首页> 外文会议>IEEE International Conference on Acoustics, Speech, and Signal Processing >DESPERATELY SEEKING IMPOSTORS: DATA-MINING FOR COMPETITIVE IMPOSTOR TESTING IN A TEXT-DEPENDENT SPEAKER VERIFICATION SYSTEM
【24h】

DESPERATELY SEEKING IMPOSTORS: DATA-MINING FOR COMPETITIVE IMPOSTOR TESTING IN A TEXT-DEPENDENT SPEAKER VERIFICATION SYSTEM

机译:拼命寻求冒名顶替者:在文本依赖扬声器验证系统中进行竞争性冒号测试的数据挖掘

获取原文

摘要

Precise determination of the operating point of a real-world verification application is of great importance. For a text-dependent password-based security system, this can be a challenging task, as lexically matched impostor test data may be nonexistent. In this work we present a data mining approach for extracting suitable impostor data. The approach may be applied to either the Target database (the application data itself) or the Stock databases (data from other applications). The method entails 1) determining Levenstein distances of impostor text utterances with respect to the claimant password 2) selecting subsets of impostor data at various levels of lexical distance, 3) calculating the score threshold using such subsets, 4) extrapolating the score threshold (and hence the operating point) for lexically perfectly-matched data. Experiments on four databases in two languages are presented. This approach, as applied to the Target database, provides an accurate and inexpensive solution to a formidable real-world problem.
机译:精确确定真实世界验证应用程序的操作点非常重要。对于基于文本相关的密码的安全系统,这可能是一个具有挑战性的任务,因为词汇匹配的冒号测试数据可能是不存在的。在这项工作中,我们提出了一种用于提取合适的冒号数据的数据挖掘方法。该方法可以应用于目标数据库(应用程序数据本身)或库存数据库(来自其他应用程序的数据)。该方法需要1)确定Ippostor文本话语的Levenstein距离相对于索赔人密码2)在词汇距离的各个级别中选择IPPOSTOR数据的子集,3)使用这种子集来计算得分阈值,4)推断得分阈值(和因此,对词汇完美匹配的数据进行操作点。提出了两种语言的四个数据库的实验。适用于目标数据库的这种方法为强大的现实问题提供了准确且廉价的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号