Open Access

A Secure Voice Signature Based Lightweight Authentication Approach for Remote Access Control


Cite

Figure 1.

Model of the remote voice based access control
Model of the remote voice based access control

Figure 2.

Speech signal after undergoing framing
Speech signal after undergoing framing

Figure 3.

Hamming window before applying it on speech signal
Hamming window before applying it on speech signal

Figure 4.

Speech signal after applying the Hamming Window
Speech signal after applying the Hamming Window

Figure 5.

Audio signal with magnitude and phase
Audio signal with magnitude and phase

Figure 6.

Audio signal considering the magnitude only
Audio signal considering the magnitude only

Figure 7.

Mel-filter bank
Mel-filter bank

Figure 8.

Computation cost (ms)
Computation cost (ms)

Figure 9.

Energy cost in terms of cycles
Energy cost in terms of cycles

PERFORMANCE EVALUATION OF VOICE SIGNATURE BASED AUTHENTICATION APPROACH

Trial No. of samples No. of False rejection No. of False acceptance % Accuracy
User 1 30 3 1 87
User 2 30 3 2 83
User 3 30 2 0 93
User 4 30 1 1 93
User 5 32 4 2 83
eISSN:
2470-8038
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, other