Browse > Article
http://dx.doi.org/10.5391/IJFIS.2004.4.2.176

Automatic Log-in System by the Speaker Certification  

Sohn, Young-Sun (Dept. of information & communications engineering, Tongmyong University of information technology)
Publication Information
International Journal of Fuzzy Logic and Intelligent Systems / v.4, no.2, 2004 , pp. 176-181 More about this Journal
Abstract
This paper introduces a Web site login system that uses user's native voice to improve the bother of remembering the ID and password in order to login the Web site. The DTW method that applies fuzzy inference is used as the speaker recognition algorithm. We get the ACC(Average Cepstrum Coefficient) membership function by each degree, by using the LPC that models the vocal chords, to block the recorded voice that is problem for the speaker recognition. We infer the existence of the recorded voice by setting on the basis of the number of zeros that is the value of the ACC membership function, and on the basis of the average value of the ACC membership function. We experiment the six Web sites for the six subjects and get the result that protects the recorded voice about 98% that is recorded by the digital recorder.
Keywords
fuzzy inference; speaker recognition; voice; automatic login; intelligent;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hyoun-Joo Go, Sang-Won Lee, Myung-Geun Chun, 'Iris Pattern Recognition for Personal Identification and Authentication Algorithm', The KIPS Transactions : PartC, Vol.8-C No.5, PP.499-506, 2001
2 Younh-Hwan Oh, 'Information Processing of Voice Language ', Hongrung Press, 1998
3 Hyeong-Soon Kim, 'Technical tendency of the voice recognition', The Magazine of the lEEK, Vol.22, No.5, PP.529-540, 1995
4 Hyun-Yeol Jeong, 'The present condition and the prospect of the technique of the speaker recognition system using voice', Communications of the Korea Information Science Society, Vol.19, No.7, PP.32-44, 2001
5 Myung-Kyung Chu, Young-Sun Sohn, 'Cursor Moving by Voice Command using DTW method', Journal of Fuzzy Logic and Intelligent Systems, Vol.11, No.1, PP.3-8, 2000
6 Jeong-Gak Lyu, Gun-Hee Lee, Tae-Shik Shon, Song-Hwa Chae, Dong-Kyoo Kim, 'Modified Implementation of Authentication using Message Digest in WWW', Proceedings of the Korean Information Science Society Fall Conference, Vol.28, No.2, PP.691-693, 2001
7 Kwang-Seok Seo, You-Shik Shin, Chong-Kyo Kim, 'The Text-Prompt Speaker Recognition for Customer Discrimination', Proceedings of the Acoustical Society of Korea Conference, Vol.17, No.1, PP.127-130, 1998
8 L.R.Rabiner, B.H.Juang, 'Fundamentals of speech recognition', Prentice Hall, 1993
9 Phil-Joong Lee, Ju-yeon Cho, 'A Study of Identity Verification by Biometres', Journal of Korea Institute of Information Security & Cryptology, Vol.2, No.4, PP.67-74, 1992