Securing Telecommunication Based On Speaker Voice As The Public Key.
This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used t...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Dr. Sang H. Lee
2007
|
Subjects: | |
Online Access: | http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf http://eprints.usm.my/9566/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.usm.eprints.9566 |
---|---|
record_format |
eprints |
spelling |
my.usm.eprints.9566 http://eprints.usm.my/9566/ Securing Telecommunication Based On Speaker Voice As The Public Key. Enayah, Monther Rateb Samsudin, Azman QA75.5-76.95 Electronic computers. Computer science This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used to encrypt of the transferred data over the open communication channel. Dr. Sang H. Lee 2007-03 Article PeerReviewed application/pdf en http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf Enayah, Monther Rateb and Samsudin, Azman (2007) Securing Telecommunication Based On Speaker Voice As The Public Key. International Journal of Computer Science and Network Security (IJCSNS), 7 (3). pp. 201-209. ISSN 1738-7906 |
institution |
Universiti Sains Malaysia |
building |
Hamzah Sendut Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Sains Malaysia |
content_source |
USM Institutional Repository |
url_provider |
http://eprints.usm.my/ |
language |
English |
topic |
QA75.5-76.95 Electronic computers. Computer science |
spellingShingle |
QA75.5-76.95 Electronic computers. Computer science Enayah, Monther Rateb Samsudin, Azman Securing Telecommunication Based On Speaker Voice As The Public Key. |
description |
This paper proposes a technique to generate a public
cryptographic key from user’s voice while speaking over a
handheld device. Making use of the human intelligence to
identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used to encrypt of the transferred data over the open communication channel.
|
format |
Article |
author |
Enayah, Monther Rateb Samsudin, Azman |
author_facet |
Enayah, Monther Rateb Samsudin, Azman |
author_sort |
Enayah, Monther Rateb |
title |
Securing Telecommunication Based On Speaker Voice As The Public Key. |
title_short |
Securing Telecommunication Based On Speaker Voice As The Public Key. |
title_full |
Securing Telecommunication Based On Speaker Voice As The Public Key. |
title_fullStr |
Securing Telecommunication Based On Speaker Voice As The Public Key. |
title_full_unstemmed |
Securing Telecommunication Based On Speaker Voice As The Public Key. |
title_sort |
securing telecommunication based on speaker voice as the public key. |
publisher |
Dr. Sang H. Lee |
publishDate |
2007 |
url |
http://eprints.usm.my/9566/1/Securing_Telecommunication_based_on_Speaker_Voice_as_the_Public_Key.pdf http://eprints.usm.my/9566/ |
_version_ |
1643701307318468608 |
score |
13.209306 |