[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3121138.3121165acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbbsConference Proceedingsconference-collections
research-article

Audio-Visual Biometric Authentication for Secured Access into Personal Devices

Published: 22 June 2017 Publication History

Abstract

The security of data is becoming a challenge, as newer smarter devices with increasingly more memory are appearing in the market. Currently, most of the user data remains on personal devices, when the user is either mobile or at workplace. The username and password are turning out to be old-fashioned techniques for secured access. In this work, a multimodal biometric authentication technique is propose to boost access security of such devices. Face recognition, speaker identification along with uttered word are fused together to determine authentication score before access to devices is granted. Experimental results show that as the number of biometric modes is increased, greater trust and satisfaction is experienced by the user.

References

[1]
Gupta, M., Pradeep, K. K. B., and Rao, H. R. 2012. Who is guarding the doors: review of authentication in E-banking. Book chapter in Digital Identity and Access Management: Technologies and Frameworks, Editor: Raj Sharman, IGI Global, 2012.
[2]
Baykara, M. and Das, R. 2013. Real Time Face Recognition and Tracking System. International Conference on Electronics, Computer and Computation. pp. 159--163, Ankara, 7-9 Nov. 2013.
[3]
Memon, Q., Akhtar, S., and Aly, A. 2007. Role Management in Adhoc Networks. Proceedings of Spring Simulation Multi-conference. 1, pp. 131--137, March 2007, Virginia, USA.
[4]
Memon, Q., and Mustafa, A. 2015. Exploring mobile health in a private online social network. International Journal of Electronic Healthcare. 8(1), 51--75.
[5]
Memon, Q. and Khoja, S. 2012. RFID based patient tracking in regional collaborative healthcare. International Journal of Computer Applications in Technology. 45(4), 231--244.
[6]
Yun, Y., et al. 2010. Speaker gender recognition using score level fusion by adaboost. 11th International Conference on Control, Automation, Robotics and Vision. pp. 648--653, Singapore, 7-8 December, 2010.
[7]
Yun, Y., et al. 2012. Text independent speaker gender recognition using lip movement. 12th International Conference on Control, Automation, Robotics and Vision. pp. 176--181, Guangzhou, 5-7 December, 2012.
[8]
Zhang, E., et al. 2015. I-vector based speaker gender recognition. IEEE Advanced Information Technology, Electronic and Automation Control Conference, pp. 729--732, Chongqing, 19-20 Dec. 2015.
[9]
Shi, Q., Nishino, T., and Kajikawa. 2013. Multimodal person authentication system using features of utterance. 2013. Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. pp. 1--7, Kaohsiung, October 29-Nov 1, 2013.
[10]
Yan, Y., et al., 2013. Voice biometrics using linear gaussian model. IET Biometrics. 3(1), 9--15, 2013.
[11]
Gałka, J., Mąsior, M., and Salasa, M. 2015. Voice authentication embedded solution for secured access control. IEEE Transactions on Consumer Electronics. 60(4), 653--661.
[12]
Sizov, A., et al. 2015. Joint speaker verification and antispoofing in the i-vector space. IEEE Transactions on Information Forensics and Security. 10(4), 821--832.
[13]
Barbosa, F. and Silva, W. 2015. Support vector machines, mel-frequency cepstral coefficients and the discrete cosine transform applied on voice based biometric authentication. SAI Intelligent Systems Conference. pp. 1032--1039, London, November 10-11, 2015.
[14]
Billeb, S., et al. 2015. Biometric template protection for speaker recognition based on universal background models. IET Biometrics. 4(2), 116--126.
[15]
Alecsik, P. and Katsaggelios, A. 2006. Audio-visual biometrics. Proceedings of IEEE. 94(11), 2025--2044.
[16]
Jiang, R., Sadka, A., and Crookes, D. 2010. Multimodal biometric human recognition for perceptual human-computer interaction. IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews. 40(6), 676--681.
[17]
Kim, D., Chung, K., and Hong, K. 2010. Person authentication using face, teeth and voice modalities for mobile device security. IEEE Transactions on Consumer Electronics. 56(4), pp. 2678--2685.
[18]
Tresadern, P., et al, 2013. Mobile biometrics: combined face and voice verification for a mobile platform. IEEE Pervasive Computing. pp. 79--87, January-March, 2013
[19]
Schölkopf, B., et al. 2001. Estimating the support of a high-dimensional distribution. Journal of Neural Computation. 13(7), 1443--1471.

Cited By

View all
  • (2023)Voice Visual based Login Authentication using Machine LearningInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-11216(150-155)Online publication date: 1-Jun-2023
  • (2023)An Experimental Analysis on Multicepstral Projection Representation Strategies for Dysphonia DetectionSensors10.3390/s2311519623:11(5196)Online publication date: 30-May-2023
  • (2023)An Experimental Analysis on Mapping Strategies for Cepstral Coefficients Multi-projection in Voice Spoofing Detection ProblemArtificial Intelligence and Soft Computing10.1007/978-3-031-42508-0_27(291-306)Online publication date: 14-Sep-2023
  • Show More Cited By

Index Terms

  1. Audio-Visual Biometric Authentication for Secured Access into Personal Devices

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICBBS '17: Proceedings of the 6th International Conference on Bioinformatics and Biomedical Science
    June 2017
    184 pages
    ISBN:9781450352222
    DOI:10.1145/3121138
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Natl University of Singapore: National University of Singapore

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 June 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Authentication
    2. Biometric
    3. Machine Intelligence
    4. Multimodal Authentication
    5. Secured Access
    6. Security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICBBS '17

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Voice Visual based Login Authentication using Machine LearningInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-11216(150-155)Online publication date: 1-Jun-2023
    • (2023)An Experimental Analysis on Multicepstral Projection Representation Strategies for Dysphonia DetectionSensors10.3390/s2311519623:11(5196)Online publication date: 30-May-2023
    • (2023)An Experimental Analysis on Mapping Strategies for Cepstral Coefficients Multi-projection in Voice Spoofing Detection ProblemArtificial Intelligence and Soft Computing10.1007/978-3-031-42508-0_27(291-306)Online publication date: 14-Sep-2023
    • (2022)Security and Usability of a Personalized User Authentication Paradigm: Insights from a Longitudinal Study with Three Healthcare OrganizationsACM Transactions on Computing for Healthcare10.1145/35646104:1(1-40)Online publication date: 12-Oct-2022
    • (2021)WhisperNet: Deep Siamese Network For Emotion and Speech Tempo Invariant Visual-Only Lip-Based Biometric2021 7th International Conference on Signal Processing and Intelligent Systems (ICSPIS)10.1109/ICSPIS54653.2021.9729394(1-5)Online publication date: 29-Dec-2021
    • (2021)Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive SurveyIEEE Access10.1109/ACCESS.2021.30630319(37431-37455)Online publication date: 2021
    • (2020)Deep Multi-biometric Fusion for Audio-Visual User Re-Identification and VerificationPattern Recognition Applications and Methods10.1007/978-3-030-40014-9_7(136-157)Online publication date: 25-Jan-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media