2019
DOI: 10.1007/s11042-019-08450-y
|View full text |Cite
|
Sign up to set email alerts
|

An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…Compared with the [25], the proposed method adopts the "two-stage" classification retrieval strategy, which improves the efficiency of hash matching to a certain extent. Compared with the [3], the retrieval efficiency of the proposed method is slightly lower than that of the [3], this is because the [3] first classifies the speech data, and then compresses the generated hash sequence through the stroke length compression technology, thereby shortening the matching time, however, the final perceptual hash sequence generation process is more complicated than the deep hashing construction process in this paper, and its test speech length is shorter than this paper. Therefore, the CNN/CRNN coding model proposed in this paper has better retrieval efficiency and fully meets the retrieval requirements of the encrypted speech retrieval system.…”
Section: E System Retrieval Efficiency Analysismentioning
confidence: 85%
See 4 more Smart Citations
“…Compared with the [25], the proposed method adopts the "two-stage" classification retrieval strategy, which improves the efficiency of hash matching to a certain extent. Compared with the [3], the retrieval efficiency of the proposed method is slightly lower than that of the [3], this is because the [3] first classifies the speech data, and then compresses the generated hash sequence through the stroke length compression technology, thereby shortening the matching time, however, the final perceptual hash sequence generation process is more complicated than the deep hashing construction process in this paper, and its test speech length is shorter than this paper. Therefore, the CNN/CRNN coding model proposed in this paper has better retrieval efficiency and fully meets the retrieval requirements of the encrypted speech retrieval system.…”
Section: E System Retrieval Efficiency Analysismentioning
confidence: 85%
“…For example, He et al [2] proposed a retrieval algorithm based on syllable-level perceptual hashing, which uses the posterior probability feature of speech segment model to generate perceptual hash sequence, and realizes the spoken retrieval based on encrypted speech. Zhang et al [3] proposed an encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction, through Chirp-Z transform and sparse matrix to extract the perceptual hash digest, and encrypt the speech file according to the m sequence, which has good retrieval performance for noisy speech. Zhao et al [4] proposed an encrypted speech retrieval method based on perceptual hashing, which uses multifractal features and piecewise aggregation approximation to generate perceptual hash sequences, which has good discriminability and robustness.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations