Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Digital image copyright protection method based on blockchain and zero trust mechanism

    In order to make the image copyright protection system can resist network attacks, and to solve the problems of unknown copyright owner, difficulty in data integrity verification and unauthorized redistributio...

    Qiu-yu Zhang, Guo-rui Wu, Rui Yang, Jia-yan Chen in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption

    The development of deep learning technology makes speech retrieval and recognition more accurate and efficient. Meanwhile, the privacy leakage problem of speech data is becoming increasingly prominent, but the...

    Qiu-yu Zhang, Yong-wang Wen, Yi-bo Huang, Fang-peng Li in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Verifiable speech retrieval algorithm based on diversity security template and biohashing

    In order to solve the problem of leakage in biometrics, to improve the performance of speech retrieval and the security of single biometric template, this paper proposes a verifiable speech retrieval algorithm...

    Yuan Zhang, Yi-bo Huang, De-huai Chen, Qiu-yu Zhang in Multimedia Tools and Applications (2023)

  4. No Access

    Article

    Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion

    Most of the existing Biohashing authentication algorithms extract perception feature from the original domain and store the generated hashing sequence in the cloud, which can easily cause the hashing sequence ...

    Teng-fei Chen, Yi-bo Huang, **ang-rong Pu in Multimedia Tools and Applications (2023)

  5. No Access

    Article

    Verifiable speech retrieval algorithm based on KNN secure hashing

    With the rapid development of mobile Internet, the dimension of speech data is too high and the space is complex. The existing speech retrieval algorithms can not meet the efficient retrieval efficiency and pr...

    Li An, Yi-bo Huang, Qiu-yu Zhang in Multimedia Tools and Applications (2023)

  6. No Access

    Article

    Speech BioHashing security authentication algorithm based on CNN hyperchaotic map

    The current speech content authentication process directly constructs the extracted biometrics into a binary hashing sequence and stores them in the cloud for hashing matching, so the authentication process is...

    Yi-bo Huang, Yuan-Zhang, Teng-Fei Chen, Shao-Hui Yan in Multimedia Tools and Applications (2022)

  7. No Access

    Article

    Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum

    The existing speech authentication algorithms use plaintext speech for hashing structure, and save the generated hashing sequence in the cloud, which is easy to cause hashing sequence leakage. At the same time...

    Yi-bo Huang, Teng-fei Chen, Qiu-yu Zhang, Yuan Zhang in Multimedia Tools and Applications (2022)

  8. No Access

    Article

    A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing

    In order to improve the impact of noise on the robustness and discrimination of the speech perceptual hashing scheme, improve retrieval efficiency and retrieval accuracy, and protect the privacy of the cloud s...

    Qiu-yu Zhang, Jian Bai, Fu-jiu Xu in Multimedia Tools and Applications (2022)

  9. No Access

    Article

    Encrypted speech retrieval based on long sequence Biohashing

    This paper proposes a Encrypted speech retrieval based on long sequence Biohashing to solve the problem of plaintext data leakage in the existing speech retrieval system, and improve the efficiency and accurac...

    Yi-bo Huang, Yong Wang, Hao Li, Yuan Zhang in Multimedia Tools and Applications (2022)

  10. No Access

    Article

    Content-based encrypted speech retrieval scheme with deep hashing

    In order to improve the limitations of manual features and poor feature semantics in the feature extraction process of existing content-based encrypted speech retrieval methods, and as well as improve retrieva...

    Qiu-yu Zhang, Xue-jiao Zhao, Qi-wen Zhang, Yu-zhou Li in Multimedia Tools and Applications (2022)

  11. No Access

    Article

    Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values

    The existing speech authentication algorithms hash extracted speech features directly and saved them to the cloud, which is easy to cause speech feature leakage. In the process of constructing hashing, the uti...

    Yi-bo Huang, Hexiang Hou, Tengfei Chen, Hao Li in Multimedia Tools and Applications (2022)

  12. No Access

    Article

    A high security BioHashing encrypted speech retrieval algorithm based on feature fusion

    In order to solve the problem of plaintext data leakage, and to improve the diversity and security of biometric template, this paper proposes a high security BioHashing encrypted speech retrieval algorithm bas...

    Yi-bo Huang, Hao Li, Yong Wang, Yi-rong **e in Multimedia Tools and Applications (2021)

  13. No Access

    Article

    An encrypted speech authentication and tampering recovery method based on perceptual hashing

    With the progress of speech retrieval technology in the cloud, it brings a lot of conveniences for speech user. Yet, the inquiry encrypted speech results from the speech retrieval system are faced with some se...

    Qiu-yu Zhang, Deng-hai Zhang, Fu-jiu Xu in Multimedia Tools and Applications (2021)

  14. No Access

    Article

    Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion

    In order to solve the problems of poor security and small application scope of speech content authentication, and to improve the robustness, discrimination and real-time performance of speech authentication, a...

    Yong Wang, Yi-bo Huang, Ran Zhang, Qiu-yu Zhang in Multimedia Tools and Applications (2021)

  15. No Access

    Article

    A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing

    In this paper, we propose a retrieval algorithm for encrypted speech based on the convolution neural network (CNN) and deep hashing. It is used to overcome the feature extraction defects of the existing conten...

    Qiu-yu Zhang, Yu-zhou Li, Ying-jie Hu in Multimedia Tools and Applications (2021)

  16. No Access

    Article

    An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction

    In this paper, an efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction is proposed. The proposed approach improves the impact of noise on the robustness and di...

    Qiu-yu Zhang, Gai-li Li, Yi-bo Huang in Multimedia Tools and Applications (2020)

  17. No Access

    Article

    Multi-format speech BioHashing based on spectrogram

    In order to solve the security problem of speech perception hash authentication, the application scope of speech authentication algorithm, and improve the robustness, discrimination and real-time authenticatio...

    Yi-bo Huang, Yong Wang, Qiu-yu Zhang, Wei-zhao Zhang in Multimedia Tools and Applications (2020)

  18. No Access

    Article

    An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction

    In order to satisfy the requirements of retrieval time-efficiency and security for encrypted speech data retrieval in the cloud environment, and to improve the impact of noise on the robustness and discriminat...

    Qiu-yu Zhang, Zi-xian Ge, Ying-jie Hu, Jian Bai in Multimedia Tools and Applications (2020)

  19. No Access

    Article

    A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing

    In order to achieve extraction perceptual features from the encryption speech as a search digest for the content-based encryption speech retrieval, we present a retrieval algorithm of encrypted speech based on...

    Qiu-yu Zhang, Liang Zhou, Tao Zhang, Deng-hai Zhang in Multimedia Tools and Applications (2019)

  20. No Access

    Article

    A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix

    Aiming at the problems of existing speech authentication algorithms, such as poor robustness and discrimination, security vulnerability, low efficiency, poor ability of tamper detection and localization, a hig...

    Qiu-yu Zhang, Si-bin Qiao, Yi-bo Huang, Tao Zhang in Multimedia Tools and Applications (2018)

previous disabled Page of 2