The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).
If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.
Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.
BibTex Citation Data :
@article{JOIV1303, author = {Ethar Hachim and Methaq Gaata and Thekra Abbas}, title = {Voice-Authentication Model Based on Deep Learning for Cloud Environment}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {7}, number = {3}, year = {2023}, keywords = {Cloud Computing; Authentication Protocol; Voice Features; Convolution Neural Network; Cryptography.}, abstract = {Cloud computing is becoming an essential technology for many organizations that are dynamically scalable and employ virtualized resources as a service done over the Internet. The security and privacy of the data stored in the cloud is cloud providers' main target. Every person wants to keep his data safe and store it in a secure place. The user considers cloud storage the best option to keep his data confidential without losing it. Authentication in the trusted cloud environment allows making knowledgeable authorization decisions for access to the protected individual's data. Voice authentication, also known as voice biometrics, depends on an individual's unique voice patterns for identification to access personal and sensitive data. The essential principle for voice authentication is that every person's voice differs in tone, pitch, and volume, which is adequate to make it uniquely distinguishable. This paper uses voice metric as an identifier to determine the authorized customers that can access the data in a cloud environment without risk. The Convolution Neural Network (CNN) architecture is proposed for identifying and classifying authorized and unauthorized people based on voice features. In addition, the 3DES algorithm is used to protect the voice features during the transfer between the client and cloud sides. In the testing, the experimental results of the proposed model achieve a high level of accuracy, reaching about 98%, and encryption efficiency metrics prove the proposed model's robustness against intended attacks to obtain the data.}, issn = {2549-9904}, pages = {864--870}, doi = {10.30630/joiv.7.3.1303}, url = {http://joiv.org/index.php/joiv/article/view/1303} }
Refworks Citation Data :
@article{{JOIV}{1303}, author = {Hachim, E., Gaata, M., Abbas, T.}, title = {Voice-Authentication Model Based on Deep Learning for Cloud Environment}, journal = {JOIV : International Journal on Informatics Visualization}, volume = {7}, number = {3}, year = {2023}, doi = {10.30630/joiv.7.3.1303}, url = {} }Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
__________________________________________________________________________
JOIV : International Journal on Informatics Visualization
ISSN 2549-9610 (print) | 2549-9904 (online)
Organized by Society of Visual Informatocs, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
W : http://joiv.org
E : joiv@pnp.ac.id, hidra@pnp.ac.id, rahmat@pnp.ac.id
View JOIV Stats
is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.