{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T01:15:14Z","timestamp":1768094114810,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T00:00:00Z","timestamp":1705622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T00:00:00Z","timestamp":1705622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862041"],"award-info":[{"award-number":["61862041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s00530-023-01229-0","type":"journal-article","created":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T01:01:46Z","timestamp":1705626106000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A novel hashing-inverted index for secure content-based retrieval with massive encrypted speeches"],"prefix":"10.1007","volume":"30","author":[{"given":"Yingjie","family":"Hu","sequence":"first","affiliation":[]},{"given":"Qiuyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qiwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yugui","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,19]]},"reference":[{"key":"1229_CR1","doi-asserted-by":"publisher","unstructured":"Wu Z.Y., Yen L.P., Chen K.Y.: Generating pseudo-relevant representations for spoken document retrieval. In: ICASSP 2019\u20132019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp. 7370\u20137374. (2019). https:\/\/doi.org\/10.1109\/ICASSP.2019.8683832","DOI":"10.1109\/ICASSP.2019.8683832"},{"key":"1229_CR2","doi-asserted-by":"publisher","unstructured":"Lee C.H., Chen Y.N., Lee H.Y.: Mitigating the impact of speech recognition errors on spoken question answering by adversarial domain adaptation. In: ICASSP 2019\u20132019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp. 7300\u20137304. (2019). https:\/\/doi.org\/10.1109\/ICASSP.2019.8683377","DOI":"10.1109\/ICASSP.2019.8683377"},{"issue":"3","key":"1229_CR3","doi-asserted-by":"publisher","first-page":"3677","DOI":"10.1007\/s11042-017-5219-3","volume":"77","author":"F Zou","year":"2018","unstructured":"Zou, F., Tang, X., Li, K., et al.: Hidden semantic hashing for fast retrieval over large scale document collection. Multimed. Tools Appl. 77(3), 3677\u20133697 (2018). https:\/\/doi.org\/10.1007\/s11042-017-5219-3","journal-title":"Multimed. Tools Appl."},{"key":"1229_CR4","doi-asserted-by":"publisher","unstructured":"Fan L., Jiang Q., Yu Y., Li W.: Deep hashing for speaker identification and retrieval. In: Proceedings of the Annual Conference of the International Speech Communication Association. pp. 2908\u20132912. (2019). https:\/\/doi.org\/10.21437\/Interspeech.2019-2457","DOI":"10.21437\/Interspeech.2019-2457"},{"key":"1229_CR5","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.1109\/TASLP.2020.2998277","volume":"28","author":"Y Yuan","year":"2020","unstructured":"Yuan, Y., Xie, L., Leung, C.C., Chen, H., Ma, B.: Fast query-by-example speech search using attention-based deep binary embeddings. IEEE\/ACM Trans. Audio Speech Lang. Process. 28, 1988\u20132000 (2020). https:\/\/doi.org\/10.1109\/TASLP.2020.2998277","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"6","key":"1229_CR6","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/3415148","volume":"53","author":"GE Pibiri","year":"2020","unstructured":"Pibiri, G.E., Venturini, R.: Techniques for inverted index compression. ACM Comput. Surv. (CSUR) 53(6), 125 (2020). https:\/\/doi.org\/10.1145\/3415148","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"6","key":"1229_CR7","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s00530-019-00613-z","volume":"25","author":"J Shen","year":"2019","unstructured":"Shen, J., Tao, M., Qu, Q., Tao, D., Rui, Y.: Toward efficient indexing structure for scalable content-based music retrieval. Multimed. Syst. 25(6), 639\u2013653 (2019). https:\/\/doi.org\/10.1007\/s00530-019-00613-z","journal-title":"Multimed. Syst."