![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
RuCo alloy nanoparticles embedded within N-doped porous two-dimensional carbon nanosheets: a high-performance hydrogen evolution reaction catalyst
Develo** cost-effective electrocatalysts with high activity and stability especially at high current density is of great significance for the large-scale commercial application of electrochemical water split...
-
Article
Digital image copyright protection method based on blockchain and zero trust mechanism
In order to make the image copyright protection system can resist network attacks, and to solve the problems of unknown copyright owner, difficulty in data integrity verification and unauthorized redistributio...
-
Article
Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption
The development of deep learning technology makes speech retrieval and recognition more accurate and efficient. Meanwhile, the privacy leakage problem of speech data is becoming increasingly prominent, but the...
-
Article
Verifiable speech retrieval algorithm based on diversity security template and biohashing
In order to solve the problem of leakage in biometrics, to improve the performance of speech retrieval and the security of single biometric template, this paper proposes a verifiable speech retrieval algorithm...
-
Article
Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion
Most of the existing Biohashing authentication algorithms extract perception feature from the original domain and store the generated hashing sequence in the cloud, which can easily cause the hashing sequence ...
-
Article
Verifiable speech retrieval algorithm based on KNN secure hashing
With the rapid development of mobile Internet, the dimension of speech data is too high and the space is complex. The existing speech retrieval algorithms can not meet the efficient retrieval efficiency and pr...
-
Article
Encrypted speech authentication and recovery scheme based on fragile watermarking
In order to solve the problems that most of the existing speech authentication algorithms can only realize tamper localization of frames, and need to the additional recovery information during tamper recovery,...
-
Article
Product typicality attribute mining method based on a topic clustering ensemble
Despite the extensive application of topic models in natural language processing tasks in recent years, the Chinese texts of short comments characterised by large scale, high noise and small information points...
-
Article
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
The current speech content authentication process directly constructs the extracted biometrics into a binary hashing sequence and stores them in the cloud for hashing matching, so the authentication process is...
-
Article
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
The existing speech authentication algorithms use plaintext speech for hashing structure, and save the generated hashing sequence in the cloud, which is easy to cause hashing sequence leakage. At the same time...
-
Article
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
In order to improve the impact of noise on the robustness and discrimination of the speech perceptual hashing scheme, improve retrieval efficiency and retrieval accuracy, and protect the privacy of the cloud s...
-
Article
Encrypted speech retrieval based on long sequence Biohashing
This paper proposes a Encrypted speech retrieval based on long sequence Biohashing to solve the problem of plaintext data leakage in the existing speech retrieval system, and improve the efficiency and accurac...
-
Article
Insight into the Excellent Tribological Performance of Highly Oriented Poly(phenylene sulfide)
Achieving low friction and wear of poly(phenylene sulfide) (PPS) without using fillers or blending is a challenging task, but one of considerable practical importance. Here we describe how neat PPS with high t...
-
Article
Content-based encrypted speech retrieval scheme with deep hashing
In order to improve the limitations of manual features and poor feature semantics in the feature extraction process of existing content-based encrypted speech retrieval methods, and as well as improve retrieva...
-
Article
Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values
The existing speech authentication algorithms hash extracted speech features directly and saved them to the cloud, which is easy to cause speech feature leakage. In the process of constructing hashing, the uti...
-
Article
A high security BioHashing encrypted speech retrieval algorithm based on feature fusion
In order to solve the problem of plaintext data leakage, and to improve the diversity and security of biometric template, this paper proposes a high security BioHashing encrypted speech retrieval algorithm bas...
-
Article
An encrypted speech authentication and tampering recovery method based on perceptual hashing
With the progress of speech retrieval technology in the cloud, it brings a lot of conveniences for speech user. Yet, the inquiry encrypted speech results from the speech retrieval system are faced with some se...
-
Article
Synthesis of hollow spherical nickel oxide and its gas-sensing properties
Semiconductor metal oxides have attracted wide attention in the area of gas sensor due to that they have unique advantages in the rapid and accurate detection of harmful gases. A simple strategy is to synthesi...
-
Article
Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion
In order to solve the problems of poor security and small application scope of speech content authentication, and to improve the robustness, discrimination and real-time performance of speech authentication, a...
-
Article
A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing
In this paper, we propose a retrieval algorithm for encrypted speech based on the convolution neural network (CNN) and deep hashing. It is used to overcome the feature extraction defects of the existing conten...