Have a personal or library account? Click to login

A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control

Open Access
|Oct 2019

Figures & Tables

Figure 1.

Model of the remote voice based access control
Model of the remote voice based access control

Figure 2.

Speech signal after undergoing framing
Speech signal after undergoing framing

Figure 3.

Hamming window before applying it on speech signal
Hamming window before applying it on speech signal

Figure 4.

Speech signal after applying the Hamming Window
Speech signal after applying the Hamming Window

Figure 5.

Audio signal with magnitude and phase
Audio signal with magnitude and phase

Figure 6.

Audio signal considering the magnitude only
Audio signal considering the magnitude only

Figure 7.

Mel-filter bank
Mel-filter bank

Figure 8.

Computation cost (ms)
Computation cost (ms)

Figure 9.

Energy cost in terms of cycles
Energy cost in terms of cycles

PERFORMANCE EVALUATION OF VOICE SIGNATURE BASED AUTHENTICATION APPROACH

TrialNo. of samplesNo. of False rejectionNo. of False acceptance% Accuracy
User 1 303187
User 2 303283
User 3 302093
User 4 301193
User 5 324283
Language: English
Page range: 69 - 74
Published on: Oct 8, 2019
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2019 Oladayo Olufemi Olakanmi, Aminat Shodipo, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.