NOTE: The following materials are presented for timely
dissemination of academic and technical work. Copyright and all other rights
therein are reserved by authors and/or other copyright holders. Persoanl
use of the following materials is permitted and, however, people using
the materials or information are expected to adhere to the terms and
constraints invoked by the related copyright.
Personalize Mobile Access by Speaker Authentication
ABSTRACT
In recent years wireless networks have been rapidly grown up, which leads
to the possibility of pervasive access to information systems.
At present, the most commonly available ubiquitous access device to the
network is still mobile telephone. In particular, cellular phone can be used
for ubiquitous access anytime and anywhere and, therefore, the only ubiquitous
user access mode is spoken language. Obviously, both a cellular phone handset
and any private information access or electronic transaction demand to
be protected from being stolen or broken in, which paves the way for
personalized services. In this chapter, we envisage a bilateral user
authentication framework for applications in wireless environments.
On the one hand, we use text-dependent speaker verification for handset
protection as the primary stage of our security system. On the other hand,
a more sophisticated speaker authentication system consisting of
text-independent speaker verification and verbal information verification is
located in the authentication center of a server site for further protection.
Our framework attempts to derive maximum synergy from biometric and
non-biometric speech technologies without loss of easy-to-access properties.
Under this framework, we have conducted some experiments by enabling
component technologies in terms of Mandarin Chinese. Our simulation results
indicate that the enabling component techniques to support this framework
are ready to build such an authentication system for applications to
personalized mobile access.
Keywords: Speaker authentication, personalized mobile access,
speaker verification, text-dependent, text-independent,
verbal information verification, bilateral authentication,
cellular phone, speech information system, server-client architecture
Click chapter5.pdf for full text.