Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
The emergence of mobile technologies has greatly popularised the usage of speaker recognition based applications (e.g., biometric lock, voice banking and attendance system). However, with the increase in the usage of these biometric based applications, major concerns of the users will be on the secu...
| Main Author: | Chee, Kong Yik |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/3609/ http://eprints.utar.edu.my/3609/1/SCA%2D2018%2D1601194%2D1.pdf |
Similar Items
Indexing-First-One Hashing based Cancellable Iris Template Generation
by: Lai, Yen Lung
Published: (2017)
by: Lai, Yen Lung
Published: (2017)
Improved fuzzy hashing technique for biometric template protection
by: Ong, T. S., et al.
Published: (2014)
by: Ong, T. S., et al.
Published: (2014)
Winner takes all: the challenges and opportunities in the study tour industry in China after the epidemic
by: Longyue, Cheng, et al.
Published: (2024)
by: Longyue, Cheng, et al.
Published: (2024)
Volvo takes student winners abroad
by: New Sunday Times,
Published: (2014)
by: New Sunday Times,
Published: (2014)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
Implementation of fingerprint biometric template system in embedded software design
by: Zakaria, Nor Farizan
Published: (2006)
by: Zakaria, Nor Farizan
Published: (2006)
Overloaded Transmission Lines Protection Based On Intelligent Control Protection Scheme
by: Ali, A., et al.
Published: (2016)
by: Ali, A., et al.
Published: (2016)
Design and implementation of MD5 hash function algorithm using verilog HDL
by: Shamsiah, Suhaili, et al.
Published: (2022)
by: Shamsiah, Suhaili, et al.
Published: (2022)
Design and Validation of an Alignment Free Cancellable Fingerprint Template Protection Scheme
by: Badiul, Alam
Published: (2018)
by: Badiul, Alam
Published: (2018)
Auto generate women cloth template
by: Hilda, Zainal
Published: (2012)
by: Hilda, Zainal
Published: (2012)
Auto generate men cloth template
by: Nurulfarhana, Mohd Azhar
Published: (2012)
by: Nurulfarhana, Mohd Azhar
Published: (2012)
Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
CITREX 2023 - Congratulations to all winners from CMS
by: Nadirah, Mohd Nasir
Published: (2023)
by: Nadirah, Mohd Nasir
Published: (2023)
Biopharmaceuticals protection, cure and the real winner
by: Mohd Lila, Mohd Azmi
Published: (2011)
by: Mohd Lila, Mohd Azmi
Published: (2011)
Analysis of unclean hand system detection using template matching technique
by: Faradila, Naim, et al.
Published: (2017)
by: Faradila, Naim, et al.
Published: (2017)
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
by: Lim , Yen Ruen
Published: (2017)
by: Lim , Yen Ruen
Published: (2017)
Protection Scheme for Low Voltage Distribution Network with High Penetration of Distributed Generation
by: Tang, Jun Huat
Published: (2011)
by: Tang, Jun Huat
Published: (2011)
Hash-Tree Anti-Tampering Schemes
by: Moss, Ben, et al.
Published: (2002)
by: Moss, Ben, et al.
Published: (2002)
CITREX 2024 - Congratulations to all winners from PSM UMPSA
by: Muhammad Azrin, Ahmad
Published: (2024)
by: Muhammad Azrin, Ahmad
Published: (2024)
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
by: A. Rashid, Rozeha, et al.
Published: (2008)
by: A. Rashid, Rozeha, et al.
Published: (2008)
Design And Analysis Of Integrated Optical Branching Waveguides
by: Yong , Yik Seng
Published: (2005)
by: Yong , Yik Seng
Published: (2005)
Image Template Matching Based on Simulated Kalman Filter (SKF) Algorithm
by: Nurnajmin Qasrina, Ann, et al.
Published: (2018)
by: Nurnajmin Qasrina, Ann, et al.
Published: (2018)
Wireless speed control with voice for wheelchair application
by: Abd. Ghani, Zamre
Published: (2007)
by: Abd. Ghani, Zamre
Published: (2007)
Research and design voice control camera using raspberry PI
by: Janani, V., et al.
Published: (2019)
by: Janani, V., et al.
Published: (2019)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
Voice Recognition Algorithm in the Development of Universal Remote Control
by: Muda, Lindasalwa, et al.
Published: (2009)
by: Muda, Lindasalwa, et al.
Published: (2009)
Development of multilanguage voice control for smart home with IoT
by: A. H., Ruslan, et al.
Published: (2021)
by: A. H., Ruslan, et al.
Published: (2021)
Voice to text system for disabled (V2TS)
by: Krishnamurtthu, Sivathiban
Published: (2010)
by: Krishnamurtthu, Sivathiban
Published: (2010)
Development of images to braille conversion software for alphabets using template matching and rule based
by: Izzati Farrahiyah, Mazlan
Published: (2011)
by: Izzati Farrahiyah, Mazlan
Published: (2011)
Development of Protection Relays Testing Equipment
by: Lee, Chee Hiun
Published: (2019)
by: Lee, Chee Hiun
Published: (2019)
Design And Analysis Of A Fast Transient Voltage Regulator With All Ceramic Output Capacitors For Mobile Microprocessors
by: Lee, Chun Heng
Published: (2013)
by: Lee, Chun Heng
Published: (2013)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Geometrical-Based Lip-Reading using Template Probabilistic Multi-Dimension Dynamic Time Warping
by: M. Z., Ibrahim, et al.
Published: (2015)
by: M. Z., Ibrahim, et al.
Published: (2015)
Automated grass cutter using voice recognition
by: Muhamad Salihin, Nasir, et al.
Published: (2021)
by: Muhamad Salihin, Nasir, et al.
Published: (2021)
Development of Wireless Voice – Activated Universal Remote Control for Electronic Gadgets
by: Muda, Lindasalwa, et al.
Published: (2009)
by: Muda, Lindasalwa, et al.
Published: (2009)
Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system
by: Nurnajmin Qasrina Ann, Ayop Azmi
Published: (2018)
by: Nurnajmin Qasrina Ann, Ayop Azmi
Published: (2018)
Motion control using voice for wheelchair application
by: Ismail, Hashimah
Published: (2006)
by: Ismail, Hashimah
Published: (2006)
Development of images to braille conversion software for symbols using template matching with rules base (images to editable text for debraillso)
by: Mohd Solahuddin, Jaafar
Published: (2011)
by: Mohd Solahuddin, Jaafar
Published: (2011)
Modeling and characterization of all possible triple pass EDFA configurations
by: Akhter, Fowzia, et al.
Published: (2012)
by: Akhter, Fowzia, et al.
Published: (2012)
Evaluation of Electrode Materials for All-copper Hybrid Flow Batteries
by: Puiki, Leung, et al.
Published: (2016)
by: Puiki, Leung, et al.
Published: (2016)
Similar Items
-
Indexing-First-One Hashing based Cancellable Iris Template Generation
by: Lai, Yen Lung
Published: (2017) -
Improved fuzzy hashing technique for biometric template protection
by: Ong, T. S., et al.
Published: (2014) -
Winner takes all: the challenges and opportunities in the study tour industry in China after the epidemic
by: Longyue, Cheng, et al.
Published: (2024) -
Volvo takes student winners abroad
by: New Sunday Times,
Published: (2014) -
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)