Secure voice

Known as: Ciphony, Voice privacy, Voice encryption 
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Motivated by recent developments in fully homomorphic encryption, we consider the folklore conjecture that every semantically… (More)
Is this relevant?
2012
2012
As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
The purpose of this project is to integrate the technologies of wireless sensor networks and public communication networks to… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Advanced video coding is recently announced and widely used, although the according protection means have not been developed… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2005
2005
In this paper, a chaos-based secure voice communication system is designed over user datagram protocol (UDP). The voice signal is… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2005
2005
GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not… (More)
  • figure 2
  • figure 1
  • figure 4
  • figure 3
  • table 1
Is this relevant?
2004
2004
In this paper, a secure voice communication system based on TMS320VC5410 is proposed, which includes the hardware design and the… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Most current spoken-dialog systems only extract sequences of words from a speaker’s voice. This largely ignores other useful… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 3
Is this relevant?
Highly Cited
1993
Highly Cited
1993
A well-known fact in the theory of secret sharing schemes is that shares must be of length at least as the secret itself. However… (More)
Is this relevant?