VoiceRelay: Voice key operation using Visual Basic

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Basic Visual Cryptography Using Braille

As a significant part of information security, Visual Cryptography (VC) is a secret sharing approach which has the advantage of effectively obscuring hints of original secret. In VC, a secret image is separated into partitions which are also known as VC shares. The secret is only able to be revealed by superimposing certain shares. Since Basic VC is in a structure which is similar to that of Br...

متن کامل

Enhanced visual authoring using operation history

Graphical editors have introduced great flexibility to the designer’s workflow, providing powerful digital tools and enabling the creation of complex and compelling designs. This thesis presents methods for improving these interactions by leveraging operation history. Much instrumentation and activity logging in software has been for the purpose of debugging, that is, for the benefit of the pro...

متن کامل

Cost Appraisal of Municipal Solid Waste Transfer to Disposal Site Using Visual Basic Program

Collection of Municipal Solid Waste (MSW) accounts for a significant proportion of most municipal budgets, and has drawn some degree of researchers‟ interest. This study was conducted in Ota, Southwest Nigeria, to explore the use of Visual basic program as an innovative tool to select the most economic haulage system among three systems found in literature (conventional-, modified- and Stationa...

متن کامل

Cost Appraisal of Municipal Solid Waste Transfer to Disposal Site Using Visual Basic Program

Collection of Municipal Solid Waste (MSW) accounts for a significant proportion of most municipal budgets, and has drawn some degree of researchers‟ interest. This study was conducted in Ota, Southwest Nigeria, to explore the use of Visual basic program as an innovative tool to select the most economic haulage system among three systems found in literature (conventional-, modified- and Stationa...

متن کامل

Cryptographic Key Generation from Voice

We propose a technique to reliably generate a cryptographic key from a user’s voice while speaking a password. The key resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Moreover, the technique is sufficiently robust to enable the user to reliably regenerate the key by uttering her password again. We descr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Behavior Research Methods, Instruments, & Computers

سال: 2004

ISSN: 0743-3808,1532-5970

DOI: 10.3758/bf03206557