Secure voice-based authentication for mobile devices: vaulted voice verification

@inproceedings{Johnson2013SecureVA,
  title={Secure voice-based authentication for mobile devices: vaulted voice verification},
  author={R. C. Johnson and W. Scheirer and T. Boult},
  booktitle={Defense, Security, and Sensing},
  year={2013}
}
As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a… Expand
Surveying the Development of Biometric User Authentication on Mobile Phones
TLDR
This paper surveys the development of existing biometric authentication techniques on mobile phones, particularly on touch-enabled devices, with reference to 11 biometric approaches and proposes a framework for establishing a reliable authentication mechanism through implementing a multimodal biometric user authentication in an appropriate way. Expand
Voice authentication using short phrases: Examining accuracy, security and privacy issues
TLDR
It is shown that by mixing text-dependent with text-independent voice verification and by expanding the challenge-response protocol, Vaulted Voice Verification can preserve privacy while addressing the problematic issues of voice as a remote/mobile biometric identifier. Expand
With vaulted voice verification my voice is my key
  • R. C. Johnson, T. Boult
  • Computer Science
  • 2013 IEEE International Conference on Technologies for Homeland Security (HST)
  • 2013
TLDR
This work presents an index-based Vaulted Voice Verification which significantly reduces communication overhead and allows the transmission of keys that are suitable for biometrically authenticated secure communication. Expand
SCAN-speech biometric template protection based on genus-2 hyper elliptic curve
TLDR
The proposed SCAN system provides the complete solution for this challenge uniquely by designing genus-2 hyper elliptic curve cryptosystem for speech template by offering high resistance to various attacks as it involves HECC that comes under the category of discrete logarithmic problem. Expand
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
TLDR
The survey provides an overview of the current state-of-the-art approaches for continuous user authentication using behavioral biometrics captured by smartphones' embedded sensors, including insights and open challenges for adoption, usability, and performance. Expand
A Survey of Android Mobile Phone Authentication Schemes
TLDR
It was observed that while biometric based authentication schemes offered the greatest level of security, there was always a trade-off between computational complexity and ease of use/implementation/cost that ensured that more traditional authentication schemes, while not as secure as biometric schemes, are still widely used in mobile devices. Expand
Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey
TLDR
The survey provides an overview of the current state-of-the-art approaches for continuous user authentication using behavioral biometrics captured by smartphones’ embedded sensors, including insights and open challenges for adoption, usability, and performance. Expand
Remote Authentication Using Vaulted Fingerprint Verification
TLDR
A new biometric matching system, the protection of an existing data-type, and a model for matching security with error correction codes is described, which is fully compatible with protected biometric data-types. Expand
Authenticating Users with 3D Passwords Captured by Motion Sensors
TLDR
This dissertation proposes a user-friendly authentication system KinWrite that allows users to choose arbitrary, short and easy-to-memorize passwords while providing resilience to password cracking and password theft, and designs a MoCRA system that utilizes Leap Motion to capture users’ writing movements and use writing style to verify users. Expand
Your Phone Knows You: Almost Transparent Authentication for Smartphones
TLDR
This work proposes a transparent and adaptive authentication framework for smart phones that is built around the biological metaphor of how a pet recognizes its owner, which rids the user from remembering a strong secret and from inputting the secret via smart phone's small keypad time and again. Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 15 REFERENCES
Secure remote matching with privacy: Scrambled support vector vaulted verification (S2V3)
TLDR
The need for a mobile/remote SVM-based authentication system that does not compromise the privacy of the subject being recognized is outlined and a novel protocol called “Vaulted Verification” is presented that allows a server to remotely authenticate a client's biometric in a privacy preserving way. Expand
Secure speech biometric templates for user authentication
TLDR
The authors present two schemes to enhance verification performance in a biometric cryptosystem using a password that can resist a password brute-force search if the biometrics are not compromised. Expand
Biometric Template Security
TLDR
This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities. Expand
PRIVV: Private remote iris-authentication with Vaulted Verification
TLDR
This work adapts Vaulted Verification, a novel remote matching protocol, to work with iris biometrics in a network authentication setting, and investigates the algorithm's security and evaluates its performance, showing that Vaulting Verification is among the top-performing template protection algorithms for the CASIAv1 dataset. Expand
Cracking Fuzzy Vaults and Biometric Encryption
This paper is a security analysis of leading privacy enhanced technologies (PETs) for biometrics including biometric fuzzy vaults (BFV) and biometric encryption (BE). The lack of published attacks,Expand
Secure speech template protection in speaker verification system
TLDR
This paper presents a two-factor cancellable formulation for speech biometrics, which it refers as probabilistic random projection (PRP), and proposes 2D subspace projection techniques for speech feature extraction, namely 2D Principle Component Analysis and 2D CLAss-Featuring Information Compression to accommodate the requirements of PRP formulation. Expand
A survey on biometric cryptosystems and cancelable biometrics
TLDR
A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented and state-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given. Expand
Speech cryptographic key regeneration based on password
TLDR
Two schemes to enhance verification performance in a biometric cryptosystem using password that can resist a password brute-force search if biometrics are not compromised are presented. Expand
Cryptographic key generation from voice
TLDR
The technique is sufficiently robust to enable the user to reliably regenerate the key by uttering her password again, and an empirical evaluation of this technique is described using 250 utterances recorded from 50 users. Expand
The MIT Mobile Device Speaker Verification Corpus: Data Collection and Preliminary Experiments
TLDR
The preliminary results indicate that the presence of noise in the training data improves the robustness of the speaker verification models even when tested in mismatched environments. Expand
...
1
2
...