Experimentation Using Short-Term Spectral Features for Secure Mobile Internet Voting AuthenticationReport as inadecuate

Experimentation Using Short-Term Spectral Features for Secure Mobile Internet Voting Authentication - Download this document for free, or read online. Document in PDF available to download.

Mathematical Problems in Engineering - Volume 2015 2015, Article ID 564904, 21 pages -

Research ArticleICT and Society Research Group, Durban University of Technology, P.O. Box 1334, Durban 4000, South Africa

Received 1 April 2015; Revised 1 July 2015; Accepted 2 July 2015

Academic Editor: Ivanka Stamova

Copyright © 2015 Surendra Thakur et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


We propose a secure mobile Internet voting architecture based on the Sensus reference architecture and report the experiments carried out using short-term spectral features for realizing the voice biometric based authentication module of the architecture being proposed. The short-term spectral features investigated are Mel-Frequency Cepstral Coefficients MFCCs, Mel-Frequency Discrete Wavelet Coefficients MFDWC, Linear Predictive Cepstral Coefficients LPCC, and Spectral Histogram of Oriented Gradients SHOGs. The MFCC, MFDWC, and LPCC usually have higher dimensions that oftentimes lead to high computational complexity of the pattern matching algorithms in automatic speaker recognition systems. In this study, higher dimensions of each of the short-term features were reduced to an 81-element feature vector per Speaker using Histogram of Oriented Gradients HOG algorithm while neural network ensemble was utilized as the pattern matching algorithm. Out of the four short-term spectral features investigated, the LPCC-HOG gave the best statistical results with statistic of 0.9127 and mean square error of 0.0407. These compact LPCC-HOG features are highly promising for implementing the authentication module of the secure mobile Internet voting architecture we are proposing in this paper.

Author: Surendra Thakur, Emmanuel Adetiba, Oludayo O. Olugbara, and Richard Millham

Source: https://www.hindawi.com/


Related documents