Speech Authentication and Recovery Scheme in Encrypted Domain.
Qing QianHongxia WangSani M. AbdullahiHuan WangCanghong ShiPublished in: IWDW (2016)
Keyphrases
- authentication scheme
- domain specific
- authentication protocol
- pseudo random number
- speech recognition
- secret image sharing
- security analysis
- encryption decryption
- image authentication
- user authentication
- domain experts
- digital images
- key distribution
- encryption key
- biometric authentication
- wireless local area network
- digital watermarking
- language model
- information hiding scheme