2021
DOI: 10.17485/ijst/v14i42.1316
|View full text |Cite
|
Sign up to set email alerts
|

System for Fusion of Face and Speech Modalities Using DTCWT+QFT and MFCC+RASTA Techniques

Abstract: Objectives:The main objective is to propose a multimodal biometric system by forming a fusion of Face and Speech modalities using DTCWT+QFT techniques for face and MFCC+RASTA Techniques for Speech recognitions. The experimental results are compared with existing works and analysed the performance with counterparts. Methods: The proposed model, make use of DTCWT and QFT techniques to extract the features of face images and perform fusion of both. The MFCC and RASTA techniques are implemented to extract features… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…[17][18] The work at [19] proposed to add a period cut-off to the client's attribute, every attribute authority can powerfully erase any client from its space, and the individuals who are repudiated can't get to resulting re-evaluated information, the particular component is discussed in the next section. Likewise, in [20][21] proposed a attribute disavowal strategy dependent on Ciphertext-Policy ABE, CSP has a specific trust degree, the information owner would convey the CSP execution, however the access program structure tree just upheld the ''AND'', thusly, it can't give a fine grained and adaptable access control strategy.…”
Section: Figure 4 Ciphertext-policy Abe Technique [15]mentioning
confidence: 99%
“…[17][18] The work at [19] proposed to add a period cut-off to the client's attribute, every attribute authority can powerfully erase any client from its space, and the individuals who are repudiated can't get to resulting re-evaluated information, the particular component is discussed in the next section. Likewise, in [20][21] proposed a attribute disavowal strategy dependent on Ciphertext-Policy ABE, CSP has a specific trust degree, the information owner would convey the CSP execution, however the access program structure tree just upheld the ''AND'', thusly, it can't give a fine grained and adaptable access control strategy.…”
Section: Figure 4 Ciphertext-policy Abe Technique [15]mentioning
confidence: 99%