2019
DOI: 10.1007/s11042-019-7180-9
|View full text |Cite
|
Sign up to set email alerts
|

A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
45
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 22 publications
(46 citation statements)
references
References 31 publications
1
45
0
Order By: Relevance
“…As can be seen from Table 4, the FAR of Log-Mel Spectrogram/MFCC are lower than the methods [3,5,6,7] under different thresholds. Therefore, the method in this paper has strong anti-collision performance and discrimination, which can meet the needs of retrieval.…”
Section: B Performance Comparison With Existing Perceptual Hashing Mmentioning
confidence: 91%
See 4 more Smart Citations
“…As can be seen from Table 4, the FAR of Log-Mel Spectrogram/MFCC are lower than the methods [3,5,6,7] under different thresholds. Therefore, the method in this paper has strong anti-collision performance and discrimination, which can meet the needs of retrieval.…”
Section: B Performance Comparison With Existing Perceptual Hashing Mmentioning
confidence: 91%
“…At present, the existing content-based encrypted speech retrieval algorithm [3,4,5,6,7] are all realized by constructing speech perceptual hashing. For example, Wang et al [3] proposed an encrypted speech perceptual hashing retrieval algorithm based on a zero-crossing rate and used Chua's chaotic system to encrypt speech.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations