"Chip Based Technology"
in 1999, Voice Security Systems Inc. has been involved in the development of voice/speaker
verification/authorization systems using embedded technologies.
FreeKey®/Voice Protect® has a very small storage requirement for enrollment data, which is easily stored on secure physical media such as smart cards, iButtons, or a consumer device such as a cell phone. The enrollment data is all that is needed, other than a live voice sample, to verify the claimed identity of the user.When verification is performed, there is no spoken or test prompt as to what the correct pass phrase is, making it virtually impossible for a thief to impostor.
Even if the impostor knows the correct pass phrase, the FreeKey®/Voice Protect® method accurately rejects them based on the biometric features unique to the enrolled user.
The user can change their pass phrase more frequently to increase security (very much like text passwords are handled today).
The FreeKey®/Voice Protect® verification method adjusts for small physical changes in the user's voice over time, allowing long term use of enrollment data. In fact, the level of verification confidence can actually improve within the first several uses of the system.
In response to several
customer requests, we ported our technology to an Active-X prototype in
order to provide an approximate comparison of our verification method
against the verification products of some of the biggest players in the
speech industry. In order to obtain comparable results, we choose the
YOHO corpus speaker verification database as a basis for our testing in
order to provide comparable accuracy measurements.
We are pleased to report the results of our testing showed very favorable results.
Out of one-hundred thirty-three users from the YOHO database we were able to enroll seventy-seven of them with an identical voice password constructed from the YOHO speech data.
Here is a summary of our test results using version 2.0.18 of the keypad test control available at this site:
Total Users Tested : 133
Cohort Testing - Enrolled (77) vs. All (133 - one attempt each due to limited
Verify Testing - Enrolled (66) vs. All (133 - 40 attempts each)
Sixty-six of the users recordings were unable to generate satisfactory enrollment scores due to CO-articulation differences between the digits recorded. These user's enrollments were invalid, thus they were omitted from the Cohort Testing (where the user tries to impostor KNOWING the secret pass phrase). Data from ALL one-hundred thirty-three users was used for the verification testing to determine the "real-world" probability of someone trying to gain access to a stolen device for which the pass-phrase is unknown. The verify test phrases were all different from each other and different from the "correct" phrase that was compared to the impostor attempt. All of the phrases used consisted of "combination-lock" sequences; three two-digit numbers spoken as: "62...76...53". In an actual application, the user can create a "voice key" by saying virtually any phrase in any language as long as it meets a minimum energy requirement (about 2 seconds of speech). We believe this would further decrease the possibility of someone guessing the correct phrase, although the verification method still rejects most closely matched speaker(s) even if they know the phrase. Of course, these numbers will vary depending on the user, phrase selected and specific hardware used to extract the voice features..
For additional information
about the test procedures, or to obtain information on how to run your own tests
(from recorded data or live input) using the Keypad Active-X control, contact
Voice Security Systems Inc. directly. We can also provide information on how to set
up a persistent data store for the Active-X control. This allows "voice prints"
to be saved on your hard disk for testing day-to-day performance and usability
evaluation. We verify every day here at VSS. VSS "voice prints" that were created
over a year ago are still functioning perfectly.
We believe we have a smaller, more robust and more efficient process of speaker authentication than anyone else currently in the industry. Our storage requirement for the "voice print" which is compared to a live sample is a little as 780 bytes (this is the actual requirement for the keypad demonstration on this site). The code needed to perform the validation is very compact and will fit into many inexpensive chips available today; including smart cards For example, adding the verification process to the Keypad Demonstration program only increased the program size by 2K. Those involved in adding speaker verification to the security layer of their application, are only now beginning to realize the benefits of a simple, unobtrusive user enrollment and verification process such as ours. Our method the first to operate without the need of a cohort set of enrollment data, requiring only three samples of a phrase chosen by the user. We were also the first to streamline enrollment procedure from several hours or even days, in some cases, down to only a few seconds. Creation of a new "voice key" (enrollment) can be completed in under 20 seconds. The process can run on as little as an 8-bit processor running at 8 MHz.
Biometric Technology Licensing
24591 Seth Circle, Dana Point, CA 92629
Phone: +1 949 493-4030
E mail: email@example.com
Privacy Notice | Conditions of Use
FreeKey® and Voice Protect® are registered trademarks of Voice Security Systems Inc.
Copyright © 1999-2014 Voice Security Systems Inc.
All Rights Reserved.