通过电话线验证说话人的身份:我们在哪里,我们要去哪里

T. Feustel, G. Velius
{"title":"通过电话线验证说话人的身份:我们在哪里,我们要去哪里","authors":"T. Feustel, G. Velius","doi":"10.1109/CCST.1989.751976","DOIUrl":null,"url":null,"abstract":"The ability to verify the identity of a speaker by analyzing speech, or Speaker Identity Verification (SIV), is an attractive means of providing security in the telephone network. As with other biometric security techniques, SIV uses a quality inherent in the user being verified, rather than a possession (e.g. badge) or piece of knowledge (e.g. password). SIV has a further advantage since it does not require elaborate customer premises equipment: only a telephone is needed. We will discuss potential applications of voice-based security and present accuracy data from a series of evaluative experiments with a Bellcore developed verifier. In addition, we will offer suggestions on how verification performance might be further improved, based on data collected using human listeners. Finally, although SIV system performance is quite good, there remain sonic difficult problems. Foremost among these is that individuals' voices are known to. change over time in ways that are poorly understood. Until more is known of the causes behind such changes, they must be acknowledged and dealt with in any potential application. We will discuss empirical and theoretical considerations in template management and criterion determination, particularly as they relate to changes that occur over time.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Speaker identity verification over telephone lines: where we are and where we are going\",\"authors\":\"T. Feustel, G. Velius\",\"doi\":\"10.1109/CCST.1989.751976\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The ability to verify the identity of a speaker by analyzing speech, or Speaker Identity Verification (SIV), is an attractive means of providing security in the telephone network. As with other biometric security techniques, SIV uses a quality inherent in the user being verified, rather than a possession (e.g. badge) or piece of knowledge (e.g. password). SIV has a further advantage since it does not require elaborate customer premises equipment: only a telephone is needed. We will discuss potential applications of voice-based security and present accuracy data from a series of evaluative experiments with a Bellcore developed verifier. In addition, we will offer suggestions on how verification performance might be further improved, based on data collected using human listeners. Finally, although SIV system performance is quite good, there remain sonic difficult problems. Foremost among these is that individuals' voices are known to. change over time in ways that are poorly understood. Until more is known of the causes behind such changes, they must be acknowledged and dealt with in any potential application. We will discuss empirical and theoretical considerations in template management and criterion determination, particularly as they relate to changes that occur over time.\",\"PeriodicalId\":288105,\"journal\":{\"name\":\"Proceedings. International Carnahan Conference on Security Technology\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-10-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1989.751976\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1989.751976","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

通过分析语音来验证说话人身份的能力,或说话人身份验证(SIV),是在电话网络中提供安全的一种有吸引力的手段。与其他生物识别安全技术一样,SIV使用被验证用户固有的质量,而不是所有权(例如徽章)或知识(例如密码)。SIV还有一个进一步的优势,因为它不需要复杂的客户场所设备:只需要一部电话。我们将讨论基于语音的安全的潜在应用,并提供来自Bellcore开发的验证器的一系列评估实验的准确性数据。此外,我们将根据使用人类侦听器收集的数据,就如何进一步改进验证性能提供建议。最后,虽然SIV系统的性能相当好,但仍然存在声音难题。其中最重要的是,个人的声音是众所周知的。随着时间的推移,人们对其变化的方式知之甚少。在更多地了解这些变化背后的原因之前,必须在任何潜在的应用程序中承认并处理它们。我们将讨论模板管理和标准确定中的经验和理论考虑,特别是当它们与随时间发生的变化相关时。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Speaker identity verification over telephone lines: where we are and where we are going
The ability to verify the identity of a speaker by analyzing speech, or Speaker Identity Verification (SIV), is an attractive means of providing security in the telephone network. As with other biometric security techniques, SIV uses a quality inherent in the user being verified, rather than a possession (e.g. badge) or piece of knowledge (e.g. password). SIV has a further advantage since it does not require elaborate customer premises equipment: only a telephone is needed. We will discuss potential applications of voice-based security and present accuracy data from a series of evaluative experiments with a Bellcore developed verifier. In addition, we will offer suggestions on how verification performance might be further improved, based on data collected using human listeners. Finally, although SIV system performance is quite good, there remain sonic difficult problems. Foremost among these is that individuals' voices are known to. change over time in ways that are poorly understood. Until more is known of the causes behind such changes, they must be acknowledged and dealt with in any potential application. We will discuss empirical and theoretical considerations in template management and criterion determination, particularly as they relate to changes that occur over time.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信