期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Voice Response Questionnaire System for Speaker Recognition Using Biometric Authentication Interface
1
作者 Chang-Yi Kao Hao-En Chueh 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期913-924,共12页
The use of voice to perform biometric authentication is an importanttechnological development,because it is a non-invasive identification methodand does not require special hardware,so it is less likely to arouse user... The use of voice to perform biometric authentication is an importanttechnological development,because it is a non-invasive identification methodand does not require special hardware,so it is less likely to arouse user disgust.This study tries to apply the voice recognition technology to the speech-driveninteractive voice response questionnaire system aiming to upgrade the traditionalspeech system to an intelligent voice response questionnaire network so that thenew device may offer enterprises more precise data for customer relationshipmanagement(CRM).The intelligence-type voice response gadget is becominga new mobile channel at the current time,with functions of the questionnaireto be built in for the convenience of collecting information on local preferencesthat can be used for localized promotion and publicity.Authors of this study propose a framework using voice recognition and intelligent analysis models to identify target customers through voice messages gathered in the voice response questionnaire system;that is,transforming the traditional speech system to anintelligent voice complex.The speaker recognition system discussed hereemploys volume as the acoustic feature in endpoint detection as the computationload is usually low in this method.To correct two types of errors found in the endpoint detection practice because of ambient noise,this study suggests ways toimprove the situation.First,to reach high accuracy,this study follows a dynamictime warping(DTW)based method to gain speaker identification.Second,it isdevoted to avoiding any errors in endpoint detection by filtering noise from voicesignals before getting recognition and deleting any test utterances that might negatively affect the results of recognition.It is hoped that by so doing the recognitionrate is improved.According to the experimental results,the method proposed inthis research has a high recognition rate,whether it is on personal-level or industrial-level computers,and can reach the practical application standard.Therefore,the voice management system in this research can be regarded as Virtual customerservice staff to use. 展开更多
关键词 biometric authentication customer relationship management speaker recognition QUESTIONNAIRE
下载PDF
A Proposed Biometric Authentication Model to Improve Cloud Systems Security
2
作者 Hosam El-El-Sofany 《Computer Systems Science & Engineering》 SCIE EI 2022年第11期573-589,共17页
Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password.Unfortunately,this approach has many security problems b... Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password.Unfortunately,this approach has many security problems because personal data can be stolen or recognized by hackers.This paper aims to present a cloud-based biometric authentication model(CBioAM)for improving and securing cloud services.The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system(CBioAS),where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’information.The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy,sensitivity,and specificity.The research study introduces a novel algorithm called“Bio_Authen_as_a_Service”for implementing and evaluating the proposed model.The proposed system performs the biometric authentication process securely and preserves the privacy of user information.The experimental result was highly promising for securing cloud services using the proposed model.The experiments showed encouraging results with a performance average of 93.94%,an accuracy average of 96.15%,a sensitivity average of 87.69%,and a specificity average of 97.99%. 展开更多
关键词 Cloud computing cloud security biometrics technologies biometric authentication
下载PDF
An improved and secure multiserver authentication scheme based on biometrics and smartcard 被引量:3
3
作者 Ashish Kumar Hari Om 《Digital Communications and Networks》 SCIE 2018年第1期27-38,共12页
