Voice identifier - biometric computer security systems, Computer Engineering

Voice Identifier - Biometric Computer Security Systems

Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voice security technology uses a person’s voiceprint to uniquely recognize individuals. Users can input their voice through the speaker verification devices, and then analysis programs will compare the voice with the one that store at the first time. Therefore, this process constructs an effective protection for computer information.

947_Voice Identifier - Biometric Computer Security Systems.png

However, by the comparison with fingerprint security system, voice identifier is obviously less popular than fingerprint because of some shortages. Generally, voice security technology also contains a majority of drawbacks from fingerprint technology. In fact, voices are not unique for human. A lot of people are also speaking with similar voice. In addition, voice is one of the characters that change more frequently in human’s life (Biometric Security Technology 2009). For example, when people have laryngitis, their voices are different to the voices at normal time, and human’s voices will also change with growth. For this reason, voice security technology still can not be widely promoted and popularized into personal computer.

Posted Date: 4/2/2013 2:47:47 AM | Location : United States







Related Discussions:- Voice identifier - biometric computer security systems, Assignment Help, Ask Question on Voice identifier - biometric computer security systems, Get Answer, Expert's Help, Voice identifier - biometric computer security systems Discussions

Write discussion on Voice identifier - biometric computer security systems
Your posts are moderated
Related Questions
What is application software? Give example. Application programs are usually written in a high level programming language, in which the programmer states mathematical or text p


What is a pointer? The register or memory location that having the address of an operand is known as a pointer.

Functioning of registers: at any instance of time global registers and only one window of registers is visible and is addressable as if it were only set of registers. So for progra

what are the different way of executing pipelines

Shift Microoperations Shift microoperation can be used for serial transfer of the data. They are used generally with arithmetic, logic and other data-processing operations. The

In digital ICs, Schottky transistors are preferred over normal transistors because of their ? Ans. Lower  propagation  delay  in digital ICs, as  shottky  transistors  reduce

With neat diagrams explains the configuration of a step-by-step switching system. The schematic diagram for an exchange is specified in figure. Each subscriber is associated to

DADA Electronics makes CD players in 3 processes: programming, and packaging. Direct materials are added at the starting of the assembly process. Conversion costs are incurred even

Execution: Now instruction is ready for execution. A different opcode will need different sequence of steps for execution. Hence let's discuss a few illustrations of execution of s