Abstract
We presented a flowchart, of a new approach that relies on the mathematical operations of matrices and to verify and identifies the speaker, this is a new method difficult to detect by attackers, and this is due to the difficulty to determine its base matrix used in the speaker verification and identification process, Although there are many artificial intelligence programs that can imitate voices and generating false conversations, which poses security and hacking problems.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have