CA2465650A1 - Method for preventing user identity spoofing or impersonation in voice biometric authentication systems - Google Patents
Method for preventing user identity spoofing or impersonation in voice biometric authentication systems Download PDFInfo
- Publication number
- CA2465650A1 CA2465650A1 CA 2465650 CA2465650A CA2465650A1 CA 2465650 A1 CA2465650 A1 CA 2465650A1 CA 2465650 CA2465650 CA 2465650 CA 2465650 A CA2465650 A CA 2465650A CA 2465650 A1 CA2465650 A1 CA 2465650A1
- Authority
- CA
- Canada
- Prior art keywords
- voice
- biometric authentication
- identifier
- authentication system
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 238000001228 spectrum Methods 0.000 claims abstract description 11
- 238000012795 verification Methods 0.000 claims description 19
- 238000004590 computer program Methods 0.000 claims description 3
- 230000001419 dependent effect Effects 0.000 description 4
- 230000004044 response Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008451 emotion Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000002207 retinal effect Effects 0.000 description 1
- 230000001755 vocal effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/08—Use of distortion metrics or a particular distance between probe pattern and reference templates
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Game Theory and Decision Science (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
Abstract
A method and a system for preventing identity spoofing of a voice biometric authentication system by analyzing frequency domain spectrum of a first audio sample, calculating a first unique identifier and storing the first unique identifier on the system. After receiving a second audio sample, a second unique identifier is generated and compared to the first stored unique identifier. The authenticity of the second audio sample is determined.
Description
IVlethod for Preventing User Identity Spoofing or Impersonation in !/nice Biometric Authentication Systems FIELD OF INVENTION
s [0001] The present invention relates to voice biometric authentication. In particular, the present invention relates to method and system for preventing user identity spoofing in a voice biometric authentication system.
BACKGROUND OF THE INVENTION
s [0001] The present invention relates to voice biometric authentication. In particular, the present invention relates to method and system for preventing user identity spoofing in a voice biometric authentication system.
BACKGROUND OF THE INVENTION
[0002] The biometric characteristics of an individuals voice are as unique to ~o an individual as a fingerprint or retinal pattern. Sound waves generated by our vocal organs, for practical purposes, have enough repetitions to be regarded as periodic. In 19t" century, Fourier showed that any non-sinusoidal wave, no matter how complicated, can be represented as the sum of a number of sinusoidal waves of different frequencies, amplitudes and phases.
~s The spectrum of the speech wave specifies the amplitudes, frequencies and phases of the wave's sinusoidal components. The sum of many sinusoidal waves can result in a wave with a non-sinusoidal shape with the basic pattern of the non-sinusoidal wave repeating with the sarne periodicity as the lowest frequency component of all components added. Phase-change can also alter 2o the wave shape of the resulting wave. Therefore, a variety of wave shapes can be represented by adding sinusoidal components of the same amplitudes and frequencies, but of different phases. However, our hearing mechanism cannot always detect the effect of such changes. Non-sinusoidal waves, consisting of sinusoidal waves with the same amplitudes and frequencies, 2s often sound the same, even if their wave shapes differ because of differences in the phase relationship of their components. For this reason, in considering frequency domain spectrum, only the "°amplitude'° of the non-sinusoidal wave considered, and not the °°phase°' spectrum. The amplitude spectrum specifies just the frequencies and amplitudes of the sinusoidal components [0003] By regarding the sound waves as the sum of a number of waves with simple, sinusoidal shapes, we can derive that each of the sound waves will have a unique frequency domain spectrum with a unique identifier.
~s The spectrum of the speech wave specifies the amplitudes, frequencies and phases of the wave's sinusoidal components. The sum of many sinusoidal waves can result in a wave with a non-sinusoidal shape with the basic pattern of the non-sinusoidal wave repeating with the sarne periodicity as the lowest frequency component of all components added. Phase-change can also alter 2o the wave shape of the resulting wave. Therefore, a variety of wave shapes can be represented by adding sinusoidal components of the same amplitudes and frequencies, but of different phases. However, our hearing mechanism cannot always detect the effect of such changes. Non-sinusoidal waves, consisting of sinusoidal waves with the same amplitudes and frequencies, 2s often sound the same, even if their wave shapes differ because of differences in the phase relationship of their components. For this reason, in considering frequency domain spectrum, only the "°amplitude'° of the non-sinusoidal wave considered, and not the °°phase°' spectrum. The amplitude spectrum specifies just the frequencies and amplitudes of the sinusoidal components [0003] By regarding the sound waves as the sum of a number of waves with simple, sinusoidal shapes, we can derive that each of the sound waves will have a unique frequency domain spectrum with a unique identifier.
