Skip to main content

Showing 1–1 of 1 results for author: Johnson, R C

Searching in archive cs. Search in all archives.
.
  1. Secure voice based authentication for mobile devices: Vaulted Voice Verification

    Authors: R. C. Johnson, Walter J. Scheirer, Terrance E. Boult

    Abstract: As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phon… ▽ More

    Submitted 30 November, 2012; originally announced December 2012.