Voice identifier - biometric computer security systems, Computer Engineering

Voice Identifier - Biometric Computer Security Systems

Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voice security technology uses a person’s voiceprint to uniquely recognize individuals. Users can input their voice through the speaker verification devices, and then analysis programs will compare the voice with the one that store at the first time. Therefore, this process constructs an effective protection for computer information.

947_Voice Identifier - Biometric Computer Security Systems.png

However, by the comparison with fingerprint security system, voice identifier is obviously less popular than fingerprint because of some shortages. Generally, voice security technology also contains a majority of drawbacks from fingerprint technology. In fact, voices are not unique for human. A lot of people are also speaking with similar voice. In addition, voice is one of the characters that change more frequently in human’s life (Biometric Security Technology 2009). For example, when people have laryngitis, their voices are different to the voices at normal time, and human’s voices will also change with growth. For this reason, voice security technology still can not be widely promoted and popularized into personal computer.

Posted Date: 4/2/2013 2:47:47 AM | Location : United States







Related Discussions:- Voice identifier - biometric computer security systems, Assignment Help, Ask Question on Voice identifier - biometric computer security systems, Get Answer, Expert's Help, Voice identifier - biometric computer security systems Discussions

Write discussion on Voice identifier - biometric computer security systems
Your posts are moderated
Related Questions
What is Server in SAP terminology? A component can having of one process or a group and is then known as the server for the respective service.

Determine the abstraction mechanisms for modelling The object orientation conceptual structure helps in providing abstraction mechanisms for modelling, that includes: Cl

How can you pass a struct by reference in e?   The question is phrased in a tricky way because passing by reference is the default and only possible way to pass structs in e. I

What are the simplest way to restrict the users The simplest way to restrict the users to peek inside the internals of the Web site is to use firewalls, where the information c

how to prove the partial order R is a total order in discrete mathmetics and structures by topological sorting method in c programming

Design a BCD to seven segment decoder that accepts a decimal digit in BCS and generates the appropriate output for segments in display indicator. Ans: BCD-TO-seven-Segment

what is ment by avl tree n insertion n deletion ,2-3 tress insertion n deletion

Flag is known as Low order register & Accumulator is known as High order Register.

Which processing is not a part of Synthesis phase? Ans. Perform LC processing is not a part of Synthesis phase.

what are the questionnaries and observation of work site for banking system?