Security Evaluation on Speech Biometric Authentication System

2013 ◽  
Vol 717 ◽  
pp. 826-831
Author(s):  
K. Inthavisas ◽  
N. Sungprasert

A recent work utilized a transformation function to protect a DTW template. Unfortunately, a matching template was not protected properly. In this paper, we first show that an adversary can exploit the matching template to gain access to the system. Then, we introduce our scheme to address this problem. For this scheme, a hardened template is utilized to protect the DTW template. For the matching template, it is protected by a cryptographic framework. We evaluate the system with a public database: the MIT mobile device speaker verification corpus. The experimental results show that our scheme outperforms the other approaches.

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Robertas Damaševičius ◽  
Rytis Maskeliūnas ◽  
Egidijus Kazanavičius ◽  
Marcin Woźniak

Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.


2011 ◽  
Vol 2011 ◽  
pp. 1-9 ◽  
Author(s):  
Hou-Tsan Lee ◽  
Wei-Chuan Lin ◽  
Ching-Hsiang Huang

Self-propelled patrolling vehicles can patrol periodically in the designed area to ensure the safety like men do. The proposed vehicle cannot only save manpower, but also ensure the performance without mistakes caused by man. It is different from the traditional patrolling system which is limited by the manpower and the fixed camera positions. To improve such situation, this paper proposes a self-propelled patrolling vehicle which can move automatically to a wider range and record the monitored image by IPCAM within a predefined patrolling route. Besides, the user can use the mobile device or website to connect to the vehicle at anytime and anywhere and control it to move to the position to get the indoor image user wants. The position of self-propelled vehicles can be detected by the RFID reader as a feedback and be shown on the PC screen and smart phone. The recorded images can be also transmitted back to the server via WiFi system for face tracking and discriminating analysis. On the other hand, the self-propelled vehicle patrolling routes can be modified by the Android smart-phone remote-control module. When some defined events occur, the build-in MSN module will notice users by sending messages to PC and smart phone. Experimental results are given in the paper to validate its performance.


1994 ◽  
Vol 29 (4) ◽  
pp. 127-132 ◽  
Author(s):  
Naomi Rea ◽  
George G. Ganf

Experimental results demonstrate bow small differences in depth and water regime have a significant affect on the accumulation and allocation of nutrients and biomass. Because the performance of aquatic plants depends on these factors, an understanding of their influence is essential to ensure that systems function at their full potential. The responses differed for two emergent species, indicating that within this morphological category, optimal performance will fall at different locations across a depth or water regime gradient. The performance of one species was unaffected by growth in mixture, whereas the other performed better in deep water and worse in shallow.


Author(s):  
Heather Battaly

What would happen if extended cognition (EC) and virtue-responsibilism (VR) were to meet? Are they compatible, or incompatible? Do they have projects in common? Would they, as it were, end their meeting early, or stick around but run out of things to say? Or, would they hit it off? This chapter suggests that VR and EC are not obviously incompatible, and that each might fruitfully contribute to the other. Although there has been an explosion of recent work at the intersection of virtue epistemology and EC, this work has focused almost exclusively on the reliabilist side of virtue epistemology. Little has been said about the intersection of VR and EC. This chapter takes initial steps toward filling that gap.


2021 ◽  
Vol 40 (1) ◽  
pp. 551-563
Author(s):  
Liqiong Lu ◽  
Dong Wu ◽  
Ziwei Tang ◽  
Yaohua Yi ◽  
Faliang Huang

This paper focuses on script identification in natural scene images. Traditional CNNs (Convolution Neural Networks) cannot solve this problem perfectly for two reasons: one is the arbitrary aspect ratios of scene images which bring much difficulty to traditional CNNs with a fixed size image as the input. And the other is that some scripts with minor differences are easily confused because they share a subset of characters with the same shapes. We propose a novel approach combing Score CNN, Attention CNN and patches. Attention CNN is utilized to determine whether a patch is a discriminative patch and calculate the contribution weight of the discriminative patch to script identification of the whole image. Score CNN uses a discriminative patch as input and predict the score of each script type. Firstly patches with the same size are extracted from the scene images. Secondly these patches are used as inputs to Score CNN and Attention CNN to train two patch-level classifiers. Finally, the results of multiple discriminative patches extracted from the same image via the above two classifiers are fused to obtain the script type of this image. Using patches with the same size as inputs to CNN can avoid the problems caused by arbitrary aspect ratios of scene images. The trained classifiers can mine discriminative patches to accurately identify some confusing scripts. The experimental results show the good performance of our approach on four public datasets.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Hossein Ahmadvand ◽  
Fouzhan Foroutan ◽  
Mahmood Fathy

AbstractData variety is one of the most important features of Big Data. Data variety is the result of aggregating data from multiple sources and uneven distribution of data. This feature of Big Data causes high variation in the consumption of processing resources such as CPU consumption. This issue has been overlooked in previous works. To overcome the mentioned problem, in the present work, we used Dynamic Voltage and Frequency Scaling (DVFS) to reduce the energy consumption of computation. To this goal, we consider two types of deadlines as our constraint. Before applying the DVFS technique to computer nodes, we estimate the processing time and the frequency needed to meet the deadline. In the evaluation phase, we have used a set of data sets and applications. The experimental results show that our proposed approach surpasses the other scenarios in processing real datasets. Based on the experimental results in this paper, DV-DVFS can achieve up to 15% improvement in energy consumption.


2021 ◽  
Author(s):  
Fatin Atiqah Rosli ◽  
Saidatul Ardeenawatie Awang ◽  
Azian Azamimi Abdullah ◽  
Mohammad Shahril Salim

1993 ◽  
Vol 8 (9) ◽  
pp. 2344-2353 ◽  
Author(s):  
J-M. Berthelot ◽  
Souda M. Ben ◽  
J.L. Robert

The experimental study of wave attenuation in concrete has been achieved in the case of the propagation of plane waves in concrete rods. Different mortars and concretes have been investigated. A transmitter transducer coupled to one of the ends of the concrete rod generates the propagation of a plane wave in the rod. The receiver transducer, similar to the previous one, is coupled to the other end of the rod. The experimental results lead to an analytical expression for wave attenuation as function of the concrete composition, the propagation distance, and the wave frequency.


Sign in / Sign up

Export Citation Format

Share Document