Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values

Y Huang, H Hou, T Chen, H Li, Q Zhang - Multimedia Tools and …, 2022 - Springer
The existing speech authentication algorithms hash extracted speech features directly and
saved them to the cloud, which is easy to cause speech feature leakage. In the process of …

Speech biohashing authentication based on power spectrum

Y Huang, T Chen, X Pu, Q Zhang - Journal of Physics …, 2021 - iopscience.iop.org
In order to solve hashing sequences leakage in the existing speech authentication
algorithms, this paper proposed a speech biohashing authentication based on power …

A long sequence speech perceptual hashing authentication algorithm based on constant q transform and tensor decomposition

Y Huang, H Hou, Y Wang, Y Zhang, M Fan - IEEE Access, 2020 - ieeexplore.ieee.org
Most speech authentication algorithms are over-optimized for robustness and efficiency,
resulting in poor discrimination. Hashing shorter sequence is likely to cause the same …

Speech BioHashing security authentication algorithm based on CNN hyperchaotic map

Y Huang, TF Chen, SH Yan, Q Zhang - Multimedia Tools and Applications, 2022 - Springer
The current speech content authentication process directly constructs the extracted
biometrics into a binary hashing sequence and stores them in the cloud for hashing …

Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum

Y Huang, T Chen, Q Zhang, Y Zhang, S Yan - Multimedia Tools and …, 2022 - Springer
The existing speech authentication algorithms use plaintext speech for hashing structure,
and save the generated hashing sequence in the cloud, which is easy to cause hashing …

Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion

T Chen, Y Huang, X Pu, S Yan, Q Zhang - Multimedia Tools and …, 2023 - Springer
Most of the existing Biohashing authentication algorithms extract perception feature from the
original domain and store the generated hashing sequence in the cloud, which can easily …

LBP-based biometric hashing scheme for human authentication

Z Bai, D Hatzinakos - … on Control Automation Robotics & Vision, 2010 - ieeexplore.ieee.org
Biometric hash finds extensive applications in multimedia security systems. Biometric
hashing schemes combine biometric features with random numbers for robust and secure …

Multi-format speech perception hashing algorithm based on frequency band variance

Y Huang, Y Wang - 2019 IEEE International Conference on …, 2019 - ieeexplore.ieee.org
Aiming at the problems of single speech format, no universal algorithm, low efficiency, low
accuracy of tamper detection and location in small-scale of existing speech content …

A robust content authentication algorithm of speech based on perceptual hashing

RH Dong, YJ Di, QY Zhang - Sensors & Transducers, 2013 - search.proquest.com
To solve the problem of real-time authenticating in traditional speech authentication
algorithms, an efficient speech content authentication algorithm of perceptual hashing is …

Multi-format speech biohashing based on spectrogram

Y Huang, Y Wang, Q Zhang, W Zhang… - Multimedia Tools and …, 2020 - Springer
In order to solve the security problem of speech perception hash authentication, the
application scope of speech authentication algorithm, and improve the robustness …