[0004] US Patent 6, 488,800 describes a speaker verification system using s the voice of a user uttering a continuous, random length digit string is provided. The speaker verification system includes a random digit generator for generating a continuous, random length digit string; a user interface for providing the continuous, random length digit string; a feature extractor for extracting voice features from the user°s voice uttering the continuous, to random length digit string; a digit voice verification unit for comparing the voice features with items in a speaker-independent continuous digit voice model to derive a digit string corresponding to items in the speaker-independent continuous digifi voice model, which match the voice features, and for determining whether the derived digit string is identical to the digit is string provided to the user via the user interface; and a speaker verification unit for comparing the voice features with a speaker-dependent model of the user to measure the similarity between them.
[0005] Extraction of characteristic frequency and intensity features from frequency domain digital representation has been described in Canadian 2o Patent Application no. 2,364,293, which is filed in the name of the applicant as in the present application. Canadian Patent Application no. 2,375,415, which is also filed in the name of the applicant of the present application, describes a voice transaction fraud detection method and system which includes means to assess the emotion of the user based upon analysis of 2s voice characteristics.
[0006] As with all security systems, there will be fraudsters who will attempt to breach or fool the system. One such method for attempting this type of security breach is to fraudulently claim another users identity and then attempt to gain access through impersonation. This method is called identity 3o spoofing.
[0007] A number of methods have been developed to prevent the identity spoofing in a voice biometric system. However, there were disadvantages with the existing method: in the case where a poor quality recording is made, such as with an analog recording device, the voice verification system can fail s to verify the fraudster as the recording will not produce a voice print of sufficient fidelity to match the original voice print; in the case of text dependant voice verification systems, manipulating the recorded audio file to subtly change the audio data can easily fool this 1-to-1-file comparison.
SUMMARY OF THE INVENTION
to [0008] The present invention relates to method and system for preventing user identity spoofing in a voice biometric authentication system.
[0009] According to one aspect of the present invention there is provided a method for preventing user identity spoofing in a voice biometric authentication system comprising the steps of: determining a first unique is characteristic identifier of a first voice; storing the first identifier in a database;
determining a second unique characteristic identifier of a second voice; and comparing the second identifier with the first identifier to determine the identity of the second voice.
[0010] According to another aspect of the present invention there is provided 2o a voice biometric authentication system comprising: receiver for receiving voices; means for determining a first unique characteristic identifier of a first voice; a database for storing the first identifier; means for determining a second unique characteristic identifier of a second voice; and means for comparing the second identifier with the first identifier to determine the zs identity of the second voice.
[0011 ] According to yet another aspect of the present invention there is provided a computer program product, comprising: a memory for having computer-readable code embodied therein for authenticating voice biometric comprising: code means for determining a first unique characteristic identifier _3_ of a first voice; code means for storing the first identifier in a database;
code means for determining a second unique characteristic identifier of a second voice; and code means for comparing the second identifier with the first identifier to determine the identity of the second voice.
s [0012] It is an object of the invention to provide a novel method and system for preventing user identity spoofing or impersonation in voice biometric authentication systems.
[0013] One of the advantages of the present invention is that it prevents users from spoofing or impersonating other users..
to [0014] The invention can operate with text dependent and independent voice biometric systems; and with voice biometric verification and identification systems; and automatically detects attempts of identity spoofing of voice biometric systems.
[0015] The invention further operates in real-time to detect user identity Is spoofing attempts to prevent fraudulent access. The invention can identify attempts to conduct identity spoofing with copied digital audio files, even when the audio data has been partially manipulated to inject noise or other spurious data.