},{"key":"1229_CR8","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.future.2022.03.040","volume":"134","author":"Q Gu","year":"2022","unstructured":"Gu, Q., Xia, Z., Sun, X.: MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing. Futur. Gener. Comput. Syst. 134, 78\u201392 (2022). https:\/\/doi.org\/10.1016\/j.future.2022.03.040","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1229_CR9","doi-asserted-by":"publisher","first-page":"116070","DOI":"10.1016\/j.eswa.2021.116070","volume":"189","author":"J Anju","year":"2022","unstructured":"Anju, J., Shreelekshmi, R.: A faster secure content-based image retrieval using clustering for cloud. Expert Syst. Appl. 189, 116070 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2021.116070","journal-title":"Expert Syst. Appl."},{"key":"1229_CR10","doi-asserted-by":"publisher","first-page":"102043","DOI":"10.1016\/j.sysarc.2021.102043","volume":"116","author":"A Hassan","year":"2021","unstructured":"Hassan, A., Liu, F., Wang, F., Wang, Y.: Secure content based image retrieval for mobile users with deep neural networks in the cloud. J. Syst. Architect. 116, 102043 (2021). https:\/\/doi.org\/10.1016\/j.sysarc.2021.102043","journal-title":"J. Syst. Architect."},{"key":"1229_CR11","doi-asserted-by":"publisher","unstructured":"Thaine P., Penn G.: Extracting mel-frequency and bark-frequency cepstral coefficients from encrypted signals. In: INTERSPEECH. pp. 3715\u20133719. (2019. https:\/\/doi.org\/10.21437\/Interspeech.2019-1136","DOI":"10.21437\/Interspeech.2019-1136"},{"key":"1229_CR12","doi-asserted-by":"publisher","unstructured":"Chen K.Y., Liu S.H., Chen B., Wang H.M.: A locality-preserving essence vector modeling framework for spoken document retrieval. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp. 5665\u20135669. (2017). https:\/\/doi.org\/10.1109\/ICASSP.2017.7953241","DOI":"10.1109\/ICASSP.2017.7953241"},{"issue":"14","key":"1229_CR13","doi-asserted-by":"publisher","first-page":"22209","DOI":"10.1007\/s11042-021-10800-8","volume":"80","author":"A Gupta","year":"2021","unstructured":"Gupta, A., Yadav, D.: A novel approach to perform context-based automatic spoken document retrieval of political speeches based on wavelet tree indexing. Multimed. Tools Appl. 80(14), 22209\u201322229 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10800-8","journal-title":"Multimed. Tools Appl."},{"issue":"12","key":"1229_CR14","doi-asserted-by":"publisher","first-page":"2447","DOI":"10.1109\/TASLP.2018.2852739","volume":"26","author":"HY Lee","year":"2018","unstructured":"Lee, H.Y., Chung, P.H., Wu, Y.C., Lin, T.H., Wen, T.H.: Interactive spoken content retrieval by deep reinforcement learning. IEEE\/ACM Trans. Audio Speech Lang. Process. 26(12), 2447\u20132459 (2018). https:\/\/doi.org\/10.1109\/TASLP.2018.2852739","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"1229_CR15","doi-asserted-by":"publisher","first-page":"24626","DOI":"10.1109\/ACCESS.2019.2894673","volume":"7","author":"J Qin","year":"2019","unstructured":"Qin, J., Li, H., Xiang, X., et al.: An encrypted image retrieval method based on Harris corner optimization and LSH in cloud computing. IEEE Access 7, 24626\u201324633 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2894673","journal-title":"IEEE Access"},{"key":"1229_CR16","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.neucom.2019.11.119","volume":"406","author":"C Zhang","year":"2020","unstructured":"Zhang, C., Zhu, L., Zhang, S., Yu, W.: TDHPPIR: an efficient deep hashing based privacy-preserving image retrieval method. Neurocomputing 406, 386\u2013398 (2020). https:\/\/doi.org\/10.1016\/j.neucom.2019.11.119","journal-title":"Neurocomputing"},{"key":"1229_CR17","doi-asserted-by":"publisher","unstructured":"Hao Q., Luo L., Jan S.T.K., Wang G.: It\u2019s not what it looks like: manipulating perceptual hashing based applications. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. pp. 69\u201385. (2021). https:\/\/doi.org\/10.1145\/3460120.3484559","DOI":"10.1145\/3460120.3484559"},{"key":"1229_CR18","doi-asserted-by":"publisher","first-page":"13065","DOI":"10.1007\/s11042-022-12371-8","volume":"81","author":"Y Huang","year":"2022","unstructured":"Huang, Y., Wang, Y., Li, H., Zhang, Y., Zhang, Q.: Encrypted speech retrieval based on long sequence Biohashing. Multimed. Tools Appl. 81, 13065\u201313085 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12371-8","journal-title":"Multimed. Tools Appl."