VoiceRelay: Voice key operation using Visual Basic
نویسندگان
چکیده
منابع مشابه
Basic Visual Cryptography Using Braille
As a significant part of information security, Visual Cryptography (VC) is a secret sharing approach which has the advantage of effectively obscuring hints of original secret. In VC, a secret image is separated into partitions which are also known as VC shares. The secret is only able to be revealed by superimposing certain shares. Since Basic VC is in a structure which is similar to that of Br...
متن کاملEnhanced visual authoring using operation history
Graphical editors have introduced great flexibility to the designer’s workflow, providing powerful digital tools and enabling the creation of complex and compelling designs. This thesis presents methods for improving these interactions by leveraging operation history. Much instrumentation and activity logging in software has been for the purpose of debugging, that is, for the benefit of the pro...
متن کاملCost Appraisal of Municipal Solid Waste Transfer to Disposal Site Using Visual Basic Program
Collection of Municipal Solid Waste (MSW) accounts for a significant proportion of most municipal budgets, and has drawn some degree of researchers‟ interest. This study was conducted in Ota, Southwest Nigeria, to explore the use of Visual basic program as an innovative tool to select the most economic haulage system among three systems found in literature (conventional-, modified- and Stationa...
متن کاملCost Appraisal of Municipal Solid Waste Transfer to Disposal Site Using Visual Basic Program
Collection of Municipal Solid Waste (MSW) accounts for a significant proportion of most municipal budgets, and has drawn some degree of researchers‟ interest. This study was conducted in Ota, Southwest Nigeria, to explore the use of Visual basic program as an innovative tool to select the most economic haulage system among three systems found in literature (conventional-, modified- and Stationa...
متن کاملCryptographic Key Generation from Voice
We propose a technique to reliably generate a cryptographic key from a user’s voice while speaking a password. The key resists cryptanalysis even against an attacker who captures all system information related to generating or verifying the cryptographic key. Moreover, the technique is sufficiently robust to enable the user to reliably regenerate the key by uttering her password again. We descr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Behavior Research Methods, Instruments, & Computers
سال: 2004
ISSN: 0743-3808,1532-5970
DOI: 10.3758/bf03206557