With the advancement in internet technologies, the number of servers has increased remarkably to provide more services to the end users. These services are provided over the public channels, which are insecure and sus... With the advancement in internet technologies, the number of servers has increased remarkably to provide more services to the end users. These services are provided over the public channels, which are insecure and susceptible to interception, modification, and deletion. To provide security, registered entities are authenticated and then a session key is established between them to communicate securely. The conventional schemes anow a user to access services only after their independent registration with each desired server in a multiserver system. Therefore, a user must possess multiple smartcards and memorize various identities and passwords for obtaining services from multiple servers. This has led to the adoption of multiserver authentication in which a user accesses services of multiple servers after registering himself at only one central authority. Recently, Kumar and Om discussed a scheme for multiserver environment by using smartcard. Since the user-memorized passwords are of low entropy, it is possible for an attacker to guess them. This paper uses biometric information of user to enhance the security of the scheme by Kumar and Ore. Moreover, we conducted rigorous security analyses (informal and formal) in this study to prove the security of the proposed scheme against all known attacks. We also simulated our scheme by using the automated tool, ProVerif, to prove its secrecy and authentication properties. A comparative study of the proposed scheme with the existing related schemes shows its effectiveness. 展开更多
关键词 Smartcard Password Security authentication Multi-server biometric ProVerif
下载PDF
Biometric Finger Vein Recognition Using Evolutionary Algorithm with Deep Learning
4
作者 Mohammad Yamin Tom Gedeon +1 位作者 Saleh Bajaba Mona M.Abusurrah 《Computers, Materials & Continua》 SCIE EI 2023年第6期5659-5674,共16页
In recent years,the demand for biometric-based human recog-nition methods has drastically increased to meet the privacy and security requirements.Palm prints,palm veins,finger veins,fingerprints,hand veins and other a... In recent years,the demand for biometric-based human recog-nition methods has drastically increased to meet the privacy and security requirements.Palm prints,palm veins,finger veins,fingerprints,hand veins and other anatomic and behavioral features are utilized in the development of different biometric recognition techniques.Amongst the available biometric recognition techniques,Finger Vein Recognition(FVR)is a general technique that analyzes the patterns of finger veins to authenticate the individuals.Deep Learning(DL)-based techniques have gained immense attention in the recent years,since it accomplishes excellent outcomes in various challenging domains such as computer vision,speech detection and Natural Language Processing(NLP).This technique is a natural fit to overcome the ever-increasing biomet-ric detection problems and cell phone authentication issues in airport security techniques.The current study presents an Automated Biometric Finger Vein Recognition using Evolutionary Algorithm with Deep Learning(ABFVR-EADL)model.The presented ABFVR-EADL model aims to accomplish bio-metric recognition using the patterns of the finger veins.Initially,the presented ABFVR-EADL model employs the histogram equalization technique to pre-process the input images.For feature extraction,the Salp Swarm Algorithm(SSA)with Densely-connected Networks(DenseNet-201)model is exploited,showing the proposed method’s novelty.Finally,the Deep-Stacked Denoising Autoencoder(DSAE)is utilized for biometric recognition.The proposed ABFVR-EADL method was experimentally validated using the benchmark databases,and the outcomes confirmed the productive performance of the proposed ABFVR-EADL model over other DL models. 展开更多
关键词 biometric authentication finger vein recognition deep learning evolutionary algorithm SECURITY PRIVACY
下载PDF
Enhanced Biometric Score Fusion Scheme Based on the AdaBoost Algorithm
5
作者 Wei-Yang Lin Chih-Yang Lin Chuan-Jheng Yang 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第2期187-193,共7页
Information fusion in biometric systems, either multimodal or intramodal fusion, usually provides an improvement in recognition performance. This paper presents an improved score-level fusion scheme called boosted sco... Information fusion in biometric systems, either multimodal or intramodal fusion, usually provides an improvement in recognition performance. This paper presents an improved score-level fusion scheme called boosted score fusion. The proposed framework is a two-stage design where an existing fusion algorithm is adopted at the first stage. At the second stage, the weights obtained by the AdaBoost algorithm are utilized to boost the performance of the previously fused results. The experimental results demonstrate that the performance of several score-level fusion methods can be improved by using the presented method. 展开更多
关键词 Index Terms-AdaBoost biometric authentication face recognition score-level fusion.