},{"key":"1229_CR19","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1007\/s11042-020-09748-y","volume":"80","author":"Q Zhang","year":"2021","unstructured":"Zhang, Q., Li, Y., Hu, Y.: A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing. Multimed. Tools Appl. 80, 1201\u20131221 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09748-y","journal-title":"Multimed. Tools Appl."},{"issue":"7","key":"1229_CR20","doi-asserted-by":"publisher","first-page":"10221","DOI":"10.1007\/s11042-022-12123-8","volume":"81","author":"Q Zhang","year":"2022","unstructured":"Zhang, Q., Zhao, X., Zhang, Q., Li, Y.: Content-based encrypted speech retrieval scheme with deep hashing. Multimed. Tools Appl. 81(7), 10221\u201310242 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12123-8","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"1229_CR21","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TSUSC.2021.3125520","volume":"7","author":"H Dai","year":"2021","unstructured":"Dai, H., Yang, M., Yang, G., et al.: A keyword-grouping inverted index based multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Sustain. Comput. 7(3), 561\u2013578 (2021). https:\/\/doi.org\/10.1109\/TSUSC.2021.3125520","journal-title":"IEEE Trans. Sustain. Comput."},{"issue":"4","key":"1229_CR22","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TETC.2017.2737789","volume":"7","author":"S Tahir","year":"2019","unstructured":"Tahir, S., Ruj, S., Rahulamathavan, Y., Rajarajan, M., Glackin, C.: A new secure and lightweight searchable encryption scheme over encrypted cloud data. IEEE Trans. Emerg. Top. Comput. 7(4), 530\u2013544 (2019). https:\/\/doi.org\/10.1109\/TETC.2017.2737789","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"1229_CR23","doi-asserted-by":"publisher","unstructured":"Glackin C., Chollet G., Dugan N., et al: Privacy preserving encrypted phonetic search of speech data. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE. pp. 6414\u20136418. (2017). https:\/\/doi.org\/10.1109\/ICASSP.2017.7953391","DOI":"10.1109\/ICASSP.2017.7953391"},{"issue":"2","key":"1229_CR24","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1080\/19393555.2017.1293199","volume":"26","author":"Y Masaya","year":"2017","unstructured":"Masaya, Y.: Secure hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption. Inf. Secur. J.Glob. Perspect. 26(2), 85\u2013103 (2017). https:\/\/doi.org\/10.1080\/19393555.2017.1293199","journal-title":"Inf. Secur. J.Glob. Perspect."},{"key":"1229_CR25","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s11128-018-2140-2","volume":"18","author":"Z Peng","year":"2019","unstructured":"Peng, Z., Shi, R., Wang, P., Zhang, S.: Two quantum protocols for secure hamming distance computation. Quantum Inf. Process. 18, 29 (2019). https:\/\/doi.org\/10.1007\/s11128-018-2140-2","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"1229_CR26","doi-asserted-by":"publisher","first-page":"137","DOI":"10.6688\/JISE.201901_35(1).0008","volume":"35","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Zhang, Y.C., Liu, J., et al.: Chinese multi-keyword fuzzy rank search over encrypted cloud data based on locality-sensitive hashing. J. Inf. Sci. Eng. 35(1), 137\u2013158 (2019). https:\/\/doi.org\/10.6688\/JISE.201901_35(1).0008","journal-title":"J. Inf. Sci. Eng."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01229-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-023-01229-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01229-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T11:33:24Z","timestamp":1708169604000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-023-01229-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,19]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1229"],"URL":"https:\/\/doi.org\/10.1007\/s00530-023-01229-0","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,19]]},"assertion":[{"value":"23 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare relevant to the content of this article. The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"22"}}