Y Huang, H Hou, T Chen, H Li, Q Zhang - Multimedia Tools and …, 2022 - Springer
The existing speech authentication algorithms hash extracted speech features directly and
saved them to the cloud, which is easy to cause speech feature leakage. In the process of …