{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:52:51Z","timestamp":1742939571693,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_33","type":"book-chapter","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T03:53:29Z","timestamp":1477886009000},"page":"365-376","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Protection of Digital Speech Based on Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Canghong","family":"Shi","sequence":"first","affiliation":[]},{"given":"Hongxia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"2","key":"33_CR1","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317\u2013323 (2015)","journal-title":"J. Internet Technol."},{"issue":"4","key":"33_CR2","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1587\/transinf.2014EDP7283","volume":"E98-D","author":"T Ma","year":"2015","unstructured":"Ma, T., Zhou, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Lee, S.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. E98-D(4), 902\u2013910 (2015)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Kanhe, A., Aghila, G., Kiran, C.Y.S., Ramesh, C.H., Jadav, G., Gowtham Raj, M.: Robust audio steganography based on advanced encryption standards in temporal domain. In: IEEE ICACCI 2015, pp. 1449\u20131453 (2015)","DOI":"10.1109\/ICACCI.2015.7275816"},{"issue":"1","key":"33_CR4","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10772-014-9253-5","volume":"18","author":"SMS Eldin","year":"2015","unstructured":"Eldin, S.M.S., Khamis, S.A., Hassanin, A.A.I.M., Alsharqawy, M.A.: New audio encryption package for TV cloud computing. Int. J. Speech Technol. 18(1), 131\u2013142 (2015)","journal-title":"Int. J. Speech Technol."},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Mostafa, A., Soliman, N.F., Abdalluh, M., EI-samie, F.E.A.: Speech encryption using two dimensional chaotic maps. In: IEEE ICENCO 2015, pp. 235\u2013240 (2015)","DOI":"10.1109\/ICENCO.2015.7416354"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Zeng, L., Zhang, X., Chen, L., Fan, Z., Wang, Y.: Scrambling-based speech encryption via compressed sensing. EURASIP J. Adv. Signal Process. http:\/\/asp.eurasipjournals.com\/content\/2012\/1\/257","DOI":"10.1186\/1687-6180-2012-257"},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-662-43886-2_30","volume-title":"Digital-Forensics and Watermarking","author":"H Wang","year":"2014","unstructured":"Wang, H., Zhou, L., Zhang, W., Liu, S.: Watermarking-based perceptual hashing search over encrypted speech. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Echizen, I. (eds.) IWDW 2015. LNCS, vol. 9569, pp. 423\u2013434. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-43886-2_30"},{"key":"33_CR8","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.amc.2015.08.037","volume":"270","author":"M Garc\u00eda-Mart\u00ednez","year":"2015","unstructured":"Garc\u00eda-Mart\u00ednez, M., Onta\u00f1\u00f3n-Garc\u00eda, L.J., Campos-Cant\u00f3n, E., Celikovsk\u00fd, S.: Hyperchaotic encryption based on multi-scroll piecewise linear systems. Appl. Math. Comput. 270, 413\u2013424 (2015)","journal-title":"Appl. Math. Comput."},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-25903-1_9","volume-title":"Advanced Concepts for Intelligent Vision Systems","author":"T Shortell","year":"2015","unstructured":"Shortell, T., Shokoufandeh, A.: Secure signal processing using fully homomorphic encryption. In: Battiato, S., Blanc-Talon, J., Gallo, G., Philips, W., Popescu, D., Scheunders, P. (eds.) ACIVS 2015. LNCS, vol. 9386, pp. 93\u2013104. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25903-1_9"},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCSVT.2015.2511482","volume":"PP","author":"X Zhang","year":"2015","unstructured":"Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circuits Syst. Video Technol. PP, 1 (2015)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Yang, P., Gui, X., An, J., Tian, F., Wang, J.: An encrypted image editing scheme based on homomorphic encryption. In: IEEE INFOCOM Workshops, pp. 109\u2013110 (2015)","DOI":"10.1109\/INFCOMW.2015.7179367"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhuo, L., Peng, Y., Zhang, J.: A secure image retrieval method based on homomorphic encryption for cloud computing. In: 19th International Conference on Digital Signal Processing, pp. 269\u2013274. IEEE (2014)","DOI":"10.1109\/ICDSP.2014.6900669"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Li, Y., Zhou, J., Li, Y., Au, O.C.: Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique. In: IEEE GlobalSIP, pp. 800\u2013804 (2015)","DOI":"10.1109\/GlobalSIP.2015.7418307"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Hendriks, R.C., Erkin, Z., Gerkmann, T.: Privacy-preserving distributed speech enhancement for wireless: sensor networks by processing in the encrypted domain. In: IEEE ICASSP, pp. 7005\u20137009 (2013)","DOI":"10.1109\/ICASSP.2013.6639020"},{"key":"33_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48910-X_16"},{"issue":"2","key":"33_CR16","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"33_CR17","unstructured":"Kipnis, A., Hibshoosh, E.: Efficient methods for practical fully homomorphic symmetric key encryption, randomization and verification. http:\/\/eprint.iacr.org\/2012\/637"},{"issue":"3","key":"33_CR18","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C Gentry","year":"2010","unstructured":"Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97\u2013105 (2010)","journal-title":"Commun. ACM"},{"key":"33_CR19","unstructured":"ECRYPT II yearly report on algorithms and keysizes. In: European Network of Excellence in Cryptology. http:\/\/cordis.europa.eu\/docs\/projects\/cnect\/6\/216676\/080\/deliverables\/002-DSPA20"},{"issue":"4","key":"33_CR20","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed. Tools Appl. 75(4), 1947\u20131962 (2016)","journal-title":"Multimed. Tools Appl."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,27]],"date-time":"2020-09-27T01:35:09Z","timestamp":1601170509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}