Speech based Password Protected Cyber Applications

نویسندگان

  • Urmila Shrawankar
  • Vilas M. Thakare
چکیده

Whenever we think of cyber applications, we visualize the model that gives the idea that we are sitting in front of computer at home or workplace connected to internet and performing all the work that generally we have to go and do on a specific place for example e-shopping, ebanking, e-education etc. In case of e-shopping, we view all the products on the computer screen with all details by a single mouse click, select the product and do all further money transaction through net. When we think of security, is it 100% secure? No, not at all because though it is password protected, the password is a text base secrete code that can be open. Therefore this paper is concentrated on preparation of speech based password protected applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers

A wireless router is a networking device that enables a user to set up a wireless connection to the Internet. A router can offer a secure channel by cryptographicmeans which provides authenticity and confidentiality. Nowadays, almost all routers use a secure channel by default that is based on Wi-Fi Protected Access II (WPA2). This is a security protocol which is believed not to be susceptible ...

متن کامل

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

Cyber and Physical Access Control in Legacy System Using Passwords

Passwords—secret combinations of symbols—play an important role in physical world security (e.g. watchword to prevent unauthorized entry into military forbidden area) from ancient times. With emergence and advance of digital computers and computer network, passwords are also widely adopted in cyber world security protection. In most applications, password protection stands on the frontier of cy...

متن کامل

Encrypted key exchange: password-based protocols secure against dictionary attacks

Classical cryptographic protocols based on user chosen keys allow an attacker to mount password guessing attacks We introduce a novel combination of asymmetric public key and symmetric secret key cryptography that allow two parties sharing a common password to exchange con dential and authenticated information over an insecure network These proto cols are secure against active attacks and have ...

متن کامل

On Combining Classifiers for Password Secured Automatic Speaker Recognition System

Automatic Speaker recognition (ASR) is a pattern recognition problem that involves the process of automatically recognizing the speaker from their voices. Password protected speaker recognition system gives an extra security to the system where a person is not only identified by his natural voice biometric but also needs to remember a password (e.g. a combination lock number) that has to be spo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1305.1428  شماره 

صفحات  -

تاریخ انتشار 2007