Abstract

The robustness of a biometric identity verification (IV) system is best evaluated by monitoring its behavior under impostor attacks. Such attacks may include the transformation of one, many, or all of the biometric modalities. In this paper, we present the transformation of both speech and visual appearance of a speaker and evaluate its effects on the IV system. We propose MixTrans, a novel method for voice transformation. MixTrans is a mixture-structured bias voice transformation technique in the cepstral domain, which allows a transformed audio signal to be estimated and reconstructed in the temporal domain. We also propose a face transformation technique that allows a frontal face image of a client speaker to be animated. This technique employs principal warps to deform defined MPEG-4 facial feature points based on determined facial animation parameters (FAPs). The robustness of the IV system is evaluated under these attacks.

Highlights

  • With the emergence of smart phones and third and fourth generation mobile and communication devices, and the appearance of a “first generation” type of mobile PC/PDA/phones with biometric identity verification, there has been recently a greater attention to secure communication and to guarantee the robustness of embedded multimodal biometric systems

  • This paper provides a brief review of identity verification (IV) techniques and corresponding evaluations and focuses on a statistical approach (GMM). (2) It introduces MixTrans, a novel mixture-structure bias voice transformation technique in the cepstral domain, which allows a transformed audio signal to be estimated and reconstructed in the temporal domain

  • This paper provides a review of biometric identity verification techniques and describes their evaluation and robustness to imposture

Read more

Summary

Introduction

With the emergence of smart phones and third and fourth generation mobile and communication devices, and the appearance of a “first generation” type of mobile PC/PDA/phones with biometric identity verification, there has been recently a greater attention to secure communication and to guarantee the robustness of embedded multimodal biometric systems The robustness of such systems promises the viability of newer technologies that involve e-voice signatures, e-contracts that have legal values, and secure and trusted data transfer regardless of the underlying communication protocol. Biometric identity verification (IV) systems are starting to appear on the market in various commercial applications These systems are still operating with a certain measurable error rate that prevents them from being used in a full automatic mode and still require human intervention and further authentication. Impostors attempting to be authenticated by an IV system to gain access to privileged resources could take advantage of the non-zero error rate of the system by imitating, as closely as possible, the biometric features of a genuine client

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call