About Speaker Recognition Techology

Similar documents
Voice Authentication for ATM Security

School Class Monitoring System Based on Audio Signal Processing

NFC & Biometrics. Christophe Rosenberger

User Authentication Methods for Mobile Systems Dr Steven Furnell

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Speech recognition for human computer interaction

Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs

Securing Electronic Medical Records using Biometric Authentication

Speech Signal Processing: An Overview

Measuring Performance in a Biometrics Based Multi-Factor Authentication Dialog. A Nuance Education Paper

ARMORVOX IMPOSTORMAPS HOW TO BUILD AN EFFECTIVE VOICE BIOMETRIC SOLUTION IN THREE EASY STEPS

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Available from Deakin Research Online:

Establishing the Uniqueness of the Human Voice for Security Applications

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Securing Electronic Medical Records Using Biometric Authentication

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Framework for Biometric Enabled Unified Core Banking

Multi-factor authentication

Accessing the bank account without card and password in ATM using biometric technology

May For other information please contact:

Biometrics in Secure e-transaction

APPLYING MFCC-BASED AUTOMATIC SPEAKER RECOGNITION TO GSM AND FORENSIC DATA

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Speaker Identification and Verification (SIV) Introduction and Best Practices Document

French Justice Portal. Authentication methods and technologies. Page n 1

Secure-Access System via Fixed and Mobile Telephone Networks using Voice Biometrics

Myanmar Continuous Speech Recognition System Based on DTW and HMM

A Various Biometric application for authentication and identification

Biometric Authentication using Online Signatures

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device

L9: Cepstral analysis

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

VoiceSign TM Solution. Voice Signature Overview

solutions Biometrics integration

Speech recognition technology for mobile phones

Speech Recognition on Cell Broadband Engine UCRL-PRES

Decision on adequate information system management. (Official Gazette 37/2010)

Enterprise Voice Technology Solutions: A Primer

Expertise for biometric solution

How To Improve Security Of An Atm

Application-Specific Biometric Templates

Marathi Interactive Voice Response System (IVRS) using MFCC and DTW

Ericsson T18s Voice Dialing Simulator

Two-Factor Authentication Making Sense of all the Options

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

Information Leakage in Encrypted Network Traffic

Advanced Signal Processing and Digital Noise Reduction

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

22 nd NISS Conference

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Securing corporate assets with two factor authentication

Assignment 1 Biometric authentication

Multimodal Biometric Recognition Security System

Speech: A Challenge to Digital Signal Processing Technology for Human-to-Computer Interaction

Lecture 12: An Overview of Speech Recognition

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

White Paper PalmSecure truedentity

Voice biometrics. Advait Deshpande Nuance Communications, Inc. All rights reserved. Page 1

Developing an Isolated Word Recognition System in MATLAB

Artificial Neural Network for Speech Recognition

Audio Engineering Society. Convention Paper. Presented at the 129th Convention 2010 November 4 7 San Francisco, CA, USA

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

SPEAKER IDENTIFICATION FROM YOUTUBE OBTAINED DATA

Progressive Authentication on Mobile Devices. They are typically restricted to a single security signal in the form of a PIN, password, or unlock

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

WHITE PAPER. Let s do BI (Biometric Identification)

Turkish Radiology Dictation System

CUSTOMER VERIFICATION FREQUENTLY ASKED QUESTIONS Version 2.4

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Improving Online Security with Strong, Personalized User Authentication

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

White paper Fujitsu Identity Management and PalmSecure

IEEE Proof. Web Version. PROGRESSIVE speaker adaptation has been considered

VOICE RECOGNITION KIT USING HM2007. Speech Recognition System. Features. Specification. Applications

Continuous Biometric User Authentication in Online Examinations

Functional Auditory Performance Indicators (FAPI)

Part 1: Overview of Biometric Technology and Verification Systems

Minnesota State Colleges and Universities System Guideline Chapter 5 Administration

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics

User Behaviour Analytics

Robust Methods for Automatic Transcription and Alignment of Speech Signals

Biometrics Unique, simple, convenient

W.A.R.N. Passive Biometric ID Card Solution

BIOMETRIC SOLUTIONS 2013 ISSUE

MegaMatcher Case Study

Biometric SSO Authentication Using Java Enterprise System

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Signature Verification Why xyzmo offers the leading solution.

