User Authentication Method via Speaker Recognition and Speech Synthesis Detection
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Hyun | - |
dc.contributor.author | Kim, TaeGuen | - |
dc.date.accessioned | 2022-02-14T01:40:09Z | - |
dc.date.available | 2022-02-14T01:40:09Z | - |
dc.date.issued | 2022-01-10 | - |
dc.identifier.issn | 1939-0122 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/20393 | - |
dc.description.abstract | As the Internet has been developed, various online services such as social media services are introduced and widely used by many people. Traditionally, many online services utilize self-certification methods that are made using public certificates or resident registration numbers, but it is found that the existing methods pose the risk of recent personal information leakage accidents. The most popular authentication method to compensate for these problems is biometric authentication technology. The biometric authentication techniques are considered relatively safe from risks like personal information theft, forgery, etc. Among many biometric-based methods, we studied the speaker recognition method, which is considered suitable to be used as a user authentication method of the social media service usually accessed in the smartphone environment. In this paper, we first propose a speaker recognition-based authentication method that identifies and authenticates individual voice patterns, and we also present a synthesis speech detection method that is used to prevent a masquerading attack using synthetic voices. | - |
dc.format.extent | 10 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | John Wiley & Sons Ltd. | - |
dc.title | User Authentication Method via Speaker Recognition and Speech Synthesis Detection | - |
dc.type | Article | - |
dc.publisher.location | 영국 | - |
dc.identifier.doi | 10.1155/2022/5755785 | - |
dc.identifier.scopusid | 2-s2.0-85124031701 | - |
dc.identifier.wosid | 000767527500001 | - |
dc.identifier.bibliographicCitation | Security and Communication Networks, v.2022, no.0, pp 1 - 10 | - |
dc.citation.title | Security and Communication Networks | - |
dc.citation.volume | 2022 | - |
dc.citation.number | 0 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 10 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.