Skip to main content

Cryptographic-Speech-Key Generation Architecture Improvements

  • Conference paper
Pattern Recognition and Image Analysis (IbPRIA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 3523))

Included in the following conference series:

Abstract

In this work we show a performance improvement of our system by taking into account the weights of the mixture of Gaussians of the Hidden Markov Model. Furthermore and independently tunning of each of the phoneme Support Vector Machine (SVM) parameters is performed. In our system the user utters a pass phrase and the phoneme waveform segments are found using the Automatic Speech Recognition Technology. Given the speech model and the phoneme information in the segments, a set of features are created to train an SVM that could generate a cryptographic key. Applying our method to a set of 10, 20, and 30 speakers from the YOHO database, the results show a good improvement compared with our last configuration, improving the robustness in the generation of the cryptographic key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boser, B., Guyon, I., Vapnik, V.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory (1992)

    Google Scholar 

  2. Campbell Jr., J.P.: Features and Measures for Speaker Recognition. Ph.D. Dissertation, Oklahoma State University (1992)

    Google Scholar 

  3. Cortes, C., Vapnik, V.: Support-vector network. Machine Learning 20, 273–297 (1995)

    MATH  Google Scholar 

  4. Higgins, A., Porter, J., Bahler, L.: YOHO Speaker Authentication Final Report. ITT Defense Communications Division (1989)

    Google Scholar 

  5. Garcia-Perera, L.P., Mex-Perera, C., Nolazco-Flores, J.A.: Multi-speaker voice cryptographic key generation. Accepted for publication in the 3rd ACS/IEEE International Conference on Computer Systems and Applications (January 2005)

    Google Scholar 

  6. Garcia-Perera, L.P., Mex-Perera, C., Nolazco-Flores, J.A.: Criptographic-speechkey generation using the SVM technique over the lp-cepstra speech space. In: International School on Neural Nets, Vietri, Italy, September 2004. Lecture Notes on Computer Sciences, Springer, Heidelberg (2004) (Accepted for publication)

    Google Scholar 

  7. Garcia-Perera, L.P., Mex-Perera, C., Nolazco-Flores, J.A.: SVM Applied to the Generation of Biometric Speech Key. In: Sanfeliu, A., Martínez Trinidad, J.F., Carrasco Ochoa, J.A. (eds.) CIARP 2004. LNCS, vol. 3287, pp. 637–644. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Young, S., Woodland, P.: HTK Hidden Markov Model Toolkit home page, http://htk.eng.cam.ac.uk/

  9. Osuna, E., Freund, R., Girosi, F.: Support vector machines: Training and applications. Technical Report AIM-1602, MIT A.I. Lab. (1996)

    Google Scholar 

  10. Osuna, E., Freund, R., Girosi, F.: Training Support Vector Machines: An Application to Face Recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 130–136 (1997)

    Google Scholar 

  11. Rabiner, L.R., Juang, B.-H.: Fundamentals of speech recognition. Prentice-Hall, New-Jersey (1993)

    Google Scholar 

  12. Joachims, T.: SVMLight: Support Vector Machine, SVM-Light Support Vector Machine, http://svmlight.joachims.org/ , University of Dortmund (November 1999)

  13. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6) (June 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

García-Perera, L.P., Nolazco-Flores, J.A., Mex-Perera, C. (2005). Cryptographic-Speech-Key Generation Architecture Improvements. In: Marques, J.S., Pérez de la Blanca, N., Pina, P. (eds) Pattern Recognition and Image Analysis. IbPRIA 2005. Lecture Notes in Computer Science, vol 3523. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11492542_71

Download citation

  • DOI: https://doi.org/10.1007/11492542_71

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26154-4

  • Online ISBN: 978-3-540-32238-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics