Results are also reported for the two sub-systems evaluated separately and for the global system.