Nothing Special   »   [go: up one dir, main page]

Olakanmi et al., 2019 - Google Patents

A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control

Olakanmi et al., 2019

View HTML
Document ID
8908159171391987395
Author
Olakanmi O
Shodipo A
Publication year
Publication venue
International Journal of Advanced Network, Monitoring and Controls

External Links

Snippet

Crypto-authentication schemes become unreliable whenever the private key is compromised, making them unfit for any system or network that requires high level of confidentiality. Key compromise is inevitable due to the wider space of operability of key in …
Continue reading at sciendo.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
Ali et al. Edge-centric multimodal authentication system using encrypted biometric templates
TWI641965B (en) Method and system of authentication based on voiceprint recognition
Liu et al. An MFCC‐based text‐independent speaker identification system for access control
WO2017215558A1 (en) Voiceprint recognition method and device
Prabakaran et al. A review on performance of voice feature extraction techniques
Marras et al. Adversarial Optimization for Dictionary Attacks on Speaker Verification.
Pham et al. EEG-based user authentication in multilevel security systems
Nagakrishnan et al. A robust cryptosystem to enhance the security in speech based person authentication
Fouad et al. User authentication based on dynamic keystroke recognition
Rahulamathavan Privacy-preserving similarity calculation of speaker features using fully homomorphic encryption
Hamza et al. A novel automatic voice recognition system based on text-independent in a noisy environment
Olakanmi et al. A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control
Huang et al. Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
Mokgonyane et al. Development of a text-independent speaker recognition system for biometric access control
Jha et al. Analysis of Human Voice for Speaker Recognition: Concepts and Advancement
Iqbal et al. Voice Recognition using HMM with MFCC for Secure ATM
Lopez‐Otero et al. Influence of speaker de‐identification in depression detection
Kekre et al. Speaker identification using row mean of DCT and walsh hadamard transform
Kekre et al. Performance comparison of speaker identification using dct, walsh, haar on full and row mean of spectrogram
Scheidat et al. Handwriting verification–Comparison of a multi-algorithmic and a multi-semantic approach
Basit et al. SDI: A tool for speech differentiation in user identification
Do et al. Using keystroke dynamics for implicit authentication on smartphone
Xavier Identification of Age Voiceprint Using Machine Learning Algorithms
Nguyen et al. Vietnamese speaker authentication using deep models
Cocioceanu et al. Computer-based statistical description of phonetical balance for Romanian utterances