Voice should be used for identification first. It may be used as one form of evidence in a system of strong authentication (at least two kinds of evidence, at least one of which is resistant to replay). Note that it is vulnerable to replay. It may be vulnerable to counterfeiting that would fool a human being. Depending upon the implementation, it may be less likely to fool a computer.
Voice should be used for identification first. It may be used as one form of evidence in a system of strong authentication (at least two kinds of evidence, at least one of which is resistant to replay). Note that it is vulnerable to replay. It may be vulnerable to counterfeiting that would fool a human being. Depending upon the implementation, it may be less likely to fool a computer.