MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "10bb0771-37cf-4ec7-b3f0-f9e20258714d"}, "_deposit": {"id": "4810", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4810"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4810", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Generating a public key from voice biometric to enhance the security", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "In this paper, we motivate and summarize our work on repeatedly generating cryptographic keys from audio files that are user input. Then, the processing steps for the speaker\u0027s signal which is used to produce the public key. There are several biometric systems in existence that deal with cryptography, but the proposed voice biometric system introduces a novel method to generate cryptographic key. The goal of this work is to generate the public key using RSA and RC4 stream cipher upon its user speaking voice files and then this key is used to encrypt user’s voice data and text files. The keys resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Finally the study proposed the use of RSA, Diffie-Hellman and RC4 algorithms to identify/authenticate the voice of the speaker and therefore use the voice as the public key and to secure the communication between two users."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Myint, May Thu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/706"}, "item_title": "Generating a public key from voice biometric to enhance the security", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004810", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-11"}, "publish_date": "2019-07-11", "publish_status": "0", "recid": "4810", "relation": {}, "relation_version_is_last": true, "title": ["Generating a public key from voice biometric to enhance the security"], "weko_shared_id": -1}
Generating a public key from voice biometric to enhance the security
http://hdl.handle.net/20.500.12678/0000004810
http://hdl.handle.net/20.500.12678/0000004810