Amir Alush, Hayit Greenspan, et al.
ISBI 2009
The article introduces a new type of an authentication technique denoted as memory-memory (M2). A core component of M2 is its ability to collect and populate a voice profile database and use it to perform the verification process. The method relies on a database that includes voice profiles in the form of audio recordings of individuals; the profiles are interconnected based on known relationships between people such that relationships can be used to determine which voice profiles to select to test a person’s knowledge of the identity of the people in the recordings (e.g., their names, their relation to each other). Combining widely known concepts (e.g., humans are superior to computers in processing voices and computers are superior to humans in handling data) expects to significantly enhance existing authentication methods (e.g., passwords, biometrics-based).
Amir Alush, Hayit Greenspan, et al.
ISBI 2009
Lilach Ben Dror, Eilon Barnea, et al.
Arthritis and Rheumatism
Uri Shani, Tomer Kol, et al.
SPIE Medical Imaging 2004
Wilhad Reuter, Allen Lurio
Nuclear Instruments and Methods