Incorporating the Biometric Voice Technology into the E-Government Systems to Enhance the User Verification

نویسنده

  • KHALID T. AL-SARAYREH
چکیده

Many courtiers around the world have started their e-government programs. E-government portals will be increasingly used by the citizens of many countries to access a set of services. Currently, the use of the e-government portals arises many challenges; one of these challenges is the security issues. E-government portals security is a very important characteristic in which it should be taken into account. In this paper, we have incorporated the biometric voice technology into the e-government portals in order to increase the security and enhance the user verification. In this way, the security should be increased since the user needs to use his voice along with his password. Therefore, no any unauthorized person can access the e-government portal even if he/she knows the required password.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mouse Dynamics Biometric Technology

Different types of biometrics are currently available in the market, and are widely used in various security applications. Biometrics can be classified into two categories, “physiological biometrics” and “behavioral biometrics”. Physiological biometrics identify the user based on physiological characteristics, such as fingerprints and eye retina/iris scanning, whereas behavioral biometrics depe...

متن کامل

User verification in a BioVXML framework

We present BioVXML as an extension of the Voice Extensible Markup Language (VoiceXML). BioVXML is designed for creating modules of biometric verification while maintaining all the features and capabilities of the original VoiceXML. The user verification can now be performed by processing different biometric traits, such as speech or face, and these features gives us an assurance of the user ide...

متن کامل

Secure voice based authentication for mobile devices: Vaulted Voice Verification

As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile p...

متن کامل

An Efficient Algorithm for Fingercode-Based Biometric Identification

With the emerging trend of incorporating biometrics information in e-financial and e-government systems arisen from international efforts in anti-money laundering and counter-terrorism, biometric identification is gaining increasing importance as a component in information security applications. Recently, fingercode has been demonstrated to be an effective fingerprint biometric scheme, which ca...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008