Voice identifier - biometric computer security systems, Computer Engineering

Voice Identifier - Biometric Computer Security Systems

Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voice security technology uses a person’s voiceprint to uniquely recognize individuals. Users can input their voice through the speaker verification devices, and then analysis programs will compare the voice with the one that store at the first time. Therefore, this process constructs an effective protection for computer information.

947_Voice Identifier - Biometric Computer Security Systems.png

However, by the comparison with fingerprint security system, voice identifier is obviously less popular than fingerprint because of some shortages. Generally, voice security technology also contains a majority of drawbacks from fingerprint technology. In fact, voices are not unique for human. A lot of people are also speaking with similar voice. In addition, voice is one of the characters that change more frequently in human’s life (Biometric Security Technology 2009). For example, when people have laryngitis, their voices are different to the voices at normal time, and human’s voices will also change with growth. For this reason, voice security technology still can not be widely promoted and popularized into personal computer.

Posted Date: 4/2/2013 2:47:47 AM | Location : United States







Related Discussions:- Voice identifier - biometric computer security systems, Assignment Help, Ask Question on Voice identifier - biometric computer security systems, Get Answer, Expert's Help, Voice identifier - biometric computer security systems Discussions

Write discussion on Voice identifier - biometric computer security systems
Your posts are moderated
Related Questions
What are the attributes of the method? During implementation a process is characterized by various attributes maintain by the system: Its state Its identification

Determine about the raster-scan systems Most of the present raster-scan systems contain a separate processor called as display processor. This processor performs graphics func

Explain clearly the four stages in the Rapid Application Development

Electrically erasable programmable read only memory (EEPROM) An EEPROM is a special type of PROM which can be erased by exposing it to an electrical charge. Like other kinds of

What is "Common Language Runtime" (CLR)?  CLR is .NET equivalent of Java Virtual Machine (JVM). It is the runtime that changes a MSIL code into the host machine language code,

Determine the advantages of BCD Adder Now let us see the arithmetic addition of two decimal digits in the BCD, with a possible carry from previous stage. As each input digit do

Perform the - 48 - 23 operations using the 2's complement method. Ans. - 48 - 23 = - 48 + (-23)     -48     =  1 1 0 1 0 0 0 0     -23     =  1 1 1 0 1 0 0 1       = -71

Define Operation code. The Operation code of an instruction is a group of  bits that explain such operations as add, sub, ,shift, mul and complement.

output devices used in virtual rality

Give some technical specification for subscriber lines. Subscriber pairs and exchange pairs are interconnected at the MDF through jumpers. The MDF therefore gives a flexible in