{"title":"Speaker identification using voice-based cryptography for mobile VoIP secure voice communication","authors":"S. Ryu, Hyoung‐Gook Kim","doi":"10.1109/WICT.2013.7113116","DOIUrl":null,"url":null,"abstract":"This paper presents a speaker identification using voice-based cryptography for mobile VoIP secure voice communication system. The cryptographic public key is generated from the user's voice and used to encrypt the transferred voice data over IP networks. The voice fingerprint from the received voice data is decrypted for the speaker identification based on Bayesian information criterion and Mahalanobis distance.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2013.7113116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper presents a speaker identification using voice-based cryptography for mobile VoIP secure voice communication system. The cryptographic public key is generated from the user's voice and used to encrypt the transferred voice data over IP networks. The voice fingerprint from the received voice data is decrypted for the speaker identification based on Bayesian information criterion and Mahalanobis distance.