New research advances voice security technology

March 8, 2010

Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the , and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification," will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19.

Explore further: Briefs: Company creates 3-tier ID card security

Related Stories

Palm Vein Biometric PC Mouse Goes on Sale

September 11, 2007

Fujitsu today announced that it has developed a PC Login Kit for use with the PalmSecure palm vein biometric authentication device and begun sales of a mouse model and a standard model for corporate users.

Software Helps Developers Get Started with PIV Cards

July 10, 2008

The National Institute of Standards and Technology has developed two demonstration software packages that show how Personal Identity Verification (PIV) cards can be used with Windows and Linux systems to perform logon, digital ...

Recommended for you

Battery technology could charge up water desalination

February 4, 2016

The technology that charges batteries for electronic devices could provide fresh water from salty seas, says a new study by University of Illinois engineers. Electricity running through a salt water-filled battery draws the ...

Researchers find vulnerability in two-factor authentication

February 3, 2016

Two-factor authentication is a computer security measure used by major online service providers to protect the identify of users in the event of a password loss. The process is familiar: When a password is forgotten, the ...

EU and US reach new data-sharing agreement

February 2, 2016

The European Union and the United States struck a deal Tuesday over data-sharing that will allow the likes of Facebook and Apple to continue sending people's information across the Atlantic—but a legal challenge to the ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.