Perceptual Hash Secure Speech Authentication System Based on an Improved Chained DES in the Cloud Environment

被引:0
|
作者
Huang, Yi-Bo [1 ]
Pu, Xiang-Rong [1 ]
Zhang, Qiu-Yu [2 ]
机构
[1] College of Physics and Electronic Engineering, Northwest Normal University, Anning District,Lan Zhou, China
[2] School of Computer and Communication, Lanzhou University of Technology, Qilihe District,Lan Zhou, China
基金
中国国家自然科学基金;
关键词
723 Computer Software; Data Handling and Applications - 723.5 Computer Applications - 751.5 Speech;
D O I
10.6633/IJNS.202209_24(5).16
中图分类号
学科分类号
摘要
24
引用
收藏
页码:933 / 946
相关论文
共 50 条
  • [21] Image authentication based on perceptual hash using Gabor filters
    Lina Wang
    Xiaqiu Jiang
    Shiguo Lian
    Donghui Hu
    Dengpan Ye
    Soft Computing, 2011, 15 : 493 - 504
  • [22] Image alignment based perceptual image hash for content authentication
    Wang, Xiaofeng
    Zhou, Xiaorui
    Zhang, Qian
    Xu, Bingchao
    Xue, Jianru
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 80
  • [23] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [24] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [25] ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment
    Qingfeng Cheng
    Xinglong Zhang
    Jianfeng Ma
    Journal of Medical Systems, 2017, 41
  • [26] ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment
    Cheng, Qingfeng
    Zhang, Xinglong
    Ma, Jianfeng
    JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (03)
  • [27] Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
    Ramachandran, A.
    Ramadevi, P.
    Alkhayyat, Ahmed
    Yousif, Yousif Kerrar
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (02): : 2055 - 2070
  • [28] Dynamic and Secure Authentication Using IKC for Distributed Cloud Environment
    Kumar, M. Ranjeeth
    Srinivasu, N.
    Reddy, Lokanatha C.
    INFORMATION AND DECISION SCIENCES, 2018, 701 : 107 - 117
  • [29] A Visual Model-Based Perceptual Image Hash for Content Authentication
    Wang, Xiaofeng
    Pang, Kemu
    Zhou, Xiaorui
    Zhou, Yang
    Li, Lu
    Xue, Jianru
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1336 - 1349
  • [30] A perceptual hash based blind-watermarking scheme for image authentication
    Roy, Moumita
    Thounaojam, Dalton Meitei
    Pal, Shyamosree
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 227