International audienceUnlock patterns are used for authentication in mobile smart devices, yet they are vulnerable to attacks, since only the pattern draw is required. Extra biometric data of the user while drawing the unlock pattern passwords may strengthen the authentication, such as the speed of drawing, the pressure of the finger on the touch screen. Such biometric modality is referred to as behavioral biometrics. Besides, voice is also a behavioral biometric modality, as well as a physiological one. Hence, statistical models such as Gaussian mixture models (GMM) with universal background modeling (UBM) are widely used in speaker verification systems. In this work, we propose to apply and adapt a framework usually dedicated to speaker v...
Deep learning based automatic feature extraction methods have radically transformed speaker identifi...
The modern world has seen a rapid evolution of the technology of biometric authentication, prompted ...
Biometrics offers greater security and convenience than traditional methods of person authentication...
International audienceUnlock patterns are used for authentication in mobile smart devices, yet they ...
The use of biometrics in the user authentication process is the leading choice today. One of the bio...
A comparative study of the application of Gaussian Mixture Model (GMM) and Radial Basis Function (RB...
Biometric authentication has been a vital method of human identification across a wide range of appl...
This paper examines the issue of face, speaker and bi-modal authentication in mobile environments wh...
ABSTRACT This paper presents a comparative analysis of the performance of three estimation algor...
This article addresses the setting up of a Biometric Authentication System (BAS) based on the fusion...
Abstract: Speaker recognition in applications of our daily lives is not yet in widespread use. In or...
This paper presents a comparative analysis of the performance of three estimation algorithms: Expect...
This paper presents a three trait identification model called multimodal recognition system develope...
Behavioral biometrics is a scientific approach to user authentication/identification based on how a ...
Voice recognition has become a more focused and researched field in the last century,and new techniq...
Deep learning based automatic feature extraction methods have radically transformed speaker identifi...
The modern world has seen a rapid evolution of the technology of biometric authentication, prompted ...
Biometrics offers greater security and convenience than traditional methods of person authentication...
International audienceUnlock patterns are used for authentication in mobile smart devices, yet they ...
The use of biometrics in the user authentication process is the leading choice today. One of the bio...
A comparative study of the application of Gaussian Mixture Model (GMM) and Radial Basis Function (RB...
Biometric authentication has been a vital method of human identification across a wide range of appl...
This paper examines the issue of face, speaker and bi-modal authentication in mobile environments wh...
ABSTRACT This paper presents a comparative analysis of the performance of three estimation algor...
This article addresses the setting up of a Biometric Authentication System (BAS) based on the fusion...
Abstract: Speaker recognition in applications of our daily lives is not yet in widespread use. In or...
This paper presents a comparative analysis of the performance of three estimation algorithms: Expect...
This paper presents a three trait identification model called multimodal recognition system develope...
Behavioral biometrics is a scientific approach to user authentication/identification based on how a ...
Voice recognition has become a more focused and researched field in the last century,and new techniq...
Deep learning based automatic feature extraction methods have radically transformed speaker identifi...
The modern world has seen a rapid evolution of the technology of biometric authentication, prompted ...
Biometrics offers greater security and convenience than traditional methods of person authentication...