Perceptual Hash Secure Speech Authentication System Based on an Improved Chained DES in the Cloud Environment

被引:0
|
作者
Huang, Yi-Bo [1 ]
Pu, Xiang-Rong [1 ]
Zhang, Qiu-Yu [2 ]
机构
[1] College of Physics and Electronic Engineering, Northwest Normal University, Anning District,Lan Zhou, China
[2] School of Computer and Communication, Lanzhou University of Technology, Qilihe District,Lan Zhou, China
基金
中国国家自然科学基金;
关键词
723 Computer Software; Data Handling and Applications - 723.5 Computer Applications - 751.5 Speech;
D O I
10.6633/IJNS.202209_24(5).16
中图分类号
学科分类号
摘要
24
引用
收藏
页码:933 / 946
相关论文
共 50 条
  • [41] A pervasive electroencephalography-based person authentication system for cloud environment
    Kumar, Pradeep
    Singhal, Ashish
    Saini, Rajkumar
    Roy, Partha Pratim
    Dogra, Debi Prosad
    DISPLAYS, 2018, 55 : 64 - 70
  • [42] Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery
    Xu, Dingjie
    Ren, Na
    Zhu, Changqing
    REMOTE SENSING, 2023, 15 (19)
  • [43] Secure Biometric-Based Authentication for Cloud Computing
    Wong, Kok-Seng
    Kim, Myung Ho
    CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2012, 2013, 367 : 86 - 101
  • [44] Secure Key Management Based Mobile Authentication in Cloud
    Priya, S. Shanmuga
    Yuvaraj, D.
    Murthy, T. Satyanarayana
    Chooralil, Varghese S.
    Krishnan, S. Navaneetha
    Banumathy, P.
    SundaraVadivel, P.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 887 - 896
  • [45] A secure authentication scheme of health care based on the cloud
    Chen, Chin-Ling
    Yang, Tsai-Tung
    Leu, Fang-Yie
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 499 - 504
  • [46] A secure framework for enhancing user authentication in cloud environment using Biometrics
    Kathrine, G. Jaspher Willsie
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 283 - 287
  • [47] A Secure Multi-Tier Authentication Scheme in Cloud Computing Environment
    Singh, Ashish
    Chatterjee, Kakali
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [48] Mobile user authentication system in cloud environment
    Yeh, Her-Tyan
    Chen, Bing-Chang
    Wu, Yi-Cong
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1161 - 1168
  • [49] ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications
    Maitra, Tanmoy
    Obaidat, Mohammad S.
    Giri, Debasis
    Dutta, Subrata
    Dahal, Keshav
    IET NETWORKS, 2019, 8 (05) : 289 - 298
  • [50] Secure fingerprint authentication system on an untrusted computing environment
    Chung, Y
    Moon, D
    Kim, T
    Pan, S
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 299 - 310