Renata Rybárová, Juraj Kačur, Onderj Lábaj, Gregor Rozinaj
User identification, authorization and authentication assure that the system is only used by certain users and only commands which are properly authorized are performed. The speaker identification tends to provide basic identification of the possible users located in the system installation area. This would be suitable for identification tasks, such as loading personal profile. The face detection approach aims to provide more reliable user identification based on users’ faces which contain far more characteristics that can be parameterized in comparison to the voice identification approach. Additionally, the 3D face recognition further extends the possibilities of feature extraction in order to more precisely identify particular persons and can be thus used for the highest level authentication (and authorization) for the most demanding applications (e.g. bank account login, etc.).
The main goal of the module is to introduce a student to the fundamental of user identification, authentication and authorization processes. The student is clearly acquainted with the base principles of speaker identification, user identification based on 2D and 3D techniques of face recognition, authentication methods and user authorization.
Speaker recognition, speaker identification, speech features, classification, face recognition, authorization, authentication.