{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:53:58Z","timestamp":1725861238147},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319422909"},{"type":"electronic","value":"9783319422916"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42291-6_10","type":"book-chapter","created":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T11:10:22Z","timestamp":1468235422000},"page":"99-111","source":"Crossref","is-referenced-by-count":0,"title":["Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment"],"prefix":"10.1007","author":[{"given":"Qiu-Yu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wen-Jin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yi-Bo","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Si-Bin","family":"Qiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,12]]},"reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s11042-011-0928-5","volume":"67","author":"H Wang","year":"2013","unstructured":"Wang, H., Wang, W., Chen, M., et al.: Quality-driven secure audio transmissions in wireless multimedia sensor networks. Multimed. Tools Appl. 67(1), 119\u2013135 (2013)","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"10_CR2","first-page":"158","volume":"49","author":"Z Wang","year":"2012","unstructured":"Wang, Z., Li, W., Zhu, B.: Audio authentication based on music content analysis. J. Comput. Res. Dev. 49(1), 158\u2013166 (2012)","journal-title":"J. Comput. Res. Dev."},{"key":"10_CR3","volume-title":"Research on Key Technologies of Speech Perceptual Authentication","author":"J Gu","year":"2009","unstructured":"Gu, J.: Research on Key Technologies of Speech Perceptual Authentication. University of Science and Technology of China, Hefei (2009)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Yang, R., Qu, Z., Huang, J.: Detecting digital audio forgeries by checking frame offsets. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, pp. 21\u201326. ACM, New York (2008)","DOI":"10.1145\/1411328.1411334"},{"issue":"3","key":"10_CR5","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCOM.2014.6766087","volume":"52","author":"L Zhou","year":"2014","unstructured":"Zhou, L., Wu, D., Zheng, B., et al.: Joint physical-application layer security for wireless multimedia delivery. IEEE Commun. Mag. 52(3), 66\u201372 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Zmudzinski, S., Munir, B., Steinebach, M.: Digital audio authentication by robust feature embedding. In: Proceedings of the SPIE on Media Watermarking, Security, and Forensics, vol. 8303, pp. 1\u20137 (2012)","DOI":"10.1117\/12.908877"},{"issue":"5","key":"10_CR7","first-page":"6995","volume":"2013","author":"VS Tomar","year":"2013","unstructured":"Tomar, V.S., Rose, R.C.: Efficient manifold learning for speech recognition using locality sensitive hashing. Acoust. Speech Sig. Process. 2013(5), 6995\u20136999 (2013)","journal-title":"Acoust. Speech Sig. Process."},{"issue":"2","key":"10_CR8","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MSP.2012.2230222","volume":"30","author":"MA Pathak","year":"2013","unstructured":"Pathak, M.A., Raj, B., Rane, S.D., et al.: Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise. Sig. Process. Mag. 30(2), 62\u201374 (2013)","journal-title":"Sig. Process. Mag."},{"issue":"7","key":"10_CR9","first-page":"1405","volume":"36","author":"XM Niu","year":"2008","unstructured":"Niu, X.M., Jiao, Y.H.: An overview of perceptual hashing. Acta Electronica Sinica 36(7), 1405\u20131411 (2008)","journal-title":"Acta Electronica Sinica"},{"issue":"4","key":"10_CR10","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1016\/j.dsp.2013.01.012","volume":"23","author":"N Chen","year":"2013","unstructured":"Chen, N., Xiao, H.D.: Perceptual audio hashing algorithm based on Zernike moment and maximum-likelihood watermark detection. Digit. Sig. Process. 23(4), 1216\u20131227 (2013)","journal-title":"Digit. Sig. Process."},{"issue":"2","key":"10_CR11","first-page":"124","volume":"43","author":"YB Huang","year":"2015","unstructured":"Huang, Y.B., Zhang, Q.Y., Yuan, Z.T., et al.: The hash algorithm of speech perception based on the integration of adaptive MFCC and LPCC. J. Huazhong Univ. Sci. Tech. 43(2), 124\u2013128 (2015). (Natural Science Edition)","journal-title":"J. Huazhong Univ. Sci. Tech."