Sciweavers

6 search results - page 2 / 2
» Speaker Recognition in Encrypted Voice Streams
Sort
View
CSE
2009
IEEE
13 years 11 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...