-
Article
Digital image copyright protection method based on blockchain and zero trust mechanism
In order to make the image copyright protection system can resist network attacks, and to solve the problems of unknown copyright owner, difficulty in data integrity verification and unauthorized redistributio...
-
Article
Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption
The development of deep learning technology makes speech retrieval and recognition more accurate and efficient. Meanwhile, the privacy leakage problem of speech data is becoming increasingly prominent, but the...
-
Article
Verifiable speech retrieval algorithm based on diversity security template and biohashing
In order to solve the problem of leakage in biometrics, to improve the performance of speech retrieval and the security of single biometric template, this paper proposes a verifiable speech retrieval algorithm...
-
Article
Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion
Most of the existing Biohashing authentication algorithms extract perception feature from the original domain and store the generated hashing sequence in the cloud, which can easily cause the hashing sequence ...
-
Article
Verifiable speech retrieval algorithm based on KNN secure hashing
With the rapid development of mobile Internet, the dimension of speech data is too high and the space is complex. The existing speech retrieval algorithms can not meet the efficient retrieval efficiency and pr...
-
Article
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
The current speech content authentication process directly constructs the extracted biometrics into a binary hashing sequence and stores them in the cloud for hashing matching, so the authentication process is...
-
Article
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
The existing speech authentication algorithms use plaintext speech for hashing structure, and save the generated hashing sequence in the cloud, which is easy to cause hashing sequence leakage. At the same time...
-
Article
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
In order to improve the impact of noise on the robustness and discrimination of the speech perceptual hashing scheme, improve retrieval efficiency and retrieval accuracy, and protect the privacy of the cloud s...
-
Article
Encrypted speech retrieval based on long sequence Biohashing
This paper proposes a Encrypted speech retrieval based on long sequence Biohashing to solve the problem of plaintext data leakage in the existing speech retrieval system, and improve the efficiency and accurac...
-
Article
Content-based encrypted speech retrieval scheme with deep hashing
In order to improve the limitations of manual features and poor feature semantics in the feature extraction process of existing content-based encrypted speech retrieval methods, and as well as improve retrieva...
-
Article
Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values
The existing speech authentication algorithms hash extracted speech features directly and saved them to the cloud, which is easy to cause speech feature leakage. In the process of constructing hashing, the uti...
-
Article
A high security BioHashing encrypted speech retrieval algorithm based on feature fusion
In order to solve the problem of plaintext data leakage, and to improve the diversity and security of biometric template, this paper proposes a high security BioHashing encrypted speech retrieval algorithm bas...
-
Article
An encrypted speech authentication and tampering recovery method based on perceptual hashing
With the progress of speech retrieval technology in the cloud, it brings a lot of conveniences for speech user. Yet, the inquiry encrypted speech results from the speech retrieval system are faced with some se...
-
Article
Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion
In order to solve the problems of poor security and small application scope of speech content authentication, and to improve the robustness, discrimination and real-time performance of speech authentication, a...
-
Article
A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing
In this paper, we propose a retrieval algorithm for encrypted speech based on the convolution neural network (CNN) and deep hashing. It is used to overcome the feature extraction defects of the existing conten...
-
Article
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction
In this paper, an efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction is proposed. The proposed approach improves the impact of noise on the robustness and di...
-
Article
Multi-format speech BioHashing based on spectrogram
In order to solve the security problem of speech perception hash authentication, the application scope of speech authentication algorithm, and improve the robustness, discrimination and real-time authenticatio...
-
Article
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction
In order to satisfy the requirements of retrieval time-efficiency and security for encrypted speech data retrieval in the cloud environment, and to improve the impact of noise on the robustness and discriminat...
-
Article
A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing
In order to achieve extraction perceptual features from the encryption speech as a search digest for the content-based encryption speech retrieval, we present a retrieval algorithm of encrypted speech based on...
-
Article
A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix
Aiming at the problems of existing speech authentication algorithms, such as poor robustness and discrimination, security vulnerability, low efficiency, poor ability of tamper detection and localization, a hig...