Secure voice-based authentication for mobile devices: vaulted voice verification

@inproceedings{Johnson2013SecureVA,
  title={Secure voice-based authentication for mobile devices: vaulted voice verification},
  author={R. Johnson and W. Scheirer and T. Boult},
  booktitle={Defense, Security, and Sensing},
  year={2013}
}
As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a… Expand
Surveying the Development of Biometric User Authentication on Mobile Phones
Voice authentication using short phrases: Examining accuracy, security and privacy issues
  • R. Johnson, T. Boult, W. Scheirer
  • Computer Science
  • 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)
  • 2013
With vaulted voice verification my voice is my key
  • R. C. Johnson, T. Boult
  • Computer Science
  • 2013 IEEE International Conference on Technologies for Homeland Security (HST)
  • 2013
SCAN-speech biometric template protection based on genus-2 hyper elliptic curve
Authenticating Users with 3D Passwords Captured by Motion Sensors
Your Phone Knows You: Almost Transparent Authentication for Smartphones
...
1
2
3
4
...

References

SHOWING 1-10 OF 15 REFERENCES
Secure remote matching with privacy: Scrambled support vector vaulted verification (S2V3)
Secure speech biometric templates for user authentication
Biometric Template Security
PRIVV: Private remote iris-authentication with Vaulted Verification
Cracking Fuzzy Vaults and Biometric Encryption
Secure speech template protection in speaker verification system
A survey on biometric cryptosystems and cancelable biometrics
Speech cryptographic key regeneration based on password
Cryptographic key generation from voice
The MIT Mobile Device Speaker Verification Corpus: Data Collection and Preliminary Experiments
...
1
2
...