2014
DOI: 10.1007/978-3-662-43886-2_30
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking-Based Perceptual Hashing Search Over Encrypted Speech

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
50
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(51 citation statements)
references
References 13 publications
1
50
0
Order By: Relevance
“…These results indicate that the BER values of the same perceived content were all less than 0.1801 for our algorithm, which is much smaller than the minimum of discrimination. In contrast, the results for the [19,23,24] were much larger, especially with requantization applied in [19,23], amplitude decrease applied in [24], and noise and requantization applied in [19,23]. Thus, the CPOs exerted greater effects on the speech features using the other algorithms.…”
Section: Performance Analysis Of Perceptual Hashingmentioning
confidence: 91%
See 2 more Smart Citations
“…These results indicate that the BER values of the same perceived content were all less than 0.1801 for our algorithm, which is much smaller than the minimum of discrimination. In contrast, the results for the [19,23,24] were much larger, especially with requantization applied in [19,23], amplitude decrease applied in [24], and noise and requantization applied in [19,23]. Thus, the CPOs exerted greater effects on the speech features using the other algorithms.…”
Section: Performance Analysis Of Perceptual Hashingmentioning
confidence: 91%
“…We evaluated the retrieval performance of our proposed method and other algorithms [19,23] in 10,000 speech clips and another algorithms [24] in 5000 speech clips according to the common recall and precision ratios [23].…”
Section: Performance Analysis Of Retrieval Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm can better realize the content integrity authentication of speech and broadband audio signal. Since put forward, this technology has been widely used because of its good performance [3][4][5][6][7], but most of them don't consider the security of the algorithm itself. For example, M. Nouri et al [3] proposed a speech perceptual hashing algorithm based on secret key, so the algorithm has certain security and collision resistance.…”
Section: Introductionmentioning
confidence: 99%
“…This algorithm has high efficiency for authentication, but it has weak robustness. H. Wang et al [5] proposed a speech remote identity authentication algorithm based on perceptual hashing through extracting fingerprint biometric, the fingerprint information that embedded into the algorithm would not affect the normal use of the speech and the experiment results show that it has good collision resistance, good robustness and security for remote authentication. Q.Y.…”
Section: Introductionmentioning
confidence: 99%