The Design of Secure File Transfer with Speech Recognition
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
L.Brown , M. G. Jaatun , “Secure File Transfer Over TCP/IP†, IEEE, International Conference on ''Technology Enabling Tomorrow : Computers, Communications and Automation towards the 21st Centuryâ€, 1992
E.Gudes, “The Design of a Cryptography Based Secure File Systemâ€; September 1980, IEEE Vol. SE-6
S. Rekik, D. Guerchi , S. Selouani3, “Speech steganography using wavelet and Fourier transformsâ€, EURASIP Journal on Audio, Speech, and Music Processing , 2012, p 1-14
T.Nilsson ,“Speech Recognition Software and Vidispineâ€; Master’s Thesis in Computing Science, UmeËša University Department of Computing Science, April 2,2013
A. Srinivasan, "Real time speaker recognition of letter ‘zha’ in Tamil language" , 2013 Fourth International Conference on Computing Communications and Networking Technologies (ICCCNT), 2013
H.Barfuss, C.Huemmer, A.Schwarz, “Robust coherence-based spectral enhancement for speech recognition in adverse real-world environmentsâ€, Computer Speech & Language ,2017, p 1-13
S. Sunny , “Performance of Different Classifiers In Speech Recognitionâ€; IJESE, ISSN: 2319 – 1163, Volume: 2, Issue: 4,2013
R.S.Jamgekar, G.S. Joshi “File Encryption and Decryption Using Secure RSAâ€, (IJESE) ISSN: 2319–6378, Volume-1, Issue-4, February 2013
“Overcoming Key File Transfer Problemsâ€; An Osterman Research White Paper, September 2010
H.N.M.Shah, M.Z.A.Rashid “Biometric Voice Recognition in Security Systemâ€, Indian Journal of Science and Technology, Vol 7(2), 104–112, February 2014
L. D. Terissi , G. D. Sad ,“Noisy Speech Recognition Based on Combined Audio-Visual Classifiers Lecture Notes in Computer Science, vol 8869. Springer, 2014
S. S.Jarandel ,S. Waghmare , A Survey on Different Classifier in Speech Recognition Techniques, International Journal of Emerging Technology and Advanced Engineering, Volume 5, Issue 3, March 2014
V. Mitra, G. Sivaraman, “Hybrid Convolutional neural networks for articulatory and acoustic information based speech recognition †International Journal on Speech Communication, Volume 89, May 2017, Pages 103–112
“Making File Transfer Easier, Compliant and More Secureâ€;An Osterman Research White Paper, February 2012
T.Nilsson ,“Speech Recognition Software and Vidispineâ€; Master’s Thesis in Computing Science, UmeËša University Department of Computing Science, April 2,2013
Z. Jun, S. Kwong, Using Mel-Frequency Cepstral Coefficients in Missing Data Technique, EURASIP Journal on Applied Signal Processing :3, 340–346 ,2004