[0016] This summary of the invention does not necessarily describe all 2o features of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
[0017] These and other features of the invention will become more apparent from the following description in which reference is made to the appended drawings wherein:
2s [0018] FIGURE 1 shows a flow chart of steps to acquire a unique identifier in accordance with an embodiment of the present invention; and [0019] FIGURE 2 shows a flow chart of a method and system for preventing user identity spoofing in a voice biometric authentication system.
[0020] Voice biometric authentication systems usually operate in the following manner:
~ The user enrols in the system by providing voice responses to several s queries. The user utterances are used to form a unique voice print for the user;
~ Successively, a user accesses the system and provides a voice sample for verification of identity; and ~ The system compares the new voice sample print against the original to stored from the enrolment process in order to determine if the user is indeed who they claim to be.
[0021 ] This invention relates to a method and a system for preventing a fraudster to attempt to spoof, or to impersonate other legitimate users, in voice biometric based voice verification and identification systems. These is systems are typically used in government, financial, and security applications in order to control user access to computer networks, telephony applications, and/or buildings/restricted access areas. Automated, computer based systems have been developed and used, to allow authentication of an individuals identity based upon a sample of speech.
20 [0022] There are several classifications of the systems used to authenticate identity based upon voice biometrics: First, systems can either perform speaker verification or speaker identification. in speaker verification the user claims an identity that must be verified as true or false. In speaker identification the user provides a speech sample and then one must choose 2s which speaker within a closed set matches the user sample. Each of the two systems, speaker verification and speaker identification, can also be either text dependant or text independent. Text dependent systems use a known utterance, for example a password or combination digit sequence, which is predefined for each speaker. Text independent systems use a different -s-response for each identification attempt. In this case, the input could be a random response to a question.
[0023) Fraudster attempts to impersonate a valid user through identity spoofiing, for example, by attempting to surreptitiously record a valid user s speaking their utterances and then attempt to access the system by using the recorded utterances. The fraudster attempts to spoof the system by claiming the identity of a valid user and then playing the recorded utterances for the valid user when prompted by the voice biometric system.
[0024] As shown in Figure 1 and 2, this invention solves this problem of to identity spoofing for voice verification and identification based biometric systems. The invention allows the voice verification and identification based biometric system to identify user utterances that are recordings of previous utterances and are therefore being employed to spoof the voice biometric access system.
is [0025) The invention involves the employment of methods to derive a unique signature or representation of a recorded voice utterance from a user, preferably a digital signal processing method.
[0026) Referring to Figure 1, each time a user interacts with the voice biometric system and provides an utterance either for enrollment or for 2o verification, a unique characteristic identifier for the utterance is derived through signal processing methods by analyzing the frequency domain spectrum. This unique characteristic identifier is then stored with the utterance in the voice biometric system database.
[0027] Referring to Figure 2, a user provides an audio sample, which is 2s received by the voice authentication system. A second unique identifier is generated for this audio sample by analyzing the frequency domain spectrum.
This second identifier is compared to the first identifier which is stored in a database to determine whether there is a match or not.
[0028] It should be apparent to a person skilled in the art that the method and system described in Figure 2 can be used both for the user verification or user identification, and can be either text dependant or text independent.
[0029] The analysis of the frequency domain spectrum and the calculation of s the unique identifier can be performed, for example by a microprocessor, a digital signal processor or any other means known to those skilled in the art.
[0030] The invention can operate with text dependent and independent voice biometric systems; and with voice biometric verification and identification systems; and automatically detects attempts of identity spoofing of voice to biometric systems.
[0031 ] The invention further operates in real-time to detect user identity spoofing attempts to prevent fraudulent access. The invention can identify attempts to conduct identity spoofing with copied digital audio files, even when the audio data has been partially manipulated to inject noise or other ~ s spurious data.
[0032] The present invention has been described with regard to one or more embodiments. However, it will be apparent to persons skilled in the art that a number of variations and modifications can be made without departing from the scope of the invention as defined in the claims.
_7_
SUMMARY OF THE INVENTION
to [0008] The present invention relates to method and system for preventing user identity spoofing in a voice biometric authentication system.
