Securing Telecommunication Based On Speaker Voice As The Public Key.

This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used t...

Full description

Saved in:
Bibliographic Details
Main Authors: Enayah, Monther Rateb, Samsudin, Azman
Format: Article
Language:English
Published: Dr. Sang H. Lee 2007
Subjects:
Online Access:http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf
http://eprints.usm.my/9566/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.usm.eprints.9566
record_format eprints
spelling my.usm.eprints.9566 http://eprints.usm.my/9566/ Securing Telecommunication Based On Speaker Voice As The Public Key. Enayah, Monther Rateb Samsudin, Azman QA75.5-76.95 Electronic computers. Computer science This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used to encrypt of the transferred data over the open communication channel. Dr. Sang H. Lee 2007-03 Article PeerReviewed application/pdf en http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf Enayah, Monther Rateb and Samsudin, Azman (2007) Securing Telecommunication Based On Speaker Voice As The Public Key. International Journal of Computer Science and Network Security (IJCSNS), 7 (3). pp. 201-209. ISSN 1738-7906
institution Universiti Sains Malaysia
building Hamzah Sendut Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Sains Malaysia
content_source USM Institutional Repository
url_provider http://eprints.usm.my/
language English
topic QA75.5-76.95 Electronic computers. Computer science
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Enayah, Monther Rateb
Samsudin, Azman
Securing Telecommunication Based On Speaker Voice As The Public Key.
description This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used to encrypt of the transferred data over the open communication channel.
format Article
author Enayah, Monther Rateb
Samsudin, Azman
author_facet Enayah, Monther Rateb
Samsudin, Azman
author_sort Enayah, Monther Rateb
title Securing Telecommunication Based On Speaker Voice As The Public Key.
title_short Securing Telecommunication Based On Speaker Voice As The Public Key.
title_full Securing Telecommunication Based On Speaker Voice As The Public Key.
title_fullStr Securing Telecommunication Based On Speaker Voice As The Public Key.
title_full_unstemmed Securing Telecommunication Based On Speaker Voice As The Public Key.
title_sort securing telecommunication based on speaker voice as the public key.
publisher Dr. Sang H. Lee
publishDate 2007
url http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf
http://eprints.usm.my/9566/
_version_ 1643701307318468608
score 13.209306