下载PDF
Fractal Dimension of Voice-Signal Waveforms 被引量:3
6
作者 Xie Yu qiong, Wen Zhi xiong Non linear Science Center , Wuhan University,Wuhan 430072,Hubei,China 《Wuhan University Journal of Natural Sciences》 CAS 2002年第4期399-402,共4页
The fractal dimension is one important parameter that characterizes waveforms. In this paper, we derive a new method to calculate fractal dimension of digital voice-signal waveforms. We show that fractal dimension is ... The fractal dimension is one important parameter that characterizes waveforms. In this paper, we derive a new method to calculate fractal dimension of digital voice-signal waveforms. We show that fractal dimension is an efficient tool for speaker recognition or speech recognition. It can be used to identify different speakers or distinguish speech. We apply our results to Chinese speaker recognition and numerical experiment shows that fractal dimension is an efficient parameter to characterize individual Chinese speakers. We have developed a semiautomatic voiceprint analysis system based on the theory of this paper and former researches. 展开更多
关键词 Key words fractal dimension voiceprint analysis speaker recognition speech recognition biometric authentication
下载PDF
Robust and Reusable Fuzzy Extractors from Non-Uniform Learning with Errors Problem
7
作者 Joo Woo Jonghyun Kim Jong Hwan Park 《Computers, Materials & Continua》 SCIE EI 2023年第1期1985-2003,共19页
Afuzzy extractor can extract an almost uniformrandom string from a noisy source with enough entropy such as biometric data.To reproduce an identical key from repeated readings of biometric data,the fuzzy extractor gen... Afuzzy extractor can extract an almost uniformrandom string from a noisy source with enough entropy such as biometric data.To reproduce an identical key from repeated readings of biometric data,the fuzzy extractor generates a helper data and a random string from biometric data and uses the helper data to reproduce the random string from the second reading.In 2013,Fuller et al.proposed a computational fuzzy extractor based on the learning with errors problem.Their construction,however,can tolerate a sub-linear fraction of errors and has an inefficient decoding algorithm,which causes the reproducing time to increase significantly.In 2016,Canetti et al.proposed a fuzzy extractor with inputs from low-entropy distributions based on a strong primitive,which is called digital locker.However,their construction necessitates an excessive amount of storage space for the helper data,which is stored in authentication server.Based on these observations,we propose a new efficient computational fuzzy extractorwith small size of helper data.Our scheme supports reusability and robustness,which are security notions that must be satisfied in order to use a fuzzy extractor as a secure authentication method in real life.Also,it conceals no information about the biometric data and thanks to the new decoding algorithm can tolerate linear errors.Based on the non-uniform learning with errors problem,we present a formal security proof for the proposed fuzzy extractor.Furthermore,we analyze the performance of our fuzzy extractor scheme and provide parameter sets that meet the security requirements.As a result of our implementation and analysis,we show that our scheme outperforms previous fuzzy extractor schemes in terms of the efficiency of the generation and reproduction algorithms,as well as the size of helper data. 展开更多
关键词 Fuzzy extractor REUSABILITY robustness biometric authentication non-uniform learning with errors
下载PDF
Iris Recognition Based on Multilevel Thresholding Technique and Modified Fuzzy c-Means Algorithm
8
作者 Slim Ben Chaabane Rafika Harrabi +1 位作者 Anas Bushnag Hassene Seddik 《Journal on Artificial Intelligence》 2022年第4期201-214,共14页
Biometrics represents the technology for measuring the characteristics of the human body.Biometric authentication currently allows for secure,easy,and fast access by recognizing a person based on facial,voice,and fing... Biometrics represents the technology for measuring the characteristics of the human body.Biometric authentication currently allows for secure,easy,and fast access by recognizing a person based on facial,voice,and fingerprint traits.Iris authentication is one of the essential biometric methods for identifying a person.This authentication type has become popular in research and practical applications.Unlike the face and hands,the iris is an internal organ,protected and therefore less likely to be damaged.However,the number of helpful information collected from the iris is much greater than the other biometric human organs.This work proposes a new iris identification model based on a multilevel thresholding technique and modified Fuzzy cmeans algorithm.The multilevel thresholding technique extracts the iris from its surroundings,such as specular reflections,eyelashes,pupils,and sclera.On the other hand,the modified Fuzzy c-means is used to combine and classify the most useful statistical features to maximize the accuracy of the collected information.Therefore,having the most optimal iris recognition.The proposed model results are validated using True Success Rate(TSR)and compared to other existing models.The results show how effective the combination of the two stages of the proposed model is:the Otsu method and modified Fuzzy c-means for the 400 tested images representing 40 people. 展开更多
关键词 biometric authentication RECOGNITION iris recognition statistical features feature extraction fuzzy c-means TSR sensitivity classification
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部