Speaker Authentication Method using Reservoir Computing for Security System | IEEE Conference Publication | IEEE Xplore