Olakanmi et al., 2019 - Google Patents
A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access ControlOlakanmi et al., 2019
View HTML- Document ID
- 8908159171391987395
- Author
- Olakanmi O
- Shodipo A
- Publication year
- Publication venue
- International Journal of Advanced Network, Monitoring and Controls
External Links
Snippet
Crypto-authentication schemes become unreliable whenever the private key is compromised, making them unfit for any system or network that requires high level of confidentiality. Key compromise is inevitable due to the wider space of operability of key in …
- 238000004891 communication 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ali et al. | Edge-centric multimodal authentication system using encrypted biometric templates | |
TWI641965B (en) | Method and system of authentication based on voiceprint recognition | |
Liu et al. | An MFCC‐based text‐independent speaker identification system for access control | |
WO2017215558A1 (en) | Voiceprint recognition method and device | |
Prabakaran et al. | A review on performance of voice feature extraction techniques | |
Marras et al. | Adversarial Optimization for Dictionary Attacks on Speaker Verification. | |
Pham et al. | EEG-based user authentication in multilevel security systems | |
Nagakrishnan et al. | A robust cryptosystem to enhance the security in speech based person authentication | |
Fouad et al. | User authentication based on dynamic keystroke recognition | |
Rahulamathavan | Privacy-preserving similarity calculation of speaker features using fully homomorphic encryption | |
Hamza et al. | A novel automatic voice recognition system based on text-independent in a noisy environment | |
Olakanmi et al. | A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control | |
Huang et al. | Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum | |
Mokgonyane et al. | Development of a text-independent speaker recognition system for biometric access control | |
Jha et al. | Analysis of Human Voice for Speaker Recognition: Concepts and Advancement | |
Iqbal et al. | Voice Recognition using HMM with MFCC for Secure ATM | |
Lopez‐Otero et al. | Influence of speaker de‐identification in depression detection | |
Kekre et al. | Speaker identification using row mean of DCT and walsh hadamard transform | |
Kekre et al. | Performance comparison of speaker identification using dct, walsh, haar on full and row mean of spectrogram | |
Scheidat et al. | Handwriting verification–Comparison of a multi-algorithmic and a multi-semantic approach | |
Basit et al. | SDI: A tool for speech differentiation in user identification | |
Do et al. | Using keystroke dynamics for implicit authentication on smartphone | |
Xavier | Identification of Age Voiceprint Using Machine Learning Algorithms | |
Nguyen et al. | Vietnamese speaker authentication using deep models | |
Cocioceanu et al. | Computer-based statistical description of phonetical balance for Romanian utterances |