Essays about: "voice biometrics"
Showing result 1 - 5 of 9 essays containing the words voice biometrics.
-
1. Voice Biometrics Exploring The Boundaries Of Speaker Verification
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Recent advancements in computational power, datasets and models have resulted in significant performanceincreases across various speech and speaker recognition models. This work investigates the capabilities ofusing voice as a biometric tool, namely what is referred to as speaker verification. READ MORE
-
2. Machine Learning for Text-Independent Speaker Verification : How to Teach a Machine to RecognizeHuman Voices
University essay from KTH/Skolan för elektro- och systemteknik (EES)Abstract : The aim of speaker recognition and veri cation is to identify people's identity from the characteristics of their voices (voice biometrics). Traditionally this technology has been employed mostly for security or authentication purposes, identi cation of employees/customers and criminal investigations. READ MORE
-
3. Seamless speaker recognition
University essay from KTH/Radio Systems Laboratory (RS Lab)Abstract : In a technologically advanced society, the average person manages dozens of accounts for e-mail, social networks, e-banking, and other electronic services. As the number of these accounts increases, the need for automatic user identification becomes more essential. READ MORE
-
4. Biometrics Technology : Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : Context. Biometric technology is a secure and convenient identification method and it does not need to remember complex passwords, nor smart cards, keys, and the like. Biometrics is the measurable characteristics of individuals based on their behavioral patterns or physiological features that can be used to verify or recognize their identity. READ MORE
-
5. Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : In order to protect the security of the commercial information, personnel information, military information, governmental information on the Internet, the claimed identity should be authenticated. Now there are three main security authentication methods: first: using user PIN, such as password; second: using physical key, such as USBKey; third: using biological authentication technology, such as fingerprint, iris, voice and palm prints, etc. READ MORE