{"title":"使用基于语音的加密技术进行移动VoIP安全语音通信的说话人识别","authors":"S. Ryu, Hyoung‐Gook Kim","doi":"10.1109/WICT.2013.7113116","DOIUrl":null,"url":null,"abstract":"This paper presents a speaker identification using voice-based cryptography for mobile VoIP secure voice communication system. The cryptographic public key is generated from the user's voice and used to encrypt the transferred voice data over IP networks. The voice fingerprint from the received voice data is decrypted for the speaker identification based on Bayesian information criterion and Mahalanobis distance.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Speaker identification using voice-based cryptography for mobile VoIP secure voice communication\",\"authors\":\"S. Ryu, Hyoung‐Gook Kim\",\"doi\":\"10.1109/WICT.2013.7113116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a speaker identification using voice-based cryptography for mobile VoIP secure voice communication system. The cryptographic public key is generated from the user's voice and used to encrypt the transferred voice data over IP networks. The voice fingerprint from the received voice data is decrypted for the speaker identification based on Bayesian information criterion and Mahalanobis distance.\",\"PeriodicalId\":235292,\"journal\":{\"name\":\"2013 Third World Congress on Information and Communication Technologies (WICT 2013)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Third World Congress on Information and Communication Technologies (WICT 2013)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WICT.2013.7113116\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2013.7113116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Speaker identification using voice-based cryptography for mobile VoIP secure voice communication
This paper presents a speaker identification using voice-based cryptography for mobile VoIP secure voice communication system. The cryptographic public key is generated from the user's voice and used to encrypt the transferred voice data over IP networks. The voice fingerprint from the received voice data is decrypted for the speaker identification based on Bayesian information criterion and Mahalanobis distance.