Cryptographic key generation from voice

被引:123
作者
Monrose, F [1 ]
Reiter, MK [1 ]
Li, Q [1 ]
Wetzel, S [1 ]
机构
[1] Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
来源
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2001年
关键词
D O I
10.1109/SECPRI.2001.924299
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a technique to reliably generate a cryptographic key from a user's voice while speaking a password. The key resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Moreover, the technique is sufficiently robust to enable the user to reliably regenerate the key by uttering her password again. We describe an empirical evaluation of this technique using 250 utterances recorded from 50 users.
引用
收藏
页码:202 / 213
页数:12
相关论文
共 27 条
  • [1] [Anonymous], P 2 USENIX SEC WORKS
  • [2] [Anonymous], 1992, ADV SPEECH SIGNAL PR
  • [3] AUTOMATIC RECOGNITION OF SPEAKERS FROM THEIR VOICES
    ATAL, BS
    [J]. PROCEEDINGS OF THE IEEE, 1976, 64 (04) : 460 - 475
  • [4] CACHIN C, 1997, ETH SERIES INFORMATI, V1
  • [5] Daugman J., 1992, Proceedings. The Institute of Electrical and Electronics Engineers 1992 International Carnahan Conference on Security Technology: Crime Countermeasures (Cat. No.CH3119-5/92), P50, DOI 10.1109/CCST.1992.253755
  • [6] On enabling secure applications through off-line biometric identification
    Davida, GI
    Frankel, Y
    Matt, BJ
    [J]. 1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 148 - 157
  • [7] Deller Jr J. R., 1993, DISCRETE TIME PROCES
  • [8] SPEAKER RECOGNITION - IDENTIFYING PEOPLE BY THEIR VOICES
    DODDINGTON, GR
    [J]. PROCEEDINGS OF THE IEEE, 1985, 73 (11) : 1651 - 1664
  • [9] FELDMEIER D, 1990, LECT NOTES COMPUTER, V435
  • [10] VITERBI ALGORITHM
    FORNEY, GD
    [J]. PROCEEDINGS OF THE IEEE, 1973, 61 (03) : 268 - 278