Dear guest, welcome to this publication database. As an anonymous user, you will probably not have edit rights. Also, the collapse status of the topic tree will not be persistent. If you like to have these and other options enabled, you might ask Admin (Ivan Eggel) for a login account.
 [BibTeX] [RIS]
Please repeat: my voice is my password. From the basics to real-life implementations of speaker verification technologies
Type of publication: Inproceedings
Citation: henn07:iss
Booktitle: Invited lecture at the Information Security Summit (IS2 2007), Prague
Year: 2007
Abstract: Speaker verification finds applications in many different areas such as access control, transaction authentication, law enforcement, speech data management and personalization. As for other biometric technologies the prime motivation of speaker recognition is to achieve a more usable and reliable personal identification than by using artifacts such as keys, badges, magnetic cards or memorized passwords. Speaker verification technologies are often ranked as less accurate than other biometric technologies such as iris scan or fingerprints. However, there are two main factors that make voice a compelling biometric. First, there is a proliferation of automated telephony services for which speaker recognition can be directly applied. Second, talking is a very natural gesture, often considered as lowly intrusive by users as no physical contact is requested. These two factors, added to the recent scientific progresses, made voice biometric converge into a mature technology.
Keywords: Biometrics, Speaker Verification
Authors Hennebert, Jean
Added by: []
Total mark: 0
Attachments
    Notes
      Topics