[0009] According to one aspect of the present invention there is provided a method for preventing user identity spoofing in a voice biometric authentication system comprising the steps of: determining a first unique is characteristic identifier of a first voice; storing the first identifier in a database;
determining a second unique characteristic identifier of a second voice; and comparing the second identifier with the first identifier to determine the identity of the second voice.
[0010] According to another aspect of the present invention there is provided 2o a voice biometric authentication system comprising: receiver for receiving voices; means for determining a first unique characteristic identifier of a first voice; a database for storing the first identifier; means for determining a second unique characteristic identifier of a second voice; and means for comparing the second identifier with the first identifier to determine the zs identity of the second voice.
[0011 ] According to yet another aspect of the present invention there is provided a computer program product, comprising: a memory for having computer-readable code embodied therein for authenticating voice biometric comprising: code means for determining a first unique characteristic identifier _3_ of a first voice; code means for storing the first identifier in a database;
code means for determining a second unique characteristic identifier of a second voice; and code means for comparing the second identifier with the first identifier to determine the identity of the second voice.
s [0012] It is an object of the invention to provide a novel method and system for preventing user identity spoofing or impersonation in voice biometric authentication systems.
[0013] One of the advantages of the present invention is that it prevents users from spoofing or impersonating other users..
to [0014] The invention can operate with text dependent and independent voice biometric systems; and with voice biometric verification and identification systems; and automatically detects attempts of identity spoofing of voice biometric systems.
[0015] The invention further operates in real-time to detect user identity Is spoofing attempts to prevent fraudulent access. The invention can identify attempts to conduct identity spoofing with copied digital audio files, even when the audio data has been partially manipulated to inject noise or other spurious data.
[0016] This summary of the invention does not necessarily describe all 2o features of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
[0017] These and other features of the invention will become more apparent from the following description in which reference is made to the appended drawings wherein:
2s [0018] FIGURE 1 shows a flow chart of steps to acquire a unique identifier in accordance with an embodiment of the present invention; and [0019] FIGURE 2 shows a flow chart of a method and system for preventing user identity spoofing in a voice biometric authentication system.
[0020] Voice biometric authentication systems usually operate in the following manner:
~ The user enrols in the system by providing voice responses to several s queries. The user utterances are used to form a unique voice print for the user;
~ Successively, a user accesses the system and provides a voice sample for verification of identity; and ~ The system compares the new voice sample print against the original to stored from the enrolment process in order to determine if the user is indeed who they claim to be.
[0021 ] This invention relates to a method and a system for preventing a fraudster to attempt to spoof, or to impersonate other legitimate users, in voice biometric based voice verification and identification systems. These is systems are typically used in government, financial, and security applications in order to control user access to computer networks, telephony applications, and/or buildings/restricted access areas. Automated, computer based systems have been developed and used, to allow authentication of an individuals identity based upon a sample of speech.
20 [0022] There are several classifications of the systems used to authenticate identity based upon voice biometrics: First, systems can either perform speaker verification or speaker identification. in speaker verification the user claims an identity that must be verified as true or false. In speaker identification the user provides a speech sample and then one must choose 2s which speaker within a closed set matches the user sample. Each of the two systems, speaker verification and speaker identification, can also be either text dependant or text independent. Text dependent systems use a known utterance, for example a password or combination digit sequence, which is predefined for each speaker. Text independent systems use a different -s-response for each identification attempt. In this case, the input could be a random response to a question.
[0023) Fraudster attempts to impersonate a valid user through identity spoofiing, for example, by attempting to surreptitiously record a valid user s speaking their utterances and then attempt to access the system by using the recorded utterances. The fraudster attempts to spoof the system by claiming the identity of a valid user and then playing the recorded utterances for the valid user when prompted by the voice biometric system.
[0024] As shown in Figure 1 and 2, this invention solves this problem of to identity spoofing for voice verification and identification based biometric systems. The invention allows the voice verification and identification based biometric system to identify user utterances that are recordings of previous utterances and are therefore being employed to spoof the voice biometric access system.
is [0025) The invention involves the employment of methods to derive a unique signature or representation of a recorded voice utterance from a user, preferably a digital signal processing method.
