Securing Telecommunication Based On Speaker Voice As The Public Key.
This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used t...
Main Authors: | Enayah, Monther Rateb, Samsudin, Azman |
---|---|
Format: | Article |
Language: | English |
Published: |
Dr. Sang H. Lee
2007
|
Subjects: | |
Online Access: | http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf |
Similar Items
-
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012) -
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007) -
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007) -
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017) -
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007)