Abstract

We presented a flowchart, of a new approach that relies on the mathematical operations of matrices and to verify and identifies the speaker, this is a new method difficult to detect by attackers, and this is due to the difficulty to determine its base matrix used in the speaker verification and identification process, Although there are many artificial intelligence programs that can imitate voices and generating false conversations, which poses security and hacking problems.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call