Login
Register
Reset Password
Publish & Distribute
Publishing Solutions
Distribution Solutions
Subjects
Architecture and Design
Arts
Business and Economics
Chemistry
Classical and Ancient Near Eastern Studies
Computer Sciences
Cultural Studies
Engineering
General Interest
Geosciences
History
Industrial Chemistry
Jewish Studies
Law
Library and Information Science, Book Studies
Life Sciences
Linguistics and Semiotics
Literary Studies
Materials Sciences
Mathematics
Medicine
Music
Pharmacy
Philosophy
Physics
Social Sciences
Sports and Recreation
Theology and Religion
Publications
Journals
Books
Proceedings
Publishers
Blog
Contact
Search
EUR
USD
GBP
English
English
Deutsch
Polski
Español
Français
Italiano
Cart
Home
Journals
International Journal of Advanced Network, Monitoring and Controls
Volume 4 (2019): Issue 2 (January 2019)
Open Access
A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control
Oladayo Olufemi Olakanmi
Oladayo Olufemi Olakanmi
and
Aminat Shodipo
Aminat Shodipo
| Oct 08, 2019
International Journal of Advanced Network, Monitoring and Controls
Volume 4 (2019): Issue 2 (January 2019)
About this article
Previous Article
Next Article
Abstract
Article
Figures & Tables
References
Authors
Articles in this Issue
Preview
PDF
Cite
Share
Published Online:
Oct 08, 2019
Page range:
69 - 74
DOI:
https://doi.org/10.21307/ijanmc-2019-049
Keywords
MFCC
,
Authentication
,
Cryptosystem
,
Coding
,
Security
,
Access Control
© 2019 Oladayo Olufemi Olakanmi et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Figure 1.
Model of the remote voice based access control
Figure 2.
Speech signal after undergoing framing
Figure 3.
Hamming window before applying it on speech signal
Figure 4.
Speech signal after applying the Hamming Window
Figure 5.
Audio signal with magnitude and phase
Figure 6.
Audio signal considering the magnitude only
Figure 7.
Mel-filter bank
Figure 8.
Computation cost (ms)
Figure 9.
Energy cost in terms of cycles
PERFORMANCE EVALUATION OF VOICE SIGNATURE BASED AUTHENTICATION APPROACH
Trial
No. of samples
No. of False rejection
No. of False acceptance
% Accuracy
User 1
30
3
1
87
User 2
30
3
2
83
User 3
30
2
0
93
User 4
30
1
1
93
User 5
32
4
2
83