Surveying the development of biometric user authentication on mobile phones

W Meng, DS Wong, S Furnell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …

A review of recent advances on deep learning methods for audio-visual speech recognition

D Ivanko, D Ryumin, A Karpov - Mathematics, 2023 - mdpi.com
This article provides a detailed review of recent advances in audio-visual speech
recognition (AVSR) methods that have been developed over the last decade (2013–2023) …

VC3: Trustworthy data analytics in the cloud using SGX

F Schuster, M Costa, C Fournet… - … IEEE symposium on …, 2015 - ieeexplore.ieee.org
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …

Seeing voices and hearing faces: Cross-modal biometric matching

A Nagrani, S Albanie… - Proceedings of the IEEE …, 2018 - openaccess.thecvf.com
We introduce a seemingly impossible task: given only an audio clip of someone speaking,
decide which of two face images is the speaker. In this paper we study this, and a number of …

Learnable pins: Cross-modal embeddings for person identity

A Nagrani, S Albanie… - Proceedings of the …, 2018 - openaccess.thecvf.com
We propose and investigate an identity sensitive joint embedding of face and voice. Such an
embedding enables cross-modal retrieval from voice to face and from face to voice. We …

Bias in automated speaker recognition

WT Hutiri, AY Ding - Proceedings of the 2022 ACM conference on …, 2022 - dl.acm.org
Automated speaker recognition uses data processing to identify speakers by their voice.
Today, automated speaker recognition is deployed on billions of smart devices and in …

[HTML][HTML] Voice spoofing detection for multiclass attack classification using deep learning

J Boyd, M Fahim, O Olukoya - Machine Learning With Applications, 2023 - Elsevier
Voice biometric authentication is increasingly gaining adoption in organisations with high-
volume identity verifications and for providing access to physical and other virtual spaces. In …

Learning human identity from motion patterns

N Neverova, C Wolf, G Lacey, L Fridman… - IEEE …, 2016 - ieeexplore.ieee.org
We present a large-scale study exploring the capability of temporal deep neural networks to
interpret natural human kinematics and introduce the first method for active biometric …

On the vulnerability of speaker verification to realistic voice spoofing

SK Ergünay, E Khoury, A Lazaridis… - 2015 IEEE 7th …, 2015 - ieeexplore.ieee.org
Automatic speaker verification (ASV) systems are subject to various kinds of malicious
attacks. Replay, voice conversion and speech synthesis attacks drastically degrade the …

Continuously reproducing toolchains in pattern recognition and machine learning experiments

A Anjos, M Günther, T de Freitas Pereira, P Korshunov… - 2017 - openreview.net
Pattern recognition and machine learning research work often contains experimental results
on real-world data, which corroborates hypotheses and provides a canvas for the …