TECHNOLOGY WHITEPAPER

Contact Center Automation

Things to remember when transcribing speech

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

Visual-based ID Verification by Signature Tracking

Application of Biometric Technology Solutions to Enhance Security

Speech Analytics. Whitepaper

Membering T M : A Conference Call Service with Speaker-Independent Name Dialing on AIN

Transcription:

About Speaker Recognition Techology Gerik Alexander von Graevenitz Bergdata Biometrics GmbH, Bonn, Germany gerik @ graevenitz.de Overview about Biometrics Biometrics refers to the automatic identification of a living person based on physiological or behavioural characteristics. There are many types of biometric technologies on the market: face recognition, fingerprint recognition, finger geometry, hand geometry, iris recognition, vein recognition, voice and signature recognition. The method of biometric identification is preferred over traditional methods involving passwords and PIN numbers for various reasons: The person to be identified is required to be physically present at the point-of-identification. The identification based on biometric techniques obviates the need to remember a password or carry a token or a smartcard. With the rapid increase in use of PINs and passwords occurring as a result of the information technology revolution, it is necessary to restrict access to sensitive/personal data. By replacing PINs and passwords, biometric techniques are more convenient in relation to the user and can potentially prevent unauthorised access to or fraudulent use of ATMs, Time & Attendance Systems, cellular phones, smart cards, desktop PCs,

Workstations, and computer networks. PINs and passwords may be forgotten, and token based methods of identification, like passports, driver's licenses and insurance cards, may be forgotten, stolen, or lost. Various types of biometric systems are being used for real-time identification; the most popular are based on face recognition and fingerprint matching. Furthermore, there are other biometric systems that utilise iris and retinal scan, speech, face, and hand geometry. Voice Recognition Speech contains information about the identity of the speaker. A speech signal includes also the language this is spoken, the presence and type of speech pathologies, the physical and emotional state of the speaker. Often, humans are able to extract the identity information when the speech comes from a speaker they are acquainted with. LAWRENCE KERSTA at the Bell Labs made the first major step from speaker verification by humans towards speaker verifications by computers in the early 1960s where he introduced the term voiceprint for a spectrogram, which was generated by a complicated electro-mechanical device. The voiceprint was matched with a verification algorithm that was based on visual comparison. The recording of the human voice for speaker recognition requires a human to say something. In other words the human has to show some of his/her speaking behavior. Therefore, voice recognition fits within the category of behavioral biometrics. - 2 -

A speech signal is a very complex function of the speaker and his environment that can be captured easily with a standard microphone. In contradiction to a physical biometric technology such as fingerprint, in speaker recognition are not fixed, no static and no physical characteristics. In speaker recognition there are only information depending on an act. The state of-the-art approach to automatic speaker verification (denoted as ASV) is to build a stochastic model of a speaker, based on speaker characteristics extracted from the available amount of training speech. In speaker recognition we differ between low-level and high-level information. High level-information are values like a dialect, an accent, the talking style and the subject manner of context. These features are currently only recognitized and analyzed by humans. As low-level are denoted the information like pitch period, rhythm, tone, spectral magnitude, frequencies, and bandwiths of an individual s voice. These features are used by speaker recognition systems. Voice verification works with a microphone or with a regular telephone handset, although performance increases with higher quality capture devices. The hardware costs are very low, because today nearly every PC includes a microphone or it can be easily connected one. However voice recognition has got its problems with persons who are husky or mimic another voice. If this happens the user may not be recognized by the system. Additionally, the likelihood of recognition decreases with poorquality microphones and if there is background noise. Voice verification will be a complementary technique for e.g. finger-scan technology as many people see finger recognition technology as a higher authentication - 3 -

form. In general voice authentication has got a high EER, therefore it is in general not used for identification. The speech is variant in time, therefore adaptive templates or methods are necessary. Intraspeaker variance versus Interspeaker variance The variation of features caused by different speakers is called interspeaker variance. The interspeaker variance is caused by different vocal characteristics of individuals and provides useful information for distinguishing different speakers. Another kind of variation intraspeaker variation occurs when a speaker pronounces the same word or sentence but cannot repeat the utterance in exactly the same way from trial to trail. The intraspeaker variation includes the different speaking rate, the emotional state of the speaker and the speaking environment. The intraspeaker variation is the main factor that causes the performance degradation of speaker recognition systems. Therefore, it is desirable to select the parameters that show lower intraspeaker but high interspeaker variability. In many speaker recognition applications, it is possible to reduce the intraspeaker variability by requiring the user to pronounce the test sentence that contains the same text or vocabularies as the training sentences. This is the case of text-dependent speaker recognition methods. - 4 -

