Sökning: "Voice biometrics"
Visar resultat 1 - 5 av 9 uppsatser innehållade orden Voice biometrics.
1. Voice Biometrics Exploring The Boundaries Of Speaker Verification
Master-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : Recent advancements in computational power, datasets and models have resulted in significant performanceincreases across various speech and speaker recognition models. This work investigates the capabilities ofusing voice as a biometric tool, namely what is referred to as speaker verification. LÄS MER
2. Machine Learning for Text-Independent Speaker Verification : How to Teach a Machine to RecognizeHuman Voices
Master-uppsats, KTH/Skolan för elektro- och systemteknik (EES)Sammanfattning : The aim of speaker recognition and veri cation is to identify people's identity from the characteristics of their voices (voice biometrics). Traditionally this technology has been employed mostly for security or authentication purposes, identi cation of employees/customers and criminal investigations. LÄS MER
3. Seamless speaker recognition
Master-uppsats, KTH/Radio Systems Laboratory (RS Lab)Sammanfattning : In a technologically advanced society, the average person manages dozens of accounts for e-mail, social networks, e-banking, and other electronic services. As the number of these accounts increases, the need for automatic user identification becomes more essential. LÄS MER
4. Biometrics Technology : Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare
Master-uppsats, Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationSammanfattning : Context. Biometric technology is a secure and convenient identification method and it does not need to remember complex passwords, nor smart cards, keys, and the like. Biometrics is the measurable characteristics of individuals based on their behavioral patterns or physiological features that can be used to verify or recognize their identity. LÄS MER
5. Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication
Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)Sammanfattning : In order to protect the security of the commercial information, personnel information, military information, governmental information on the Internet, the claimed identity should be authenticated. Now there are three main security authentication methods: first: using user PIN, such as password; second: using physical key, such as USBKey; third: using biological authentication technology, such as fingerprint, iris, voice and palm prints, etc. LÄS MER