Skip to main content

and
  1. No Access

    Article

    Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion

    Most of the existing Biohashing authentication algorithms extract perception feature from the original domain and store the generated hashing sequence in the cloud, which can easily cause the hashing sequence ...

    Teng-fei Chen, Yi-bo Huang, **ang-rong Pu in Multimedia Tools and Applications (2023)

  2. No Access

    Article

    Speech BioHashing security authentication algorithm based on CNN hyperchaotic map

    The current speech content authentication process directly constructs the extracted biometrics into a binary hashing sequence and stores them in the cloud for hashing matching, so the authentication process is...

    Yi-bo Huang, Yuan-Zhang, Teng-Fei Chen, Shao-Hui Yan in Multimedia Tools and Applications (2022)

  3. No Access

    Article

    Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum

    The existing speech authentication algorithms use plaintext speech for hashing structure, and save the generated hashing sequence in the cloud, which is easy to cause hashing sequence leakage. At the same time...

    Yi-bo Huang, Teng-fei Chen, Qiu-yu Zhang, Yuan Zhang in Multimedia Tools and Applications (2022)