New research advances voice security technology

Mar 08, 2010

Most people are familiar with security technology that scans a person's handprint or eye for identification purposes. Now, thanks in part to research from North Carolina State University, we are closer to practical technology that can test someone's voice to confirm their identity.

"The big picture is speaker authentication by computer," says Dr. Robert Rodman, professor of computer science at NC State and co-author of a new paper on the subject. "The acoustic parameters of the voice are affected by the shape of the , and different people have different vocal tracts," Rodman explains. "This new research will help improve the speed of speech authentication, without sacrificing accuracy."

Rodman explains that speech authentication could have a host of applications in this age of heightened security and mobile electronics. "Potential users of this technology include government, financial, health-care and telecommunications industries," Rodman says, "for applications ranging from preventing ID theft and fraud to data protection."

Current computer models that are used to compare acoustic profiles, effectively evaluating whether a speaker is who he says he is, may take several seconds or more to process the information, which is still too long for the technology to gain widespread acceptance. "In order for this technology to gain traction among users," Rodman says, "the response time needs to improve without increasing the error rate."

To address this problem, Rodman and his fellow researchers modified existing computer models to streamline the authentication process so that it operates more efficiently. "This is part of the evolution of speech authentication software," Rodman says, "and it moves us closer to making this technology a practical, secure tool."

The research, "Joint Frame and Gaussian Selection for Text Independent Speaker Verification," will be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Dallas, March 14-19.

Explore further: A new kind of data-driven predictive methodology

Related Stories

Palm Vein Biometric PC Mouse Goes on Sale

Sep 11, 2007

Fujitsu today announced that it has developed a PC Login Kit for use with the PalmSecure palm vein biometric authentication device and begun sales of a mouse model and a standard model for corporate users.

Software Helps Developers Get Started with PIV Cards

Jul 10, 2008

The National Institute of Standards and Technology has developed two demonstration software packages that show how Personal Identity Verification (PIV) cards can be used with Windows and Linux systems to perform ...

Recommended for you

Five ways the superintelligence revolution might happen

Sep 26, 2014

Biological brains are unlikely to be the final stage of intelligence. Machines already have superhuman strength, speed and stamina – and one day they will have superhuman intelligence. This is of course ...

User comments : 0