References
[1]. Pejman Mowalaee, Rahim saeidi, madsagrasboll,
(2012). “A joint approach for single-channel speaker
identification and speech separation”, IEEE Transactions
on Audio, Speech and Language Processing, Vol. 20, No.
9, pp. 2586-2601.
[2]. Jain, A.K., Ross, A., Prabhakar, S., (2004).
“An
introduction to biometric recognition”, IEEE Transactions
on Circuits and Systems for Video Technology Vol. 14, pp.
4–20.
[3]. Pawlewski, M., Jones, J., (2006). ”Speaker
Verification
Part 1”. Biometric Technology Today Vol. 14, No. 6, pp.
9–11.
[4]. Reddy, E., Babu, I, (2008). ” Performance of
Iris Based
Hard Fuzzy Vault. IJCSNS International Journal of
Computer Science and Network Security Vol. 8, No. 1, pp.
297–304.
[5]. Imran Naseem, Ajmal Mian, (2008). “User
Verification
by Combining Speech and Face Biometrics in Video”,
Advantages in Visual Computing, Vol. 5359, pp. 482-492.
[6]. Svetlana Segarceanu, Tiberius Zaharia, David Coffin
and Bradley Morin (2013). “Speaker Verification using
Dynamic Time Wrapping”, U.P.B. Sci.Bul., Series C, Vol. 75,
No. 1, pp. 179-194 .
[7]. Jim Owens and Jeanna Matthews, (2008). ”A Study
of
Passwords and Methods Used in Brute-Force SSH Attacks",
in USENIX Workshop on Large-Scale Exploits and
Emergent Threats (LEFT).
[8]. MudassarRaza, Muhammad Iqbal, Muhammad Sharif and
WaqasHaider, (2012). ”A Survey of Password
Attacks and Comparative Analysis on Methods for Secure
Authentication” World Applied Sciences Journal Vol. 19,
No. 4, pp. 439-444.
[9]. Divyajyoti, Jalandhar RamanKumar, (2014).
“Security
Analysis and Performance Evaluation of an Enhanced
Two-Factor Authenticated Scheme”, International
Journal of Computer Applications, Vol. 101, No. 8, pp.
218-222.
[10]. Roger Elrod, “Two-factor
Authentication”, East
Carolina University, 2005, July.
http://www.123seminarsonly.com/Seminar- Reports
/003/39183330-Two-Factor-Authentication.pdf.
[11]. Seddik, H.; Rahmouni, A.; Samadhi, M.; (2004).
“Text
independent speaker recognition using the Mel
frequency cepstral coefficients and a neural network
classifier” First International Symposium on Control,
Communications and Signal Processing, Proceedings of
IEEE, pp. 631 – 634.
[12]. Pradeep. Ch, (2007). ”Text Dependent Speaker
Recognition Using MFCC and LBG VQ”, Master thesis,
Department of Electronics & Communication
Engineering, National Institute of Technology, Rourkela, 17
p.
[13]. VibhaTiwari, (2010). “MFCC and its
applications in
speaker recognition”, International Journal on Emerging
Technologies Vol. 1, No. 1, pp. 19-22.
[14]. A. Srinivasan (2012). “Speaker Identification
and
Verification using Vector Quantization and Mel frequency
Cepstral Coefficients”, Research Journal of Applied
Sciences, Engineering and Technology Vol. 4, No. 1, pp.
33-40.
[15]. Andrew Teoh Ben, David Ngo ChekLng, AlwynGoh,
(2004). “Biohashing: two factor authentication featuring
fingerprint data and tokenized random number”, Journal
of Pattern Recognition, Vol. 37, No. 11, pp. 2245-2255.
[16]. Kong Adams, King-Hong Cheung, David Zhang,
Mohamed Kamel, Jane Joe, (2006). “ An analysis of
BioHashing and its variants”, Vol. 39, No. 7, pp. 1359-1368.
[17]. Jassim, S.,Al-Assam, H.,Sellahewa, H., (2009).
“Improving performance and security of biometrics using efficient
and stable random projection techniques”,
Proceedings of the 6th international Symposium on Image and Signal
Processing and Analysis, pp. 556- 561.