Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition
In this paper, a Multi-Factor Authentication (MFA) method is developed by a combination of Personal Identification Number (PIN), One Time Password (OTP), and speaker biometric through the speech watermarks. For this reason, a multipurpose digital speech watermarking applied to embed semi-fragile and...
| Main Authors: | Nematollahi, Mohammad Ali, Rosales, Hamurabi Gamboa, Martinez-Ruiz, Francisco Javier, Rosa-Vargas, Jose Ismael De la, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Esmaeilpour, Mansour |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2017
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/56563/ http://psasir.upm.edu.my/id/eprint/56563/1/Multi-factor%20authentication%20model%20based%20on%20multipurpose%20speech%20watermarking%20and%20online%20speaker%20recognition.pdf |
Similar Items
Robust digital speech watermarking for online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
Semi-fragile digital speech watermarking for online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
A method for speech watermarking in speaker verification
by: Syed Mohamed, Syed Abdul Rahman Al-Haddad, et al.
Published: (2013)
by: Syed Mohamed, Syed Abdul Rahman Al-Haddad, et al.
Published: (2013)
Digital speech watermarking for anti-spoofing attack in speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
Digital speech watermarking for online speaker recognition systems
by: Nematollahi, Mohammad Ali
Published: (2015)
by: Nematollahi, Mohammad Ali
Published: (2015)
A study on multipurpose watermarking techniques for image
by: Hasan Abbas, Nidaa, et al.
Published: (2017)
by: Hasan Abbas, Nidaa, et al.
Published: (2017)
An overview of digital speech watermarking
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)
Blind digital speech watermarking based on Eigen-value quantization in DWT
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
Digital watermarking for mammogram authentication
by: Abdul Manaf, Azizah, et al.
Published: (2010)
by: Abdul Manaf, Azizah, et al.
Published: (2010)
Watermark Embedder and Image Authenticator (WEIA)
by: Lu, Chun Ling, et al.
Published: (2014)
by: Lu, Chun Ling, et al.
Published: (2014)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Image authentication using Zernike moment watermarking
by: Shojanazeri, Hamid
Published: (2013)
by: Shojanazeri, Hamid
Published: (2013)
Digital audio and speech watermarking based on the multiple discrete wavelets transform and singular value decomposition
by: Nematollahi, Mohammad Ali, et al.
Published: (2012)
by: Nematollahi, Mohammad Ali, et al.
Published: (2012)
Interacting video information via speech watermarking for mobile second screen in Android smartphone
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008)
by: Low, Cheng Yaw
Published: (2008)
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008)
by: Yaw, Low Cheng
Published: (2008)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
Speaker authentication system using soft computing approaches
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2005)
by: Abdul Rahman, Abdul Wahab, et al.
Published: (2005)
Static: the multipurpose keyword
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Boxiture (multipurpose furniture)
by: Kok, Hui Chin, et al.
Published: (2015)
by: Kok, Hui Chin, et al.
Published: (2015)
Fragile watermarking for image authentication using dyadic walsh ordering
by: Adi, Prajanto Wahyu, et al.
Published: (2023)
by: Adi, Prajanto Wahyu, et al.
Published: (2023)
HEVC watermarking techniques for authentication and copyright applications: challenges and opportunities
by: Ali A., Elrowayati, et al.
Published: (2020)
by: Ali A., Elrowayati, et al.
Published: (2020)
Digital image watermarking based on angle quantization in discrete contourlet transform
by: Najih, Abdulmawla, et al.
Published: (2017)
by: Najih, Abdulmawla, et al.
Published: (2017)
Design and fabricate multipurpose trolley
by: Al Nazirul, Haron
Published: (2010)
by: Al Nazirul, Haron
Published: (2010)
Design and fabrication of multipurpose container
by: Anas Muzamil, Hamiddin
Published: (2009)
by: Anas Muzamil, Hamiddin
Published: (2009)
Development of multipurpose tree lamp
by: Mohamad Azwan, Mohd Ghazali
Published: (2009)
by: Mohamad Azwan, Mohd Ghazali
Published: (2009)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Comparative study on the effectiveness of building maintenance scheduling between two multipurpose hall buildings
by: Shukur, Muhammad Mahathir, et al.
Published: (2021)
by: Shukur, Muhammad Mahathir, et al.
Published: (2021)
Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication
by: Liew, Siau-Chuin, et al.
Published: (2013)
by: Liew, Siau-Chuin, et al.
Published: (2013)
Discrete Wavelet Transform (DWT) Based Dual Watermarking For Authentication And Copyright Protection
by: Lim, Chen Gen
Published: (2023)
by: Lim, Chen Gen
Published: (2023)
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
by: Wong, Shu Jie
Published: (2023)
by: Wong, Shu Jie
Published: (2023)
Enhanced LSB watermarking methods based on scanning patterns for authentication of medical images
by: Syifak Izhar, Hisham
Published: (2016)
by: Syifak Izhar, Hisham
Published: (2016)
Fingerprint watermarking with tamper localization and exact recovery using multi-level authentication
by: Wei, Keat Lee, et al.
Published: (2018)
by: Wei, Keat Lee, et al.
Published: (2018)
Dual watermarking based on DCT with human visual characteristics for authentication and copyright protection
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Watermark blending technique for securing user authentication data in mobile application systems
by: Mohamed, Kartini, et al.
Published: (2019)
by: Mohamed, Kartini, et al.
Published: (2019)
The Use of ePortfolios for Multipurpose Assessment
by: Pelliccione, Lina, et al.
Published: (2008)
by: Pelliccione, Lina, et al.
Published: (2008)
Design and fabricate multipurpose portable desk
by: Muhammad Zulfadli, Che Zakaria
Published: (2008)
by: Muhammad Zulfadli, Che Zakaria
Published: (2008)
Similar Items
-
Robust digital speech watermarking for online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2015) -
Semi-fragile digital speech watermarking for online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2015) -
A method for speech watermarking in speaker verification
by: Syed Mohamed, Syed Abdul Rahman Al-Haddad, et al.
Published: (2013) -
Digital speech watermarking for anti-spoofing attack in speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2014) -
Digital speech watermarking for online speaker recognition systems
by: Nematollahi, Mohammad Ali
Published: (2015)