Y Huang, T Chen, X Pu, Q Zhang - Journal of Physics …, 2021 - iopscience.iop.org
In order to solve hashing sequences leakage in the existing speech authentication algorithms, this paper proposed a speech biohashing authentication based on power …
Y Huang, H Hou, Y Wang, Y Zhang, M Fan - IEEE Access, 2020 - ieeexplore.ieee.org
Most speech authentication algorithms are over-optimized for robustness and efficiency, resulting in poor discrimination. Hashing shorter sequence is likely to cause the same …
Y Huang, TF Chen, SH Yan, Q Zhang - Multimedia Tools and Applications, 2022 - Springer
The current speech content authentication process directly constructs the extracted biometrics into a binary hashing sequence and stores them in the cloud for hashing …
Y Huang, T Chen, Q Zhang, Y Zhang, S Yan - Multimedia Tools and …, 2022 - Springer
The existing speech authentication algorithms use plaintext speech for hashing structure, and save the generated hashing sequence in the cloud, which is easy to cause hashing …
T Chen, Y Huang, X Pu, S Yan, Q Zhang - Multimedia Tools and …, 2023 - Springer
Most of the existing Biohashing authentication algorithms extract perception feature from the original domain and store the generated hashing sequence in the cloud, which can easily …
Z Bai, D Hatzinakos - … on Control Automation Robotics & Vision, 2010 - ieeexplore.ieee.org
Biometric hash finds extensive applications in multimedia security systems. Biometric hashing schemes combine biometric features with random numbers for robust and secure …
Y Huang, Y Wang - 2019 IEEE International Conference on …, 2019 - ieeexplore.ieee.org
Aiming at the problems of single speech format, no universal algorithm, low efficiency, low accuracy of tamper detection and location in small-scale of existing speech content …
To solve the problem of real-time authenticating in traditional speech authentication algorithms, an efficient speech content authentication algorithm of perceptual hashing is …
Y Huang, Y Wang, Q Zhang, W Zhang… - Multimedia Tools and …, 2020 - Springer
In order to solve the security problem of speech perception hash authentication, the application scope of speech authentication algorithm, and improve the robustness …