Speaker Authentication: Exploding Some of the Myths

Markowitz, Judith
September 2007
Speech Technology Magazine;Sep2007, Vol. 12 Issue 7, p44
The article discusses misconceptions and myths regarding speaker authentication (SA), a biometric technology that ensures people are who they claim to be. It is inferred that SA, like automatic speech recognition (ASR), does not eliminate basic questions about what it is and how it works. Familiarity with the human behavior is attributed as a primary factor behind the confusion that SA solutions contain biometric capabilities that excel further than ASR systems since the former contains little speaker-specific information. Another myth explored is that it is much easier for a professional mimic to fool other people than an SA system.


Related Articles

  • TALK GOOD: BEST PRACTICES IN SPEECH DEPLOYMENT. Bailor, Coreen // CRM Magazine;Oct2005, Vol. 9 Issue 10, p16 

    Presents a review of industry experts' tips for organizations evaluating speech recognition technologies, from the annual SpeechTEK International Exposition and Educational Conference in New York in August 2005. Best practices used by companies deploying speech applications; Evaluation of...

  • Voiceprint Recognition Systems for Remote Authentication-A Survey. Saquib, Zia; Salam, Nirmala; Nair, Rekha; Pandey, Nipun // International Journal of Hybrid Information Technology;2011, Vol. 4 Issue 2, p79 

    Voiceprint Recognition System also known as a Speaker Recognition System (SRS) is the best-known commercialized forms of voice Biometrics. Automated speaker recognition is the computing task of validating a user's claimed identity using characteristics extracted from their voices. In contrast to...

  • A Multimodal Biometric System Using Linear Discriminant Analysis For Improved Performance. Khan, Aamir; Farhan, Muhammad; Khurshid, Aasim; Akram, Adeel // International Journal of Computer Science Issues (IJCSI);Nov2011, Vol. 8 Issue 6, p122 

    Essentially a biometric system is a pattern recognition system which recognizes a user by determining the authenticity of a specific anatomical or behavioral characteristic possessed by the user. With the ever increasing integration of computers and Internet into daily life style, it has become...

  • An Efficient Process of Human Recognition Fusing Palmprint and Speech features.  // International Journal of Computer Applications;Sep2010, Vol. 6, p1 

    The article discusses the process of human recognition fusion of two biometric traits which include palmprint and speech signal. It evaluates the database images and speech signal in obtaining matching scores and mentions that they were compared with query image and speech features. It notes...

  • Oh, the Places You'll Go. Shaked, Nava // Speech Technology Magazine;Nov/Dec2011, Vol. 16 Issue 6, p4 

    The article discusses the importance of speech technology implementation in the industry. It states that the combination of speech biometrics with recognition allows verification of the user while collecting information about the request. It notes that the multimodality approach uses speech...

  • Intelligent Speaker Verification based Biometric System for Electronic Commerce Applications. Kounoudes, Anastasis; Mavromoustakos, Stephanos // Enformatika;2006, Vol. 14, p290 

    Electronic commerce is growing rapidly with on-line sales already heading for hundreds of billion dollars per year. Due to the huge amount of money transferred everyday, an increased security level is required. In this work we present the architecture of an intelligent speaker verification...

  • Can the Market Identify with Voice Biometrics? Joe, Ryan // Speech Technology Magazine;May/Jun2010, Vol. 15 Issue 3, p15 

    The author discusses the challenges faced by voice biometrics deployment in different markets. He says that the fundamental problem in deploying voice biometrics is that while enterprise customers see the potential in the technology, they have avoided its large scale use and the hurdle is to...

  • Fraud Targets the Contact Center: What Now? Averbouch, Dana; Kahn, Jade // Speech Technology Magazine;Winter2013, Vol. 18 Issue 4, p9 

    The article discusses the threat of fraud and cross-channel attacks concentrated on customer contact centers. Suggested methods to address the problems are presented including cross-channel fraud detection, leveraging existing platforms, and multi-layered solution which comprises voice...

  • Will Biometrics Kick Passwords to the Curb? Adams, John // American Banker;9/27/2012, Vol. 177 Issue 150, p15 

    The article discusses the use of biometrics as an authentication method that is used to control access to account-based services. Intel company's research on combining mobile software with a biometric sensor that can identify people by their hand's vein patterns is mentioned. OneID's public key...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics