{"title":"语音加密识别认证- VERA","authors":"Sebastian Szlósarczyk, Andrea Schulte","doi":"10.1109/NGMAST.2015.74","DOIUrl":null,"url":null,"abstract":"We propose VERA - an authentication scheme where sensitive data on mobile phones can be secured or whereby services can be locked by the user's voice. Our algorithm takes use of acoustic fingerprints to identify the personalized voice. The security of the algorithm depends on the discrete logarithm problem in ZN where N is a safe prime. Further we evaluate two practical examples on Android devices where our scheme is used: First the encryption of any data(set). Second locking a mobile phone. Voice is the basic for both of the fields.","PeriodicalId":217588,"journal":{"name":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Voice Encrypted Recognition Authentication - VERA\",\"authors\":\"Sebastian Szlósarczyk, Andrea Schulte\",\"doi\":\"10.1109/NGMAST.2015.74\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose VERA - an authentication scheme where sensitive data on mobile phones can be secured or whereby services can be locked by the user's voice. Our algorithm takes use of acoustic fingerprints to identify the personalized voice. The security of the algorithm depends on the discrete logarithm problem in ZN where N is a safe prime. Further we evaluate two practical examples on Android devices where our scheme is used: First the encryption of any data(set). Second locking a mobile phone. Voice is the basic for both of the fields.\",\"PeriodicalId\":217588,\"journal\":{\"name\":\"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NGMAST.2015.74\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGMAST.2015.74","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We propose VERA - an authentication scheme where sensitive data on mobile phones can be secured or whereby services can be locked by the user's voice. Our algorithm takes use of acoustic fingerprints to identify the personalized voice. The security of the algorithm depends on the discrete logarithm problem in ZN where N is a safe prime. Further we evaluate two practical examples on Android devices where our scheme is used: First the encryption of any data(set). Second locking a mobile phone. Voice is the basic for both of the fields.