[0026) Referring to Figure 1, each time a user interacts with the voice biometric system and provides an utterance either for enrollment or for 2o verification, a unique characteristic identifier for the utterance is derived through signal processing methods by analyzing the frequency domain spectrum. This unique characteristic identifier is then stored with the utterance in the voice biometric system database.
[0027] Referring to Figure 2, a user provides an audio sample, which is 2s received by the voice authentication system. A second unique identifier is generated for this audio sample by analyzing the frequency domain spectrum.
This second identifier is compared to the first identifier which is stored in a database to determine whether there is a match or not.
[0028] It should be apparent to a person skilled in the art that the method and system described in Figure 2 can be used both for the user verification or user identification, and can be either text dependant or text independent.
[0029] The analysis of the frequency domain spectrum and the calculation of s the unique identifier can be performed, for example by a microprocessor, a digital signal processor or any other means known to those skilled in the art.
[0030] The invention can operate with text dependent and independent voice biometric systems; and with voice biometric verification and identification systems; and automatically detects attempts of identity spoofing of voice to biometric systems.
[0031 ] The invention further operates in real-time to detect user identity spoofing attempts to prevent fraudulent access. The invention can identify attempts to conduct identity spoofing with copied digital audio files, even when the audio data has been partially manipulated to inject noise or other ~ s spurious data.
[0032] The present invention has been described with regard to one or more embodiments. However, it will be apparent to persons skilled in the art that a number of variations and modifications can be made without departing from the scope of the invention as defined in the claims.
_7_
Claims (20)
1) A method for preventing user identity spoofing in a voice biometric authentication system comprising the steps of:
determining a first unique characteristic identifier of a first voice;
storing the first identifier in a database;
determining a second unique characteristic identifier of a second voice; and comparing the second identifier with the first identifier to determine the identity of the second voice.
determining a first unique characteristic identifier of a first voice;
storing the first identifier in a database;
determining a second unique characteristic identifier of a second voice; and comparing the second identifier with the first identifier to determine the identity of the second voice.
2) The method according to claim 1, wherein the determining step further comprises calculating of a frequency domain spectrum.
3) The method according to claim 1, wherein the determining step further comprises digital signal processing.
4) The method according to claim 1, further comprising the step of recording the first voice.
5) The method according to claim 1, wherein the first voice is a text independent utterance.
6) The method according to claim 1, wherein the first voice is derived from a reading of a predetermined text.
7) The method according to claim 1, wherein the second voice is a text independent utterance.
8) The method according to claim 1, wherein the voice biometric authentication system is a verification system.
9) The method according to claim 1, wherein the voice biometric authentication system is an identification system.
10) A voice biometric authentication system comprising:
receiver for receiving voices;
means for determining a first unique characteristic identifier of a first voice;
a database for storing the first identifier;
means for determining a second unique characteristic identifier of a second voice; and means for comparing the second identifier with the first identifier to determine the identity of the second voice.
receiver for receiving voices;
means for determining a first unique characteristic identifier of a first voice;
a database for storing the first identifier;
means for determining a second unique characteristic identifier of a second voice; and means for comparing the second identifier with the first identifier to determine the identity of the second voice.
11) The voice biometric authentication system according to claim 10, wherein the determining means is a digital signal processor.
12) The voice biometric authentication system according to claim 10, wherein the comparing means is a microprocessor.
13) The voice biometric authentication system according to claim 10, wherein the comparing means is a digital signal processor.
14) The voice biometric authentication system according to claim 10, wherein the first voice is a text independent utterance.
15) The voice biometric authentication system according to claim 10, wherein the first voice is derived from a reading of a predetermined text.
16) The voice biometric authentication system according to claim 10, wherein the second voice is a text independent utterance.
17) The voice biometric authentication system according to claim 10, wherein the voice biometric authentication system is a verification system.
18) The voice biometric authentication system according to claim 10, wherein the voice biometric authentication system is an identification system.
