Voice identifier - biometric computer security systems, Computer Engineering

Voice Identifier - Biometric Computer Security Systems

Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voice security technology uses a person’s voiceprint to uniquely recognize individuals. Users can input their voice through the speaker verification devices, and then analysis programs will compare the voice with the one that store at the first time. Therefore, this process constructs an effective protection for computer information.

947_Voice Identifier - Biometric Computer Security Systems.png

However, by the comparison with fingerprint security system, voice identifier is obviously less popular than fingerprint because of some shortages. Generally, voice security technology also contains a majority of drawbacks from fingerprint technology. In fact, voices are not unique for human. A lot of people are also speaking with similar voice. In addition, voice is one of the characters that change more frequently in human’s life (Biometric Security Technology 2009). For example, when people have laryngitis, their voices are different to the voices at normal time, and human’s voices will also change with growth. For this reason, voice security technology still can not be widely promoted and popularized into personal computer.

Posted Date: 4/2/2013 2:47:47 AM | Location : United States







Related Discussions:- Voice identifier - biometric computer security systems, Assignment Help, Ask Question on Voice identifier - biometric computer security systems, Get Answer, Expert's Help, Voice identifier - biometric computer security systems Discussions

Write discussion on Voice identifier - biometric computer security systems
Your posts are moderated
Related Questions
Q. Define syntax of MPI_Scan  function? MPI_Scan (Sendaddr,, Receiveaddr , count, datatype, op, comm): It merges the partial values in p final results that are received in


What are the concerns for growth of e-commerce in India?  Government as Facilitator for the growth of e-commerce has taken certain steps: Promotion of competitive teleco

First, remember that different processes keep their own data in distinct address spaces. Threads, on the other hand, explicitly share their entire address space with one another. A

what is Asynchronous Finite State Machines?

What is SIMD? Single Instruction stream, Multiple Data stream (SIMD) shows an organization that contains many processing units under the supervision of a common control unit. A


? Object: The interaction among objects takes place in a system. An object is depicted by a rectangle with the name of the object, preceded by a colon and underline. ? Relation

Q. Describe about general-purpose microprocessor? Keeping rapidity with electronics as more and more components were fabricated on a single chip fewer chips were required to ma

What are included in scope of Supply Chain Management Consultancy? Supply Chain Management Consultancy's scope is extensive, and classically includes as given here: a. Sales