Volume 8 Number 8 (Aug. 2013)
Home > Archive > 2013 > Volume 8 Number 8 (Aug. 2013) >
JCP 2013 Vol.8(8): 2027-2033 ISSN: 1796-203X
doi: 10.4304/jcp.8.8.2027-2033

Identity Authentication Scheme Expansion Based on Speaker Verification

Geng Zhao1 and Xufei Li2
1 Department of Computer Science and Technology, Beijing Electronic Science and Technology Institute, Beijing 100070, China
2 College of Communication Engineering, Xidian University, Xi’an 710071, China


Abstract—Although in theory, the speaker verification accuracy will not decrease with the number of users increasing, in fact, is not the case. In view of this situation, this paper expands the identity authentication scheme based on speaker recognition which is safe but deficient. After expansion, the identity authentication scheme based on speaker verification is more effective and practical.

Index Terms—Speech Recognition, Speaker Verification, Session key, Identity Authentication, Network Topology

[PDF]

Cite: Geng Zhao and Xufei Li, " Identity Authentication Scheme Expansion Based on Speaker Verification," Journal of Computers vol. 8, no. 8, pp. 2027-2033, 2013.

General Information

ISSN: 1796-203X
Abbreviated Title: J.Comput.
Frequency: Monthly
Editor-in-Chief: Prof. Liansheng Tan
Executive Editor: Ms. Nina Lee
Abstracting/ Indexing: DBLP, EBSCO,  ProQuest, INSPEC, ULRICH's Periodicals Directory, WorldCat, CNKI,etc
E-mail: jcp@iap.org
  • Jul 19, 2019 News!

    Vol 14, No 7 has been published with online version   [Click]

  • Jun 21, 2019 News!

    Vol 14, No 6 has been published with online version   [Click]

  • Apr 28, 2019 News!

    Vol 14, No 5 has been published with online version 7 papers are published in this issue after peer review   [Click]

  • Mar 20, 2019 News!

    Vol 14, No 3 has been published with online version   [Click]

  • Feb 22, 2019 News!

    Vol 14, No 2 has been published with online version 8 papers are published in this issue after peer review   [Click]

  • Read more>>