Authentication of Voice Commands by Leveraging Vibrations in Wearables.
Cong ShiYan WangYingying (Jennifer) ChenNitesh SaxenaPublished in: IEEE Secur. Priv. (2021)
Keyphrases
- user authentication
- biometric authentication
- identity authentication
- identity management
- high level
- fragile watermarking
- security analysis
- image authentication
- semi fragile watermarking
- authentication scheme
- key distribution
- information retrieval
- keystroke dynamics
- voice recognition
- active control
- security mechanisms
- information systems