Sign in

Modeling cryptographic properties of voice and voice-based entity authentication.

Giovanni Di CrescenzoMunir CochinwalaHyong Sop Shim
Published in: Digital Identity Management (2007)
Keyphrases
  • hidden markov models
  • smart card
  • desirable properties
  • emotion recognition
  • data sets
  • security protocols
  • text to speech
  • named entities
  • security requirements
  • user authentication
  • fragile watermarking