{"id":"https://openalex.org/W1963541334","doi":"https://doi.org/10.1109/csc.2011.6138538","title":"Voiceprint-biometric template design and authentication based on cloud computing security","display_name":"Voiceprint-biometric template design and authentication based on cloud computing security","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W1963541334","doi":"https://doi.org/10.1109/csc.2011.6138538","mag":"1963541334"},"language":"en","primary_location":{"id":"doi:10.1109/csc.2011.6138538","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csc.2011.6138538","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Cloud and Service Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021763585","display_name":"Hua-Hong Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua-Hong Zhu","raw_affiliation_strings":["Data Communication Research Department, Guangdong Research Institute of China Telecom Co., Ltd., Guangzhou, China","Data Communication Research Department, Guangdong Research Institute of China Telecom Company Limited, Guangzhou, China","School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Data Communication Research Department, Guangdong Research Institute of China Telecom Co., Ltd., Guangzhou, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]},{"raw_affiliation_string":"Data Communication Research Department, Guangdong Research Institute of China Telecom Company Limited, Guangzhou, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]},{"raw_affiliation_string":"School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102706072","display_name":"Qianhua He","orcid":"https://orcid.org/0000-0002-9079-4566"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian-Hua He","raw_affiliation_strings":["School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021763585","display_name":"Hua-Hong Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua-Hong Zhu","raw_affiliation_strings":["Data Communication Research Department, Guangdong Research Institute of China Telecom Co., Ltd., Guangzhou, China","Data Communication Research Department, Guangdong Research Institute of China Telecom Company Limited, Guangzhou, China","School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Data Communication Research Department, Guangdong Research Institute of China Telecom Co., Ltd., Guangzhou, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]},{"raw_affiliation_string":"Data Communication Research Department, Guangdong Research Institute of China Telecom Company Limited, Guangzhou, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]},{"raw_affiliation_string":"School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101831967","display_name":"Hong Tang","orcid":"https://orcid.org/0000-0003-0526-2571"},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Tang","raw_affiliation_strings":["Data Communication Research Department, Guangdong Research Institute of China Telecom Co., Ltd., Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Data Communication Research Department, Guangdong Research Institute of China Telecom Co., Ltd., Guangzhou, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100564926","display_name":"Weihua Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei-Hua Cao","raw_affiliation_strings":["Data Communication Research Department, Guangdong Research Institute of China Telecom Co., Ltd., Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Data Communication Research Department, Guangdong Research Institute of China Telecom Co., Ltd., Guangzhou, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021763585"],"corresponding_institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335","https://openalex.org/I90610280"],"apc_list":null,"apc_paid":null,"fwci":1.5311,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.81682081,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"11","issue":null,"first_page":"302","last_page":"308"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/codebook","display_name":"Codebook","score":0.8607059717178345},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7900700569152832},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.685139000415802},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6103639006614685},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6026148200035095},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.590289831161499},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5636732578277588},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4403620958328247},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.42803213000297546},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18691486120224},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12925270199775696}],"concepts":[{"id":"https://openalex.org/C127759330","wikidata":"https://www.wikidata.org/wiki/Q637416","display_name":"Codebook","level":2,"score":0.8607059717178345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7900700569152832},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.685139000415802},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6103639006614685},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6026148200035095},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.590289831161499},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5636732578277588},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4403620958328247},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.42803213000297546},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18691486120224},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12925270199775696}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csc.2011.6138538","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csc.2011.6138538","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Cloud and Service Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W150223756","https://openalex.org/W1567158539","https://openalex.org/W1589647164","https://openalex.org/W1590496562","https://openalex.org/W1989935413","https://openalex.org/W2001950264","https://openalex.org/W2034861170","https://openalex.org/W2041942569","https://openalex.org/W2077876046","https://openalex.org/W2106137793","https://openalex.org/W2114024372","https://openalex.org/W2122718825","https://openalex.org/W2125587922","https://openalex.org/W2129347810","https://openalex.org/W2138432060","https://openalex.org/W2151471249","https://openalex.org/W2322883046","https://openalex.org/W3146327362","https://openalex.org/W3148281606"],"related_works":["https://openalex.org/W2293149949","https://openalex.org/W2026099691","https://openalex.org/W4284672201","https://openalex.org/W2377486419","https://openalex.org/W2943202426","https://openalex.org/W2736714427","https://openalex.org/W2950156284","https://openalex.org/W2163679795","https://openalex.org/W1983660090","https://openalex.org/W2123843216"],"abstract_inverted_index":{"To":[0],"improve":[1],"the":[2,39,44,49,59,70,76,82,86,91,100,109,115,125],"security":[3,77,101],"of":[4,35,78,84,117,127],"voiceprint":[5,13,36,41,56,92],"storage":[6],"and":[7,19,66,97],"transmission,":[8],"we":[9],"present":[10],"a":[11],"novel":[12],"protection":[14],"approach":[15],"with":[16],"homomorphic":[17],"encryption":[18],"authentication":[20,110],"scheme":[21],"for":[22],"cloud":[23],"computing":[24],"environment":[25],"in":[26,48,72],"this":[27],"paper.":[28],"System":[29],"supports":[30],"to":[31,58,74,81],"calculate":[32],"distortion":[33],"measurement":[34],"without":[37,68],"disclosing":[38],"raw":[40],"data":[42,57,71],"under":[43],"telebiometric":[45],"functional":[46],"model":[47],"open":[50],"network.":[51],"The":[52,105],"client":[53],"contributes":[54],"encrypted":[55],"system,":[60],"where":[61],"components":[62],"can":[63],"perform":[64],"queries":[65],"matching":[67],"decrypting":[69],"order":[73],"keep":[75],"biometrics.":[79],"According":[80],"analysis":[83],"theory,":[85],"proposal":[87],"is":[88,112,119,122,129,132],"secured":[89],"because":[90],"templates":[93],"are":[94,103],"diverse,":[95],"cancelable":[96],"irreversible":[98],"if":[99],"parameters":[102],"secret.":[104],"experimental":[106],"results":[107],"demonstrated":[108],"performance":[111],"unchanged.":[113],"When":[114],"size":[116,126],"codebook":[118,128],"32,":[120],"FRR":[121,131],"4%,":[123],"while":[124],"64,":[130],"3.2%.":[133],"of.":[134]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
