A Design of Security Framework for e-Health Authentication System using QR Code

Author(s):  
Non Thiranant ◽  
◽  
HoonJae Lee ◽  
2015 ◽  
Vol 13 (2) ◽  
pp. 220-229 ◽  
Author(s):  
Yi-Ying Chang ◽  
Sheng-Lei Yan ◽  
Pin-Zhi Lin ◽  
Huai-Bin Zhong ◽  
Jacques Marescaux ◽  
...  

Author(s):  
Ji-Ye Park ◽  
Jung-In Kim ◽  
Min-Su Shin ◽  
Namhi Kang

Author(s):  
Said Elhajji ◽  
Ghizlane Orhanou ◽  
Yacouba Kouraogo

Author(s):  
Yacouba Kouraogo ◽  
Ghizlane Orhanou ◽  
Said Elhajji

2019 ◽  
Vol 8 (4) ◽  
pp. 3078-3084

The guard segment considers security usage as the essential and critical errand to be executed so usage ought to be made with more concern. One of the ideal arrangements is Voice for upgrading the security framework in which the confirmation of clients is performed with the guide of their voice signals. This confirmation has been performed by actualizing Security Voice Authentication System (SVAS) strategy in our past work. Be that as it may, this philosophy isn't a lot of viable on the insider aggressors. The security framework would be separated by the vindictive/narrow-minded clients as they go about as genuine clients by transmitting the voice sign of unique clients. This deficiency can be overwhelmed by presenting a procedure called Two Level Voice Authentication System (TLVAS). This examination includes producing mystery keys at first by methods for arbitrary qualities inputted by the client. It will give security in the two-level procedure which incorporates the respectability of the handling ought to be solid. The sign must be changed over which control the figuring techniques. This strategy is seen as increasingly powerful against the insider assailants by avoiding the Compromisation created by them. Installing procedure used to execute for doing the exhibition investigation and the examination is completed by methods for expanded security level.


Sign in / Sign up

Export Citation Format

Share Document