MFCC-based perceptual hashing for compressed domain of speech content identification

被引:0
|
作者
Zhang, Qiu-Yu [1 ]
Liu, Yang-Wei [1 ]
Di, Yan-Jun [1 ]
Zhang, Qian-Yun [2 ]
Xing, Peng-Fei [1 ]
机构
[1] School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China
[2] School of Communication and Information Engineering, Shanghai University, Shanghai, China
关键词
13;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:379 / 386
相关论文
共 50 条
  • [31] An encrypted speech authentication and tampering recovery method based on perceptual hashing
    Zhang, Qiu-yu
    Zhang, Deng-hai
    Xu, Fu-jiu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) : 24925 - 24948
  • [32] An encrypted speech authentication and tampering recovery method based on perceptual hashing
    Qiu-yu Zhang
    Deng-hai Zhang
    Fu-jiu Xu
    Multimedia Tools and Applications, 2021, 80 : 24925 - 24948
  • [33] An efficient perceptual hashing based on improved spectral entropy for speech authentication
    Zhang, Qiu-yu
    Hu, Wen-jin
    Huang, Yi-bo
    Qiao, Si-bin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 1555 - 1581
  • [34] Watermarking-Based Perceptual Hashing Search Over Encrypted Speech
    Wang, Hongxia
    Zhou, Linna
    Zhang, Wei
    Liu, Shuang
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 : 423 - 434
  • [35] A Retrieval Algorithm of Encrypted Speech based on Syllable-level Perceptual Hashing
    He, Shaofang
    Zhao, Huan
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (03) : 703 - 718
  • [36] An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition
    School of Computer and Communication, Lanzhou University of Technology, Lanzhou
    Gansu
    730050, China
    J. Inf. Hiding Multimedia Signal Proces., 2 (311-322):
  • [37] Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme
    Zhang Qiu-yu
    Ren Zhan-wei
    Huang Yi-bo
    Yu Shuang
    Hu Wen-jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 229 - 240
  • [38] Perceptual image hashing based on a deep convolution neural network for content authentication
    Jiang, Cuiling
    Pang, Yilin
    JOURNAL OF ELECTRONIC IMAGING, 2018, 27 (04)
  • [39] Image Perceptual Hashing for Content Authentication Based on Geometric Invariant Vector Distance
    Xing, Huifen
    Wang, Shuchao
    Wu, Qilin
    Wang, Honghai
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [40] An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing
    Zhang, Qiuyu
    Zhang, Denghai
    Zhou, Liang
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 28 (05) : 2467 - 2482