Paper
31 May 2013 Secure voice-based authentication for mobile devices: vaulted voice verification
Author Affiliations +
Abstract
As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has been around a long time. One of the major concerns with using voice as an identifier is the instability of voice. We have developed a protocol that addresses those instabilities and preserves privacy. This paper describes a novel protocol that allows a user to authenticate using voice on a mobile/remote device without compromising their privacy. We first discuss the Vaulted Verification protocol, which has recently been introduced in research literature, and then describe its limitations. We then introduce a novel adaptation and extension of the Vaulted Verification protocol to voice, dubbed Vaulted Voice Verification (V3). Following that we show a performance evaluation and then conclude with a discussion of security and future work.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
R. C. Johnson, Walter J. Scheirer, and Terrance E. Boult "Secure voice-based authentication for mobile devices: vaulted voice verification", Proc. SPIE 8712, Biometric and Surveillance Technology for Human and Activity Identification X, 87120P (31 May 2013); https://doi.org/10.1117/12.2015649
Lens.org Logo
CITATIONS
Cited by 31 scholarly publications and 3 patents.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Biometrics

Computer security

Data modeling

Mobile devices

Binary data

Cell phones

Information security

Back to Top