Sistema para Autenticação de Usuários por Voz em Redes de Computadores
Abstract
This work describes a system for user authentication in computer networks using speech. Initially, it is given a general overview of the system, focusing in the client/server architecture used. After this, the main characteristics of the system building blocks are shown, concerning the techniques for speaker recognition, data base, client/server communication and management and user interface application. At last, the difficulties encountered are discussed and future works are mentioned.
References
Woodward Jr., J. D., Orlans, N. M. e Higgins, P. T. "Biometrics: Identity Assurance in the Information Age", McGraw-Hill, 2003.
Petry, A. "Reconhecimento Automático de Locutor Utilizando Medidas de Invariantes Dinâmicas Não-Lineares", Tese de Doutorado, Instituto de Informática, Universidade Federal do Rio Grande do Sul, 2002.
Horstmann, C. S. e Cornell, G. "Core Java 2 - Recursos Avançados", Makron Books, 2001.
Petry, A. e Barone, D. A. C. (2003) "Preliminary Experiments in Speaker Verification using Time-dependent Largest Lyapunov Exponents", Computer Speech and Language, v. 17, p. 403-413.
Petry, A. e Barone, D. A. C. (2002) "Speaker Identification Using Nonlinear Dynamical Features", Chaos Solitons and Fractals, v. 13, p. 221-231.
Petry, A., Zanuz, A. e Barone, D. A. C. (1999) "Utilização de Técnicas de Processamento Digital de Sinais para a Identificação Automática de Pessoas pela Voz", In: Simpósio sobre Segurança em Informática, São José dos Campos, SP.
Rabiner, L. e Juang B. "Fundamentals of Speech Recognition", Prentice-Hall Inc., 1993.
Deller Jr., J. R., Proakis J. G. e Hansen, J. H. L. "Discrete-time Processing of Speech Signals", Prentice-Hall Inc., 1987.
Reynolds, D. A., Quatieri, T. F. e Dunn, R. B. (2000) "Speaker Verification Using Adapted Gaussian Mixture Models", Digital Signal Processing, v. 10, p. 19-41.
Tanenbaum, A. S. "Redes de Computadores", Editora Campus Ltda, 1997.
Schneier, B. "Applied Cryptography: Protocols, Algorithms, and Source Code in C", John Wiley & Sons Inc., 1996.
Stallings, W. "Cryptography and Network Security: Principles and Pratice", Prentice-Hall Inc., 1999.
