2022
DOI: 10.1007/s11042-022-12560-5
|View full text |Cite
|
Sign up to set email alerts
|

A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Wang et al 34 used discrete wavelet transform (DWT) for hash feature extraction and finally for covert channel detection. Zhang et al 35 proposed an algorithm for encrypted speech retrieval uses DWT and principal component analysis (PCA) for feature extraction. Maamar et al 36 used the DCT and discrete sine transform (DST) of the differential block luminance mean (DBLM) features to compute the hash sequence for replay attack detection (RAD).…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al 34 used discrete wavelet transform (DWT) for hash feature extraction and finally for covert channel detection. Zhang et al 35 proposed an algorithm for encrypted speech retrieval uses DWT and principal component analysis (PCA) for feature extraction. Maamar et al 36 used the DCT and discrete sine transform (DST) of the differential block luminance mean (DBLM) features to compute the hash sequence for replay attack detection (RAD).…”
Section: Related Workmentioning
confidence: 99%
“…In order to obtain more results in the direction of encrypted speech retrieval, Li et al [23] proposed an improved segmented matching method to solve the problem that dynamic time warping (DTW) cannot be used for long speech signal retrieval, but the retrieval accuracy will be affected by inaccurate truncation. Zhang et al [24] proposed an encrypted speech retrieval method based on the cepstrum coefficient and perceptual hash, which uses discrete wavelet transform and first-order difference coefficient to extract features, improving the retrieval accuracy but with high complexity. Li et al [25] proposed a low-dimensional audio fingerprint extraction method based on local linear embedding and an efficient hierarchical retrieval method, which uses the hash value of a single-frame audio fingerprint to construct a hash table, which reduces the retrieval complexity, but the algorithm is less robust.…”
Section: Related Workmentioning
confidence: 99%
“…Existing encrypted speech retrieval schemes utilize various easily distinguishable speech features [22], such as perceptual hashing, biological hashing, deep hashing, audio fingerprints, etc. [23][24][25][26][27][28][29][30][31][32], which have relatively stable retrieval efficiency and accuracy. However, speech features' robustness and retrieval accuracy still need to be improved.…”
Section: Introductionmentioning
confidence: 99%