Abstract
This paper presents a secure voice authentication system combining speaker verification and token technology. The dual-factor authentication system is especially designed to counteract imposture by pre-recorded speech and the text-to-speech voice cloning (TTSVC) technology, as well as to regulate the inconsistency of audio characteristics among different handsets. The token device generates and prompts a onetime passcode (OTP) to the user. The spoken OTP is then forwarded simultaneously to both a speaker verification module, which verifies the user’s voice, and a speech recognition module, which converts the spoken OTP to text and validates it. Thus, the OTP protects against recorded speech or voice cloning attacks and speaker verification protects against the use of a lost or stolen token device. We show the preliminary results of our Support Vector Machine (SVM)-based speaker verification algorithm, handset identification algorithm, and the system architecture of our design.
Text-to-Speech Voice Cloning System by AT&T Labs, http://www.naturalvoices.att.com/.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
C. Burges. A tutorial on support vector machines for pattern recognition. Bell Laboratories, Lucent Technologies, 1998.
J.P. Campbell. Speaker recognition: A tutorial. Proceedings of the IEEE, 85(9), 1997.
Y. Gu and T. Thomas. A text-independent speaker verification system usingsupport vector machines classifier. Eurospeech, 2001.
L.P. Heck, Y. Konig, M.K. Sönmez, and M. Weintraub. Robustness to telephone handset distortion in speaker recognition by discriminative feature design. Speech Communication, 31, 2000.
L.P. Heck and M. Weintraub. Handset-dependent background models for robust text-independent speaker recognition. IEEE ICASSP, pages 1071–1074, 1997.
S.P. Kishore and B. Yegnanarayana. Identification of handset type using autoassociative neural networks. The 4th International Conference on Advances in Pattern Recognition and Digital Techniques, 1999.
J.M. Naik. Speaker verification: A tutorial. IEEE Communications Magazine, 1990.
F. Nolan. The Phonetic Bases of Speaker Recognition. Cambridge University Press, 1983.
Purdy Ho. A Handset Identifier Using Support Vector Machines. In IEEE International Conference on Spoken Language Processing, Denver, CO, USA, 2002.
D.A. Reynolds. HTIMIT and LLHDB: Speech corpora for the study of handset transducer effects. IEEE ICASSP, pages 1535–1538, 1997.
M. Slaney. Auditory toolbox, version 2. Technical Report, Interval Research Corproation, 1998.
V. Vapnik. Statistical learning theory. John Wiley and Sons, New York, 1998.
V. Wan and W. Campbell. Support vector machines for speaker verification and identification. IEEE Proceeding, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ho, P., Armington, J. (2003). A Dual-Factor Authentication System Featuring Speaker Verification and Token Technology. In: Kittler, J., Nixon, M.S. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2003. Lecture Notes in Computer Science, vol 2688. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44887-X_16
Download citation
DOI: https://doi.org/10.1007/3-540-44887-X_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40302-9
Online ISBN: 978-3-540-44887-7
eBook Packages: Springer Book Archive