Parameter Optimization in a Text-Dependent Cryptographic-Speech-Key Generation Task

In this paper an improvement in the generation of the crypto-graphic-speech-key by optimising the number of parameters is presented. It involves the selection of the number of dimensions with the best performance for each of the phonemes. First, the Mel frequency cepstral coefficients, (first and second derivatives) of the speech signal are calculated. Then, an Automatic Speech Recogniser, which models are previously trained, is used to detect the phoneme limits in the speech utterance. Afterwards, the feature vectors are built using both the phoneme-speech models and the information obtained from the phoneme segmentation. Finally, the Support Vector Machines classifier, relying on an RBF kernel, computes the cryptographic key. By optimising the number of parameters our results show an improvement of 19.88%, 17.08%, 14.91% for 10, 20 and 30 speakers respectively, employing the YOHO database.

[1]  Rao Yarlagadda,et al.  Features and measures for speaker recognition , 1992 .

[2]  L. Paola García-Perera,et al.  Cryptographic-Speech-Key Generation Architecture Improvements , 2005, IbPRIA.

[3]  Federico Girosi,et al.  Training support vector machines: an application to face detection , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[4]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[5]  L. Paola García-Perera,et al.  Cryptographic-Speech-Key Generation Using the SVM Technique over the lp-Cepstral Speech Space , 2004, Summer School on Neural Networks.

[6]  Federico Girosi,et al.  Support Vector Machines: Training and Applications , 1997 .

[7]  L. Paola García-Perera,et al.  SVM Applied to the Generation of Biometric Speech Key , 2004, CIARP.

[8]  Bernhard E. Boser,et al.  A training algorithm for optimal margin classifiers , 1992, COLT '92.

[9]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[10]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[11]  Biing-Hwang Juang,et al.  Fundamentals of speech recognition , 1993, Prentice Hall signal processing series.

[12]  Hsiao-Wuen Hon,et al.  An overview of the SPHINX speech recognition system , 1990, IEEE Trans. Acoust. Speech Signal Process..

[13]  L. Paola García-Perera,et al.  Multi-speaker voice cryptographic key generation , 2005, The 3rd ACS/IEEE International Conference onComputer Systems and Applications, 2005..