Securing Telecommunication Based On Speaker Voice As The Public Key.

This paper proposes a technique to generate a public cryptographic key from user's voice while speaking over a handheld device. Making use of the human intelligence to identify authenticate the voice of the speaker and therefore use the voice as the public key. The generated public key is used...

Full description

Bibliographic Details
Main Authors: Enayah, Monther Rateb (Author), Samsudin, Azman (Author)
Format: Article
Language:English
Published: Dr. Sang H. Lee, 2007-03.
Subjects:
Online Access:Get fulltext