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Yang, G., Chen, X.O., Yang, D.S.: Efficient music identification by utilizing space-saving audio fingerprinting system. In: 2014 IEEE International Conference on Proceedings of the Multimedia and Expo (ICME), pp. 1\u20136. IEEE, Chengdu (2014)","DOI":"10.1109\/ICME.2014.6890236"},{"key":"10_CR13","unstructured":"Grutzek, G., Strobl, J., Mainka, B., et al.: Perceptual hashing for the identification of telephone speech. In: Proceedings of the Speech Communication, 10. ITG Symposium, pp. 1\u20134 (2012)"},{"issue":"1","key":"10_CR14","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MMUL.2011.74","volume":"19","author":"S Gupta","year":"2012","unstructured":"Gupta, S., Cho, S., Kuo, C.C.J.: Current developments and future trends in audio authentication. IEEE Multimed. 19(1), 50\u201359 (2012)","journal-title":"IEEE Multimed."},{"issue":"3","key":"10_CR15","first-page":"1447","volume":"6","author":"YH Jiao","year":"2010","unstructured":"Jiao, Y.H., Ji, L.P., Niu, X.M.: Perceptual speech hashing and performance evaluation. Int. J. Innovative Comput. Inf. Control 6(3), 1447\u20131458 (2010)","journal-title":"Int. J. Innovative Comput. Inf. Control"},{"key":"10_CR16","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-319-06755-1_8","volume-title":"Towards the Internet of Services: The THESEUS Research Program","author":"C Nickel","year":"2014","unstructured":"Nickel, C., Zhou, X., Liu, M., et al.: Content identification and quality-based ranking. In: Wahlster, W., Grallert, H.-J., Wess, S., Friedrich, H., Widenka, T. (eds.) Towards the Internet of Services: The THESEUS Research Program, pp. 101\u2013110. Springer, Heidelberg (2014)"},{"issue":"9","key":"10_CR17","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1109\/LSP.2009.2025827","volume":"16","author":"YH Jiao","year":"2009","unstructured":"Jiao, Y.H., Ji, L.P., Niu, X.M.: Robust speech hashing for content authentication. IEEE Sig. Process. Lett. 16(9), 818\u2013821 (2009)","journal-title":"IEEE Sig. Process. Lett."},{"issue":"2","key":"10_CR18","first-page":"89","volume":"38","author":"JF Li","year":"2015","unstructured":"Li, J.F., Wu, T., Wang, H.X.: Perceptual hashing based on correlation coefficient of MFCC for speech authentication. J. Beijing Univ. Posts Telecommun. 38(2), 89\u201393 (2015)","journal-title":"J. Beijing Univ. Posts Telecommun."},{"key":"10_CR19","volume-title":"Research on Key Techniques of Mobile Audio Oriented 3G Communication","author":"C Zhang","year":"2010","unstructured":"Zhang, C.: Research on Key Techniques of Mobile Audio Oriented 3G Communication. Wuhan University, Wuhan (2010)"},{"issue":"5","key":"10_CR20","first-page":"1133","volume":"36","author":"K Xiang","year":"2015","unstructured":"Xiang, K., Hu, R.M.: Research progress in frame loss concealment for mobile audio coding. J. Chin. Comput. Syst. 36(5), 1133\u20131137 (2015)","journal-title":"J. Chin. Comput. Syst."},{"key":"10_CR21","volume-title":"Research on the Key Technologies of Identity Authentication and Content Security of 3G Network","author":"DF Zhang","year":"2010","unstructured":"Zhang, D.F.: Research on the Key Technologies of Identity Authentication and Content Security of 3G Network. Beijing University of Posts and Telecommunications, Beijing (2010)"},{"issue":"18","key":"10_CR22","doi-asserted-by":"crossref","first-page":"6537","DOI":"10.12733\/jics20105043","volume":"11","author":"QY Zhang","year":"2014","unstructured":"Zhang, Q.Y., Yang, Z.P., Huang, Y.B., et al.: Efficient robust speech authentication algorithm for perceptual hashing based on Hilbert-Huang transform. J. Inf. Comput. Sci. 11(18), 6537\u20136547 (2014)","journal-title":"J. Inf. Comput. Sci."},{"issue":"6","key":"10_CR23","first-page":"1231","volume":"6","author":"QY Zhang","year":"2015","unstructured":"Zhang, Q.Y., Yu, S., Xing, P.F., et al.: An improved phase coding-based watermarking algorithm for speech perceptual hashing authentication. J. Inf. Hiding Multimed. Sig. Process. 6(6), 1231\u20131241 (2015)","journal-title":"J. Inf. Hiding Multimed. Sig. Process."},{"key":"10_CR24","volume-title":"Research on Speech Perceptual Hashing Authentication Technology Based on Wavelet Transform","author":"PF Xing","year":"2015","unstructured":"Xing, P.F.: Research on Speech Perceptual Hashing Authentication Technology Based on Wavelet Transform. Lanzhou University of Technology, Lanzhou (2015)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42291-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T20:31:09Z","timestamp":1568147469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42291-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319422909","9783319422916"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42291-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}