Securing Telecommunication Based On Speaker Voice As The Public Key.

This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used t...

Full description

Bibliographic Details
Main Authors: Enayah, Monther Rateb, Samsudin, Azman
Format: Article
Language:English
Published: Dr. Sang H. Lee 2007
Subjects:
Online Access:http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf
_version_ 1825828576357777408
author Enayah, Monther Rateb
Samsudin, Azman
author_facet Enayah, Monther Rateb
Samsudin, Azman
author_sort Enayah, Monther Rateb
collection USM
description This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used to encrypt of the transferred data over the open communication channel.
first_indexed 2024-03-06T13:55:37Z
format Article
id usm.eprints-9566
institution Universiti Sains Malaysia
language English
last_indexed 2024-03-06T13:55:37Z
publishDate 2007
publisher Dr. Sang H. Lee
record_format dspace
spelling usm.eprints-95662013-07-13T04:11:15Z http://eprints.usm.my/9566/ Securing Telecommunication Based On Speaker Voice As The Public Key. Enayah, Monther Rateb Samsudin, Azman QA75.5-76.95 Electronic computers. Computer science This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used to encrypt of the transferred data over the open communication channel. Dr. Sang H. Lee 2007-03 Article PeerReviewed application/pdf en http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf Enayah, Monther Rateb and Samsudin, Azman (2007) Securing Telecommunication Based On Speaker Voice As The Public Key. International Journal of Computer Science and Network Security (IJCSNS), 7 (3). pp. 201-209. ISSN 1738-7906
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Enayah, Monther Rateb
Samsudin, Azman
Securing Telecommunication Based On Speaker Voice As The Public Key.
title Securing Telecommunication Based On Speaker Voice As The Public Key.
title_full Securing Telecommunication Based On Speaker Voice As The Public Key.
title_fullStr Securing Telecommunication Based On Speaker Voice As The Public Key.
title_full_unstemmed Securing Telecommunication Based On Speaker Voice As The Public Key.
title_short Securing Telecommunication Based On Speaker Voice As The Public Key.
title_sort securing telecommunication based on speaker voice as the public key
topic QA75.5-76.95 Electronic computers. Computer science
url http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf
work_keys_str_mv AT enayahmontherrateb securingtelecommunicationbasedonspeakervoiceasthepublickey
AT samsudinazman securingtelecommunicationbasedonspeakervoiceasthepublickey