Securing Telecommunication Based On Speaker Voice As The Public Key.
This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used t...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Dr. Sang H. Lee
2007
|
Subjects: | |
Online Access: | http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf |
_version_ | 1825828576357777408 |
---|---|
author | Enayah, Monther Rateb Samsudin, Azman |
author_facet | Enayah, Monther Rateb Samsudin, Azman |
author_sort | Enayah, Monther Rateb |
collection | USM |
description | This paper proposes a technique to generate a public
cryptographic key from user’s voice while speaking over a
handheld device. Making use of the human intelligence to
identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used to encrypt of the transferred data over the open communication channel.
|
first_indexed | 2024-03-06T13:55:37Z |
format | Article |
id | usm.eprints-9566 |
institution | Universiti Sains Malaysia |
language | English |
last_indexed | 2024-03-06T13:55:37Z |
publishDate | 2007 |
publisher | Dr. Sang H. Lee |
record_format | dspace |
spelling | usm.eprints-95662013-07-13T04:11:15Z http://eprints.usm.my/9566/ Securing Telecommunication Based On Speaker Voice As The Public Key. Enayah, Monther Rateb Samsudin, Azman QA75.5-76.95 Electronic computers. Computer science This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used to encrypt of the transferred data over the open communication channel. Dr. Sang H. Lee 2007-03 Article PeerReviewed application/pdf en http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf Enayah, Monther Rateb and Samsudin, Azman (2007) Securing Telecommunication Based On Speaker Voice As The Public Key. International Journal of Computer Science and Network Security (IJCSNS), 7 (3). pp. 201-209. ISSN 1738-7906 |
spellingShingle | QA75.5-76.95 Electronic computers. Computer science Enayah, Monther Rateb Samsudin, Azman Securing Telecommunication Based On Speaker Voice As The Public Key. |
title | Securing Telecommunication Based On Speaker Voice As The Public Key. |
title_full | Securing Telecommunication Based On Speaker Voice As The Public Key. |
title_fullStr | Securing Telecommunication Based On Speaker Voice As The Public Key. |
title_full_unstemmed | Securing Telecommunication Based On Speaker Voice As The Public Key. |
title_short | Securing Telecommunication Based On Speaker Voice As The Public Key. |
title_sort | securing telecommunication based on speaker voice as the public key |
topic | QA75.5-76.95 Electronic computers. Computer science |
url | http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf |
work_keys_str_mv | AT enayahmontherrateb securingtelecommunicationbasedonspeakervoiceasthepublickey AT samsudinazman securingtelecommunicationbasedonspeakervoiceasthepublickey |