19) A computer program product, comprising:
a memory for having computer-readable code embodied therein for authenticating voice biometric comprising:
code means for determining a first unique characteristic identifier of a first voice;
code means for storing the first identifier in a database;
code means for determining a second unique characteristic identifier of a second voice; and code means for comparing the second identifier with the first identifier to determine the identity of the second voice.
a memory for having computer-readable code embodied therein for authenticating voice biometric comprising:
code means for determining a first unique characteristic identifier of a first voice;
code means for storing the first identifier in a database;
code means for determining a second unique characteristic identifier of a second voice; and code means for comparing the second identifier with the first identifier to determine the identity of the second voice.
20) The computer program product according to claim 19, wherein the determining code means further comprises code means for calculating a frequency domain spectrum.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CA 2465650 CA2465650A1 (en) | 2004-04-30 | 2004-04-30 | Method for preventing user identity spoofing or impersonation in voice biometric authentication systems |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CA 2465650 CA2465650A1 (en) | 2004-04-30 | 2004-04-30 | Method for preventing user identity spoofing or impersonation in voice biometric authentication systems |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CA2465650A1 true CA2465650A1 (en) | 2005-10-30 |
Family
ID=35415037
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA 2465650 Abandoned CA2465650A1 (en) | 2004-04-30 | 2004-04-30 | Method for preventing user identity spoofing or impersonation in voice biometric authentication systems |
Country Status (1)
| Country | Link |
|---|---|
| CA (1) | CA2465650A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2465436A (en) * | 2008-11-25 | 2010-05-26 | Inst Information Industry | Apparatus and method for generating and verifying a voice signature of a message using pronounceable symbols |
-
2004
- 2004-04-30 CA CA 2465650 patent/CA2465650A1/en not_active Abandoned
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2465436A (en) * | 2008-11-25 | 2010-05-26 | Inst Information Industry | Apparatus and method for generating and verifying a voice signature of a message using pronounceable symbols |
| GB2465436B (en) * | 2008-11-25 | 2011-06-29 | Inst Information Industry | apparatus and method for generating and verifying a voice signature of a message and computer readable medium thereof |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gałka et al. | Playback attack detection for text-dependent speaker verification over telephone channels | |
| US6510415B1 (en) | Voice authentication method and system utilizing same | |
| US6480825B1 (en) | System and method for detecting a recorded voice | |
| US6084967A (en) | Radio telecommunication device and method of authenticating a user with a voice authentication token | |
| EP2364495B1 (en) | Method for verifying the identify of a speaker and related computer readable medium and computer | |
| US8139723B2 (en) | Voice authentication system and method using a removable voice ID card | |
| US20180146370A1 (en) | Method and apparatus for secured authentication using voice biometrics and watermarking | |
| US7054811B2 (en) | Method and system for verifying and enabling user access based on voice parameters | |
| US20080270132A1 (en) | Method and system to improve speaker verification accuracy by detecting repeat imposters | |
| US20150112682A1 (en) | Method for verifying the identity of a speaker and related computer readable medium and computer | |
| WO2010047816A1 (en) | Speaker verification methods and apparatus | |
| WO2010047817A1 (en) | Speaker verification methods and systems | |
| GB2541466A (en) | Replay attack detection | |
| CN101197131A (en) | Random voiceprint password verification system, random voiceprint password lock and generation method thereof | |
| KR20010009081A (en) | Speaker verification system using continuous digits with flexible figures and method thereof | |
| Firc et al. | The dawn of a text-dependent society: deepfakes as a threat to speech verification systems | |
| BR102014023647A2 (en) | method and system for fraud detection in voice processing based applications | |
| CA2465650A1 (en) | Method for preventing user identity spoofing or impersonation in voice biometric authentication systems | |
| Aloufi et al. | On-Device Voice Authentication with Paralinguistic Privacy | |
| RU2747935C2 (en) | Method and system for user authentication using voice biometrics | |
| Chadha et al. | Text-independent speaker recognition for low SNR environments with encryption | |
| Yang | Security in voice authentication | |
| Marzotti et al. | Biometric authentication using voice | |
| Kounoudes et al. | Intelligent Speaker Verification based Biometric System for Electronic Commerce Applications | |
| CN119341799A (en) | A method for retrieving passwords through intelligent voiceprints |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FZDE | Dead |