Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "10bb0771-37cf-4ec7-b3f0-f9e20258714d"}, "_deposit": {"id": "4810", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4810"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4810", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Generating a public key from voice biometric to enhance the security", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In this paper, we motivate and summarize our work on repeatedly generating cryptographic keys from audio files that are user input. Then, the processing steps for the speaker\u0027s signal which is used to produce the public key. There are several biometric systems in existence that deal with cryptography, but the proposed voice biometric system introduces a novel method to generate cryptographic key. The goal of this work is to generate the public key using RSA and RC4 stream cipher upon its user speaking voice files and then this key is used to encrypt user’s voice data and text files. The keys resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Finally the study proposed the use of RSA, Diffie-Hellman and RC4 algorithms to identify/authenticate the voice of the speaker and therefore use the voice as the public key and to secure the communication between two users."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Myint, May Thu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/706"}, "item_title": "Generating a public key from voice biometric to enhance the security", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004810", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-11"}, "publish_date": "2019-07-11", "publish_status": "0", "recid": "4810", "relation": {}, "relation_version_is_last": true, "title": ["Generating a public key from voice biometric to enhance the security"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Generating a public key from voice biometric to enhance the security

http://hdl.handle.net/20.500.12678/0000004810
http://hdl.handle.net/20.500.12678/0000004810
e2a14792-e138-458a-9cc1-7eacc36cb3ac
10bb0771-37cf-4ec7-b3f0-f9e20258714d
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:22:10.975708
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL