NOTE: The following materials are presented for timely dissemination of academic and technical work. Copyright and all other rights therein are reserved by authors and/or other copyright holders. Persoanl use of the following materials is permitted and, however, people using the materials or information are expected to adhere to the terms and constraints invoked by the related copyright.

Personalize Mobile Access by Speaker Authentication


In recent years wireless networks have been rapidly grown up, which leads to the possibility of pervasive access to information systems. At present, the most commonly available ubiquitous access device to the network is still mobile telephone. In particular, cellular phone can be used for ubiquitous access anytime and anywhere and, therefore, the only ubiquitous user access mode is spoken language. Obviously, both a cellular phone handset and any private information access or electronic transaction demand to be protected from being stolen or broken in, which paves the way for personalized services. In this chapter, we envisage a bilateral user authentication framework for applications in wireless environments. On the one hand, we use text-dependent speaker verification for handset protection as the primary stage of our security system. On the other hand, a more sophisticated speaker authentication system consisting of text-independent speaker verification and verbal information verification is located in the authentication center of a server site for further protection. Our framework attempts to derive maximum synergy from biometric and non-biometric speech technologies without loss of easy-to-access properties. Under this framework, we have conducted some experiments by enabling component technologies in terms of Mandarin Chinese. Our simulation results indicate that the enabling component techniques to support this framework are ready to build such an authentication system for applications to personalized mobile access.

Keywords: Speaker authentication, personalized mobile access, speaker verification, text-dependent, text-independent, verbal information verification, bilateral authentication, cellular phone, speech information system, server-client architecture

Click chapter5.pdf for full text.