2019
DOI: 10.1007/978-981-13-9406-5_60
|View full text |Cite
|
Sign up to set email alerts
|

A Proposed Authentication Approach Based on Voice and Fuzzy Logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Artificial intelligence [1,2] and deep learning [3,4] techniques have contributed to the establishment of many applications. One of these applications is the so-called deepfake, which is a type of manipulation implemented on the video to replace a person's face with another person's face to create a kind of illusion that the target person is the one who made these movements [5].…”
Section: Introductionmentioning
confidence: 99%
“…Artificial intelligence [1,2] and deep learning [3,4] techniques have contributed to the establishment of many applications. One of these applications is the so-called deepfake, which is a type of manipulation implemented on the video to replace a person's face with another person's face to create a kind of illusion that the target person is the one who made these movements [5].…”
Section: Introductionmentioning
confidence: 99%
“…ASR comprises two phases (training and testing). In the training phase, known speech is recorded and stored in a speech database as a parametric representation (Badr and Abdul-Hassan, 2020;Abdul-Hassan and Hadi, 2020). In the testing phase, the ASR system compares the retrieved features to trained reference templates to identify the utterance (Gamit and Dhameliya, 2015).…”
Section: Introductionmentioning
confidence: 99%