Text-dependent vs. text-independent speaker recognition. Speaker recognition systems are classified as text-dependent (fixed-text) and text-independent (free-text). The text-dependent systems require a user to repronounce some specified utterances, usually containing the same text as the training data. There is no such constraint in textindependent systems. In the text-dependent system, the knowledge of knowing words or word sequence can be exploited to improve the performance. There are two main reasons for wanting a speaker verification system to prompt the client with a new password phrase for each new test occasion: (a) The user does not have to remember a fixed password and (b) the system can not easily be defeated with the replaying of recordings of the user s speech. There are a few methods that are used for speaker verification. The textdependent speaker recognition methods can be classified into DTW (dynamic time warping) or HMM (Hidden Markov Model) based methods. Text-independent speaker verification has been an active area of research for a long time because performance degradation due to mismatched conditions has been a significant barrier for deployment of speaker recognition technologies. - 5 -

How it works. There are a few methods that are used for speaker verification. The textdependent speaker recognition methods can be classified into DTW (dynamic time warping) or HMM (Hidden Markov Model) based methods. The DTW-methods are using instantaneous and transitional cepstra. In 1963, Bogert et al. published a paper with the title The Quefrency Analysis of Time Series for Echoes. They defined a new signal processing technique where they defined an extensive vocabulary interchanging letters like the word spectrum in cepstrum. For the computation of the cepstrum usually a Fast Fourier Transformation is used. Since 1975 the Hidden Markov Modeling (denoted as HMM) is a technique that has become popular in speech recognition research, named by the Russian mathematician A.A. Markov. With HMM-based methods, the statistical variation of spectral features is measured. Examples for the text-independent speaker recognition methods are: the average-spectrum-based method, the VQ-based methods and the multivariate auto-regression (MAR) model. The average-spectrum-based method is using a weighted cepstral distance measure, where the phoneme effects in speech spectra are removed by averaging the spectra. - 6 -

With the VQ-based method a set of short-term training feature vectors of a speaker can be used directly to represent the essential characteristics of that speaker. However, such a direct representation is impractical when the number of training vectors is large, since the memory and amount of computation required become prohibitively large. Therefore, attempts have been made to find efficient ways of compressing the training data using vector quantization (VQ) techniques. Montacie et alii applied a multivariate auto-regression (MAR) model to the time series of cepstral vectors to characterize speakers with receiving quite good results. Anyways, the text-independent speaker verification has been an active area of research for a long time because performance degradation due to mismatched conditions has been a significant barrier for deployment of speaker recognition technologies. Sources of Verification Errors There are a few sources of verification errors that may occur: Misspoken or misread prompted phrases Extreme emotional states (e.g. stress or duress) The attitude how the speech is said is another than with the enrollment Time varying (intra- or intersession) microphone placement Poor or inconsistent room acoustics (e.g. multipath and noise) Channel mismatch (e.g. using different microphones for enrollment - 7 -

and verification) Different pronunciation speed during the verification compared with the training data. Sickness (e.g. head colds can alter the vocal tract) Aging (the vocal tract can drift away from models with age) Women have a quite higher FRR, because the spectral of the voice is smaller. Faking a voice verification system requires a very high quality recorder, which is not easy to find on the market. Normal voice recorders that are on the market do not record the complete spectrum of the voice that is necessary to fake the system. The quality loss of the voice recording system must be very low, too. With the most voice verification systems imitating a voice from one human by another human does not lead to success. The mentioned sources of verification errors lead to the result that actually it is quite complex to do an identification with voice verification. Therefore the voice verification systems are used for verification in most cases in combination with a PIN or a chipcard to identify the user in a database. Applications The application for speaker verification systems are: Time and Attendance Systems Access Control Systems - 8 -

Telephone-Banking/Broking Biometric Login to telephone aided shopping systems Information and Reservation Services Security control for confidential information Forensic purposes Conclusion The advantage of a voice verification system is the very cheap hardware that is needed in most computers a soundcard and a microphone is implemented. It use very easy to use and to implement with applications for the telecommunication. Voice recognition has got a few disadvantages, too. On the one hand the human voice is not invariant in time therefore the biometric template must be adapted during progressing time. The human voice is also variable through temporal variations of the voice, caused by a cold, hoarseness, stress, emotional different states or puberty vocal change. On the other hand voice recognition systems have got a higher EER compared to fingerprint recognition systems, because the human voice is not as unique as fingerprints. For the computation of the Fast Fourier Transformation the systems needs to have a co-processor and more processing power than e.g. for fingerprint matching. Therefore speaker verification systems are not suitable for mobile applications / battery powered systems in the current state. - 9 -