Skip to main content

Text Dependent Voice Based Biometric Authentication System Using Spectrum Analysis and Image Acquisition

  • Conference paper
Advances in Computer Science, Engineering & Applications

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 166))

Abstract

Biometrics is concerned with identifying a person based on the physical or behavioral traits of him such as face, fingerprints, voice and iris. With the pronounced need for robust human recognition techniques in critical applications such as secure access control, international border crossing and law enforcement. Biometrics is a viable technology that can be used into large-scale identity management systems. Biometric systems work under the assumption that many of the physical or behavioral traits of humans are distinctive to an individual, and that they can be precisely acquired using sensors and represented in a numerical format that helps in automatic decision-making in the context of authentication. In the presented approach effort has been made to design a Voice based Biometric Authentication system with desired aspiration level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ramachandran, R.P., Zilovic, M.S., Mammone, R.J.: A Comparative Study of Robust Linear Predictive Analysis Methods with Applications to Speaker Identification. IEEE Transactions on Speech and Audio Processing 3(2), 117–125 (1995)

    Article  Google Scholar 

  2. Atal, B.S.: Effectiveness of linear prediction characteristics of the speech wave for automatic speaker identification and verification. J. Acoust. Soc. Amer. 55, 1304–1312 (1974)

    Article  Google Scholar 

  3. Rabiner, L.R., Schafer, R.W.: Digital Processing of Speech Signals. Prentice-Hall, Englewood Cliffs (1978)

    Google Scholar 

  4. Gupta, S., Bhattachryya, M., Chatterjee, S.: Variable length cumulative key size and seed based symmetric key cryptographic algorithm using composite 3-D transposition substitution and Chaining Technique. In: Proc. of the IEEE International Conference on Advances in Communication, Network and Computing (CNC) 2010, pp. 109–113 (2010)

    Google Scholar 

  5. Gupta, S., Sengupta, S., Bhattachryya, M., Chatterjee, S., Sen Sharma, B.: Cellular Phone Based Web Authentication System Using 3-D Encryption Technique under Stochastic Framework. In: Proc. of the 1st IEEE Asian Himalayas International Conference on Internet (AH-ICI) 2009, pp. 1–5 (2009)

    Google Scholar 

  6. Doddington, G.R.: Speaker recognition—Identifying people by their voices. Proc. of IEEE 73, 1651–1664 (1985)

    Article  Google Scholar 

  7. Lee, C.-H.: On robust linear prediction of speech. IEEE Trans. Acoust., Speech, Signal Processing 36, 642–650 (1988)

    Article  MATH  Google Scholar 

  8. Ma, C., Kamp, Y., Willems, L.F.: Robust signal selection for linear prediction analysis of voiced speech. Speech Commun. 12(2), 69–81 (1993)

    Article  Google Scholar 

  9. Rosenberg, A.E., Soong, F.K.: Evaluation of a vector quantization talker recognition system in text independent and text dependent modes. Comp. Speech Language 22, 143–157 (1987)

    Article  Google Scholar 

  10. Furui, S.: Cepstral analysis technique for automatic speaker verification. IEEE Trans. Acoust., Speech Signal Processing ASSP-29, 254–272 (1981)

    Article  Google Scholar 

  11. Assaleh, K.T., Mammone, R.J.: New LP-derived features for speaker identification. IEEE Trans. Speech Audio Processing 2, 630–638 (1994)

    Article  Google Scholar 

  12. Ho, P., Armington, J.: A Dual-Factor Authentication System Featuring Speaker Verification and Token Technology. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, Springer, Heidelberg (2003)

    Google Scholar 

  13. Rothacker, R.J., Mammone, R.J., Davidovici, S.: Spectrum enhancement using linear programming. In: IEEE Int. Cunf. Acoust. Speech Signal Processing, Tokyo, Japan, pp. 43.10.1–43.10.4 (1986)

    Google Scholar 

  14. Therrien, C.W.: Discrete Random Signals and Statistical Signal Processing. Prentice-Hall, Englewood Cliffs (1992)

    MATH  Google Scholar 

  15. Rabiner, L.R., Juang, B.-H.: Fundamentals of Speech Recognition. Prentice-Hall, Englewood Cliffs (1993)

    Google Scholar 

  16. Duda, R.O., Hart, P.E.: Pattern Classification and Scene Analysis. Wiley, New York (1973)

    MATH  Google Scholar 

  17. Oppenheim, A.V., Schafer, R.W.: Discrete-Time Signal Processing. Prentice-Hall, Englewood Cliffs (1989)

    MATH  Google Scholar 

  18. Farrell, K.R., Mammone, R.J., Assaleh, K.T.: Speaker recognition using neural networks versus conventional classifiers. IEEE Trans. Speech Audio Processing 2, 194–205 (1994)

    Article  Google Scholar 

  19. Zilovic, M.S., Ramachandran, R.P., Mammone, R.J.: A fast algorithm for finding the adaptive component weighted cepstrum for speaker recognition. IEEE Trans. Speech Audio Processing 5, 84–86 (1997)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Somsubhra Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Gupta, S., Chatterjee, S. (2012). Text Dependent Voice Based Biometric Authentication System Using Spectrum Analysis and Image Acquisition. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent and Soft Computing, vol 166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30157-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30157-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30156-8

  • Online ISBN: 978-3-642-30157-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics