PREVENTING UNAUTHORIZED ACCESS TO SPECIAL APPLICATIONS USING SIGNED AUDIO
Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.10, No. 1)Publication Date: 2019-01-31
Authors : Dr.Sana Ahmed Kadhim; Dr.Saad Abdual Azize Abdual Rahman;
Page : 2733-2738
Keywords : Secrete key; Digital voices; Move_to_Front (MTF) algorithm; Selected voice positions; Authorization process;
Abstract
Due to the massive use of multimedia in communications and accessing businesses and banks accounts, authorization has become a necessity. Media like image, audio and video have been used frequently in secure and confidential access to accounts and special business pages. Voices are used as a signature to identify individuals to get permission to special processes. In this paper an authorization method is proposed to sign the voices used for accessing special applications by encrypting, compressing and hiding confidential data within the individuals' voices in selected locations. The proposed method has large SNR and PSNR while it has very small BER and MSR
Other Latest Articles
- EFFICIENCY IMPROVEMENT METHODOLOGY FOR FUNCTIONING OF MACHINE-TRACTOR DIESEL UNIT WITH ELECTRONIC POSITIONAL REGULATION OF FUEL SUPPLY
- COMPLEX ALGORITHM FOR DEVELOPING EFFECTIVE KILL FLUIDS FOR OIL AND GAS CONDENSATE RESERVOIRS
- CORRELATIONS BETWEEN DYNAMIC AND STATIC MECHANICAL PROPERTIES OF CLAYEY SOILS
- ACID STIMULATION TECHNOLOGY FOR WELLS DRILLED THE LOW-PERMEABLE HIGH-TEMPERATURE TERRIGENOUS RESERVOIRS WITH HIGH CARBONATE CONTENT
- PREDICTION OF BEARING CAPACITY, ANGLE OF INTERNAL FRICTION, COHESION, AND PLASTICITY INDEX USING ANN (CASE STUDY OF BAGHDAD, IRAQ)
Last modified: 2019-05-22 15:11:35