Skip to main content

User Authentication Scheme Using Individual Auditory Pop-Out

  • Chapter
New Directions in Intelligent Interactive Multimedia

Part of the book series: Studies in Computational Intelligence ((SCI,volume 142))

  • 929 Accesses

Abstract

This paper presents a user authentication scheme which takes advantage of the uniqueness of prover’s auditory characteristics. In this scheme, several audio stimuli are presented at the same time by headphone. The stimuli include a special audio stimulus that only the genuine prover can easily distinguishes from other stimuli because of the uniqueness of auditory characteristics. The prover is made to answer the contents of the special stimulus. The verifier confirms the correct answer as the genuine prover. As the special audio stimulus that distinguishes the genuiness, auto-phonic production is examined in this paper.

The advantage of this scheme is that the prover does not need to keep complex sequence in minds like a password authentication. Moreover, the Personal Authentication Information (PAI) is never stolen, because the PAI in this scheme is personal auditory memory or receptor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. CAPTCHA project: http://www.captcha.net/chaptchas/gimpy/

  3. Nishigaki, M., Arai, D.: A User Authentication Using Human Reflex. Transactions of Information Processing Society of Japan 47(8), 2582–2593 (2006)

    Google Scholar 

  4. Nakayama, I.: Voice timbre in autophonic production compared with that in extraphonic production. Journal of Acoustics Society of Japan (E) 18(2), 67–71 (1997)

    Google Scholar 

  5. Sakamoto, S., Suzuki, Y., Amano, S., Ozawa, K., Kondo, K., Sone, T.: New lists for word intelligibility test based on word familiarity and phonetic balance. Journal of Acoustical Society of Japan 54(12), 842–849 (1998)

    Google Scholar 

  6. Kashino, M., Hirahara, T.: Judging the number of concurrent talkers for sentence stimuli. Proceeding of Spring meeting of Acoustical Society of Japan III–3–3 (1997) (in Japanese)

    Google Scholar 

  7. Drullman, R., Bronkhorst, A.W.: Multichannel speech intelligibility and talker recognition using monaural, binaural, and three-dimensional auditory presentation. Journal of Acoustical Society of America 107(4), 2224–2235 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

George A. Tsihrintzis Maria Virvou Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Sonoda, K., Takizawa, O. (2008). User Authentication Scheme Using Individual Auditory Pop-Out. In: Tsihrintzis, G.A., Virvou, M., Howlett, R.J., Jain, L.C. (eds) New Directions in Intelligent Interactive Multimedia. Studies in Computational Intelligence, vol 142. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68127-4_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-68127-4_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68126-7

  • Online ISBN: 978-3-540-68127-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics