Download presentation
Presentation is loading. Please wait.
Published byGordon Riley Modified over 8 years ago
1
A Study of the Channel Mismatch Problem in a Multimodal Face-Voice Biometric Access System FALLON SARATOVSKY, TODD EDWARDS, RICH KUITERS, HUGH ENG, AND HOMAYOON BEIGI SEIDENBERG SCHOOL OF CSIS, PACE UNIVERSITY
2
Overview Key Terms Background Methodology Results and Findings Conclusion References
3
Key Terms 1.Biometrics: The scientific analysis of one’s biological individuality, in order to identify and authenticate the individual in order to grant them access. ◦Biometrics matches implies the likelihood of exact validation. 2.Channel Mismatch: A common issue experienced within biometrics. Channel mismatch is caused by using devices that differ from the devices a user may have enrolled on. ◦Using an older or newer microphone, may affect authentication when participating in a speaker or speech recognition due to variations in microphone quality.
4
Key Terms 3.Enrollment: The first and most important part of the authentication process, because it sets the tone for any type of biometric system/recognition.
5
Key Terms 4.Multimodal Recognition: Multimodal recognition is the use of two or more options of authentication within a biometric system. ◦Example: a microphone for voice/speech recognition and a camera for facial recognition/liveliness test. ◦Multimodal biometric technologies offers the possibility for a more secure authentication process in biometrics.
6
Background Recognition Technologies, Inc. Recognition Technologies, Inc. Established in 2003 Established in 2003 Located in White Plains, NY Located in White Plains, NY Patented RecoMadeEasy® system is capable of open-set speaker recognition for large populations, widely considered to be one of the most difficult speaker recognition problems. Patented RecoMadeEasy® system is capable of open-set speaker recognition for large populations, widely considered to be one of the most difficult speaker recognition problems.
7
Background
8
Methodology Objectives: Objectives: Primary: Assess the enrollment and authentication processes with the use of a multimodal biometric system in order to determine various levels of channel mismatch. Primary: Assess the enrollment and authentication processes with the use of a multimodal biometric system in order to determine various levels of channel mismatch. Secondary: Evaluate any channel mismatch that may transpire during the authentication process of a multimodal biometric system with an external microphone. Secondary: Evaluate any channel mismatch that may transpire during the authentication process of a multimodal biometric system with an external microphone.
9
Methodology Method for Data Collection: Method for Data Collection: Data will be retrieved on site at Recongition Technologies, Inc. Testers will use the RecoMadeEasy system and application on two different Samsung devices (Samsung Galaxy Tab 4 and Samsung S6). Data will be retrieved on site at Recongition Technologies, Inc. Testers will use the RecoMadeEasy system and application on two different Samsung devices (Samsung Galaxy Tab 4 and Samsung S6). Participants will enroll on two separate devices and then try to authenticate on opposite devices. Participants will enroll on two separate devices and then try to authenticate on opposite devices. An external microphone will also be used to test for channel mismatch on the Samsung Galaxy Tab 4. An external microphone will also be used to test for channel mismatch on the Samsung Galaxy Tab 4.
10
Results and Findings Enrollment is the most important part of the authentication. Enrollment is the most important part of the authentication. Enrollment must be uniform for all users, and must be done in a controlled environment in order to create an even playing field for the authentication process. Enrollment must be uniform for all users, and must be done in a controlled environment in order to create an even playing field for the authentication process. Example: All users should enroll on the same device, all users should all users should be in a controlled environment, and all users should perform the same enrollment tests. Example: All users should enroll on the same device, all users should all users should be in a controlled environment, and all users should perform the same enrollment tests.
11
Conclusion Biometric software is constantly evolving and the goal is to eventually eliminate the use of standard passwords. Biometric software is constantly evolving and the goal is to eventually eliminate the use of standard passwords. Many industries have begun to implement biometric software, including many of our workplaces. Many industries have begun to implement biometric software, including many of our workplaces. Many of our own personal devices like cell phones, tablets, and laptops are being designed with integrated facial and fingerprint biometrics Many of our own personal devices like cell phones, tablets, and laptops are being designed with integrated facial and fingerprint biometrics There is still room for improvement with biometrics. There is still room for improvement with biometrics. The improvements should start with the enrollment process, since this is the first step in biometrics. The improvements should start with the enrollment process, since this is the first step in biometrics.
12
References [1] Beigi, H., Effects of time lapse on speaker recognition results. In Digital Signal Processing, 16th International Conference on IEEE, 2009, pp 1-6 [2] Beigi, H. Mobile Device Transaction Using Multi-Factor Authentication. Yorktown Heights, NY, 2011 [3] Beigi, H. “Speaker Recognition-Practical Issues.” Powerpoint, 2010. [4] Beigi, H., Recognition Technologies website, http://www.recognitiontechnologies.com/ http://www.recognitiontechnologies.com/ [5]Bush, G. “National Security Presidential Directive and Homeland Security Presidential Directive,” June 5, 2008. http://www.biometrics.gov/Documents/NSPD59%20HSPD24.pdf. [6] Fang Zheng, T., Jin, Q., Li, L., Wang, J., Bie, F., “An Overview of Robustness Related Issues in Speaker Recognition”, 2014, pp 2-3 [7] Fernandez Gallardo, L., Wagner, M., Möller S., "I-vector Speaker Verification for Speech Degraded by Narrowband and Wideband Channels." Speech Communication; 11. ITG Symposium; Proceedings of. VDE, 2014 [8] Bonneau, J., Herley, C., Van Oorschot, P. C., Stajano, F., “Passwords and the Evolution of Imperfect Authentication.,” Communications of the ACM, vol. 58, no. 7, July 2015, pp. 78–87 [9] Jain, A., Nandakaumar, K., Ross, A., “Score normalization in multimodal biometric systems”, 2005, pp. 2275 [10] Kinnunen, T., Speaker Recognition, Department of Computer Science - University of Joensuu, 2003 [11] Mazaira-Fernandez, L., Alvarez-Marquina, A., Gomez-Vilda, P., “Improving Speaker Recognition by Biometric Voice Deconstruction.” [12] Mishra, A., “Multimodal Biometrics it is: Need for Future Systems”. International Journal of Computer Applications,, June 2010, vol. 3, no. 4, pp. 28-33 [13] Pato, J., Millett, L., Whither Biometrics Committee. "Biometric Recognition: Challenges and Opportunities.", 2010, pp 9 [14] Pelecanos, J., Sridharan, S., “Feature Warping for Robust Speaker Verification”, 2001 [15] Petrovska-Delacretaz, D., Chollet, G., Guide to Biometric Reference Systems and Performance Evaluation, 2009, pp. 173-174 [16] Saquib, Z., Salam, N., Nair, R. P., Pandey, N., & Joshi, A., A survey on automatic speaker recognition systems. Signal Processing and Multimedia, 2010, pp. 134-145 [17] Scheffer, N., et al. "Recent developments in voice biometrics: Robustness and high accuracy." Technologies for Homeland Security (HST), 2013 [18] Doel, K.,“SplashData’s fifth annual ‘Worst Passwords List’ shows people continue putting themselves at risk.”, prweb, 2016 [19] Sreenivasa Rao, K., Sourjya, S., “Robust Speaker Recognition in Noisy Environments”, 2014, pp 8-9 [20] “Voice biometrics authentication across channels”, Nuance Communications, 2014 [21] Qi, X. Types of Biometrics. Web [22] Zhang, D., Automated biometrics: Technologies and systems (Vol. 7). Springer Science, 2013
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.