Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition
暂无分享,去创建一个
Syed Abdul Rahman Al-Haddad | Hamurabi Gamboa Rosales | José Ismael de la Rosa Vargas | Mansour Esmaeilpour | Mohammad Ali Nematollahi | Francisco J. Martinez-Ruiz
[1] Andreas Uhl,et al. Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking , 2011, Communications and Multimedia Security.
[2] Fathi E. Abd El-Samie,et al. An SVD audio watermarking approach using chaotic encrypted images , 2011, Digit. Signal Process..
[3] Jianwu Dang,et al. An investigation of dependencies between frequency components and speaker characteristics based on phoneme mean F-ratio contribution , 2012, Proceedings of The 2012 Asia Pacific Signal and Information Processing Association Annual Summit and Conference.
[4] Marcos Faúndez-Zanuy,et al. Speaker verification security improvement by means of speech watermarking , 2006, Speech Commun..
[5] Sourav Mukhopadhyay,et al. Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card , 2013, ICISS.
[6] D. Hinkley. On the ratio of two correlated normal random variables , 1969 .
[7] Matti Pietikäinen,et al. Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data , 2012, 2012 IEEE International Conference on Multimedia and Expo Workshops.
[8] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[9] Jean-François Bonastre,et al. Localization and selection of speaker-specific information with statistical modeling , 2000, Speech Commun..
[10] Scott Craver,et al. Additive attacks on speaker recognition , 2014, Electronic Imaging.
[11] Douglas A. Reynolds,et al. Speaker identification and verification using Gaussian mixture speaker models , 1995, Speech Commun..
[12] Larry P. Heck,et al. MSR Identity Toolbox v1.0: A MATLAB Toolbox for Speaker Recognition Research , 2013 .
[13] Farrokh Marvasti,et al. Robust Multiplicative Audio and Speech Watermarking Using Statistical Modeling , 2009, 2009 IEEE International Conference on Communications.
[14] Carla Teixeira Lopes,et al. TIMIT Acoustic-Phonetic Continuous Speech Corpus , 2012 .
[15] Farrokh Marvasti,et al. Robust audio and speech watermarking using Gaussian and Laplacian modeling , 2010, Signal Process..
[16] Douglas A. Reynolds,et al. A Tutorial on Text-Independent Speaker Verification , 2004, EURASIP J. Adv. Signal Process..
[17] Husrev T. Sencar,et al. Security issues in watermarking applications - a deeper look , 2006, MCPS '06.
[18] Hoon-Jae Lee,et al. Multi-Factor Authentication Process Using More than One Token with Watermark Security , 2013 .
[19] Patrick Kenny,et al. Front-End Factor Analysis for Speaker Verification , 2011, IEEE Transactions on Audio, Speech, and Language Processing.
[20] Chun-Ta Li,et al. An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..
[21] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[22] Seng-Phil Hong,et al. A Method of Risk Assessment for Multi-Factor Authentication , 2011, J. Inf. Process. Syst..
[23] Syed Abdul Rahman Al-Haddad,et al. Distant Speaker Recognition: An Overview , 2016, Int. J. Humanoid Robotics.
[24] Syed Abdul Rahman Al-Haddad,et al. Semi-fragile digital speech watermarking for online speaker recognition , 2015, EURASIP J. Audio Speech Music. Process..
[25] Jianwu Dang,et al. An investigation of dependencies between frequency components and speaker characteristics for text-independent speaker identification , 2008, Speech Commun..
[26] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..
[27] Alex Park,et al. The MIT Mobile Device Speaker Verification Corpus: Data Collection and Preliminary Experiments , 2006, 2006 IEEE Odyssey - The Speaker and Language Recognition Workshop.
[28] Syed Abdul Rahman Al-Haddad,et al. Robust Digital Speech Watermarking For Online Speaker Recognition , 2015 .
[29] Mikhail Khitrov,et al. Talking passwords: voice biometrics for data access and security , 2013 .
[30] Bhiksha Raj,et al. Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.
[31] Stphane Mallat,et al. A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way , 2008 .
[32] S. Mallat. A wavelet tour of signal processing , 1998 .
[33] Haizhou Li,et al. Spoofing and countermeasures for speaker verification: A survey , 2015, Speech Commun..
[34] Jonathan G. Fiscus,et al. Darpa Timit Acoustic-Phonetic Continuous Speech Corpus CD-ROM {TIMIT} | NIST , 1993 .
[35] Gernot Kubin,et al. Speaker identification security improvement by means of speech watermarking , 2007, Pattern Recognit..
[36] Stéphane Mallat,et al. A Wavelet Tour of Signal Processing - The Sparse Way, 3rd Edition , 2008 .