Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,238,775 papers from all fields of science
Search
Sign In
Create Free Account
Secure voice
Known as:
Ciphony
, Voice privacy
, Voice encryption
Expand
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
ANDVT
Crypto phone
Cryptography
Cryptoperiod
Expand
Broader (1)
Secure communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Selective image encryption based on pixels of interest and singular value decomposition
G. Bhatnagar
,
Q. M. J. Wu
Digit. Signal Process.
2012
Corpus ID: 45991223
Highly Cited
2012
Highly Cited
2012
A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case
Zhizheng Wu
,
T. Kinnunen
,
Chng Eng Siong
,
Haizhou Li
,
E. Ambikairajah
Proceedings of The Asia Pacific Signal and…
2012
Corpus ID: 14301187
Voice conversion technique, which modifies one speaker's (source) voice to sound like another speaker (target), presents a threat…
Expand
Highly Cited
2012
Highly Cited
2012
UC-Secure Searchable Symmetric Encryption
K. Kurosawa
,
Yasuhiro Ohtaki
Financial Cryptography
2012
Corpus ID: 18375737
For searchable symmetric encryption schemes (or symmetric-key encryption with keyword search), the security against passive…
Expand
2010
2010
Secure speech template protection in speaker verification system
A. Teoh
,
L. Chong
Speech Communication
2010
Corpus ID: 205222510
2009
2009
All powerful voice? The need to include “exit”, “loyalty” and “neglect” in empirical studies too
Matthew M. C. Allen
,
Heinz-Josef Tüselmann
2009
Corpus ID: 53332058
Purpose – The purpose of this paper is to set out and justify a broader, systemic typology that encompasses, and is built around…
Expand
Highly Cited
2003
Highly Cited
2003
Voice signatures
Izhak Shafran
,
Michael Riley
,
Mehryar Mohri
IEEE Workshop on Automatic Speech Recognition and…
2003
Corpus ID: 15815244
Most current spoken-dialog systems only extract sequences of words from a speaker's voice. This largely ignores other useful…
Expand
Review
2003
Review
2003
Speech coding for mobile ad hoc networks
Hui Dong
,
I. D. Chakares
,
+4 authors
J. Gibson
The Thrity-Seventh Asilomar Conference on Signals…
2003
Corpus ID: 793133
Achieving effective real-time voice communication over an ad hoc network of mobile wireless nodes is an important new challenge…
Expand
Highly Cited
2002
Highly Cited
2002
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC
A. Joux
,
G. Martinet
,
F. Valette
Annual International Cryptology Conference
2002
Corpus ID: 2333383
In this paper, we show that the natural and most common way of implementing modes of operation for cryptographic primitives often…
Expand
1994
1994
Fortifying key negotiation schemes with poorly chosen passwords
Ross J. Anderson
,
T. Lomas
1994
Corpus ID: 2854719
Key exchange schemes such as Diffie Hellman are vulnerable to middleperson attacks, and thus are often augmented by means of…
Expand
Highly Cited
1977
Highly Cited
1977
Issues in transnet packetized voice communication
D. Cohen
Conference on Applications, Technologies…
1977
Corpus ID: 15390217
In recent years, very important progress was made in both real-time digital computer communication and real-time digital voice…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE