Voice identifier - biometric computer security systems, Computer Engineering

Voice Identifier - Biometric Computer Security Systems

Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voice security technology uses a person’s voiceprint to uniquely recognize individuals. Users can input their voice through the speaker verification devices, and then analysis programs will compare the voice with the one that store at the first time. Therefore, this process constructs an effective protection for computer information.

947_Voice Identifier - Biometric Computer Security Systems.png

However, by the comparison with fingerprint security system, voice identifier is obviously less popular than fingerprint because of some shortages. Generally, voice security technology also contains a majority of drawbacks from fingerprint technology. In fact, voices are not unique for human. A lot of people are also speaking with similar voice. In addition, voice is one of the characters that change more frequently in human’s life (Biometric Security Technology 2009). For example, when people have laryngitis, their voices are different to the voices at normal time, and human’s voices will also change with growth. For this reason, voice security technology still can not be widely promoted and popularized into personal computer.

Posted Date: 4/2/2013 2:47:47 AM | Location : United States







Related Discussions:- Voice identifier - biometric computer security systems, Assignment Help, Ask Question on Voice identifier - biometric computer security systems, Get Answer, Expert's Help, Voice identifier - biometric computer security systems Discussions

Write discussion on Voice identifier - biometric computer security systems
Your posts are moderated
Related Questions
What is Linear Addressing Mode. Ans. Linear Addressing: Addressing is the procedure of selecting one of the cells in a memory to be written in or to be read from. So as to fa

Explain how a centralized SPC organization works under load sharing operation. Under load sharing operation, an incoming call is allocated randomly or in a predetermined sequen

In a particular exchange during busy hour 1200 calls were offered to a group of trunks, during this time 6 calls were lost. The average call duration being 3 minutes Calculate

8086 microprocessor comprises two independent units:  1.  Bus Interface unit 2.  Execution unit Please refer to Figure below. Figure: The CPU of INTEL 8086 Microp

Define access time for magnetic disk. The sum of seek time and rotational delay is known as access time for disks. Normal 0 false false false EN-IN

What is a thread? A thread otherwise called a lightweight process (LWP) is a basic unit of CPU utilization, it comprises of a thread id, a program counter, a register set and a

how does a ohms law c++ programming works

Is it possible to unit test an MVC application without running the controllers in an ASP.NET process? Ans) Yes, all the features in an asp.net MVC application are interface ba

Line A Line is, on a simple level, a mark connecting 2 points. However, how lines are used in an image is extremely important. By varying the quality of line used in an image,

How is a valid user identifier accomplished? A valid user identifier is accomplished within one or more of given ways: • Provide some password, which only user knows. • P