期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Use of AI Voice Authentication Technology Instead of Traditional Keypads in Security Devices
1
作者 Deepak Ramesh Chandran 《Journal of Computer and Communications》 2022年第6期11-21,共11页
Traditional keypads and text-based passwords are vulnerable to scams and hacks, leading to enormous levels of embezzlement and frauds apart from various other threats to data security. AI based voice authentication ho... Traditional keypads and text-based passwords are vulnerable to scams and hacks, leading to enormous levels of embezzlement and frauds apart from various other threats to data security. AI based voice authentication holds unparalleled value for data protection, security, and privacy, by providing an effective alternative to traditional password-based protection. This paper reports the findings of a limited literature review that forms the basis for further research towards enhancing the reliability and security of AI voice authentication. Based on the findings of the review of existing literature, this paper proposes that integration of the blockchain technology with the AI voice authentication can significantly enhance the data security, starting from mobile devices to the security of big agencies and banks. The key processes in implementing an AI voice authentication system are proposed as a conceptual model, to facilitate further research for implementation. 展开更多
关键词 Artificial Intelligence voice authentication Blockchain Data Security Automatic Speech Recognition voice Biometrics
下载PDF
Securing User Authentication with Server-Side Voice Verification
2
作者 Deepak R. Chandran Sanath Kumar S. Deepashri 《Journal of Computer and Communications》 2023年第5期137-150,共14页
User authentication is critical to the security of any information system. The traditional text-based passwords and even biometric systems based on face and fingerprint validation suffer from various drawbacks. Voice-... User authentication is critical to the security of any information system. The traditional text-based passwords and even biometric systems based on face and fingerprint validation suffer from various drawbacks. Voice-based authentication systems have emerged as an effective alternative method. Within the user authentication systems, the server-side voice authentication systems added advantages. The purpose of this paper is to present an innovative approach to the use of voice verification for user authentication. This paper describes a new framework for the implementation of server-side voice authentication, ensuring that only the users who are authenticated and validated can access the system. In addition to providing enhanced security and a more pleasant user experience, this technology has potential applications in a wide range of fields. 展开更多
关键词 voice authentication Data Security voice Biometrics Automatic Speech Recognition
下载PDF
Abstract Artist Xu Dongdong
3
作者 JIAO FENG 《China Today》 2015年第7期63-65,共3页
TALKING with Xu Dongdong is a pleasure.His gentle voice with its authentic Beijing burr is easy on the ear.Occasionally laughing out loud,he reveals a frank and free personality.Our topics of discussion ranged from th... TALKING with Xu Dongdong is a pleasure.His gentle voice with its authentic Beijing burr is easy on the ear.Occasionally laughing out loud,he reveals a frank and free personality.Our topics of discussion ranged from the arts and philosophy to quantum mechanics,from traditional Oriental culture to the industrial revolution in the West,and from his early years in painting studies to the Chinese-style abstract paintings that he now 展开更多
关键词 authentic discussion pleasure painting revolution personality gentle philosophy voice ranged
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部