Browse > Article

VoIP-Based Voice Secure Telecommunication Using Speaker Authentication in Telematics Environments  

Kim, Hyoung-Gook (광운대학교 전파공학과)
Shin, Dong (광운대학교 전파공학과)
Publication Information
The Journal of The Korea Institute of Intelligent Transport Systems / v.10, no.1, 2011 , pp. 84-90 More about this Journal
Abstract
In this paper, a VoIP-based voice secure telecommunication technology using the text-independent speaker authentication in the telematics environments is proposed. For the secure telecommunication, the sender's voice packets are encrypted by the public-key generated from the speaker's voice information and submitted to the receiver. It is constructed to resist against the man-in-the middle attack. At the receiver side, voice features extracted from the received voice packets are compared with the reference voice-key received from the sender side for the speaker authentication. To improve the accuracy of text-independent speaker authentication, Gaussian Mixture Model(GMM)-supervectors are applied to Support Vector Machine (SVM) kernel using Bayesian information criterion (BIC) and Mahalanobis distance (MD).
Keywords
Text-independent speaker verification; bayesian information criterion; Mahalanobis distance; public-Key infrastructure; diffie-hellman algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. M. Campbell, D. E. Sturim and D. A. Reynolds, "Support vector machines using GMM supervectors for speaker verification," IEEE Signal Process. Lett., vol.13, no.5 pp.308-311, May 2006.
2 M. R. Enayah and A. Samsudin, "Securing telecommunication based on speaker voice as the public key," IJCSNS, pp.201-210, 2007.
3 P. Delacourt and C. J. Wellekens, "DISTBIC: a speaker-based segmentation for audio data indexing," Elsevier Speech Communication, vol.32, pp.111-126, Sep. 2000.   DOI   ScienceOn
4 R. D. Maesschalck, D. Jouan-Rimbaud and D. L. Massart, "Tutorial the Mahalanobis distance," Elsevier Chemometrics and Intelligent Laboratory systems, vol.50, pp.1-18, 2000.   DOI   ScienceOn
5 D. J. Kim and K. S. Hong, "Multimodal biometric authentication using teeth image and voice in mobile environment," IEEE transactions on Consumer Electronics, vol.54, no.4, pp.1790-1797, Nov. 2008.   DOI
6 B. H. Song, K. S. Chung and Y. T. Shin, "SRTP: TCP-friendly congestion control for multimedia streaming," Lecture Notes in Computer Science Springer-Verlag Press, vol.2344, pp.529-538, Sep. 2002.
7 M. E. Hellman, "An overview of public key cryptography." IEEE Communications Magazine, pp.42-49, May 2002.