2004
DOI: 10.1541/ieejeiss.124.1958
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Methods for Voice-Based Person Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…When D>=3 and L>=14, we have a good password. D>=3 means that the password is at least 3 characters different from the base dictionary words, and L>=14 means that there are at least 14 10 possible password candidates to be tried to crack the password.…”
Section: Password Quality Indicatormentioning
confidence: 99%
See 1 more Smart Citation
“…When D>=3 and L>=14, we have a good password. D>=3 means that the password is at least 3 characters different from the base dictionary words, and L>=14 means that there are at least 14 10 possible password candidates to be tried to crack the password.…”
Section: Password Quality Indicatormentioning
confidence: 99%
“…Authentication is responsible for verifying that a person is really who he/she claims, and authorization is about assigning appropriate privileges to the person after the verification of his/her identity. There are 3 types of authentications [10, p 209]: (i) something the user knows, for example, password and PIN (personal identity number), (ii) something the user has, for example, physical keys, access cards, and smart cards etc., and (iii) something the user is -so called biometric authentication, such as voice recognition [14], fingerprints matching, and iris scanning etc. Password authentication is simple, accurate, and effective and will continue to be the working horse of information security.…”
Section: Introductionmentioning
confidence: 99%
“…In the Spot [15] software, the seeded region growing (SRG) algorithm has been employed [16]. SRG method is perhaps the most powerful one with respect to shape identification, but it relies on a seed growing methodology as well as the selection of the initial seeds [17].…”
mentioning
confidence: 99%