{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T05:56:47Z","timestamp":1770271007345,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61862041"],"award-info":[{"award-number":["No.61862041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Youth Science and Technology Fund of Gansu Province of China","award":["No.1606RJYA274"],"award-info":[{"award-number":["No.1606RJYA274"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-09701-z","type":"journal-article","created":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T03:04:36Z","timestamp":1605495876000},"page":"10013-10036","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Multi-format speech BioHashing based on energy to zero ratio and improved LP-MMSE parameter fusion"],"prefix":"10.1007","volume":"80","author":[{"given":"Yong","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1667-3114","authenticated-orcid":false,"given":"Yi-bo","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qiu-yu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,16]]},"reference":[{"key":"9701_CR1","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","volume":"96","author":"SF Aghili","year":"2019","unstructured":"Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) Laco: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in iot. Futur Gener Comput Syst 96:410\u2013424","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"9701_CR2","first-page":"1189","volume":"48","author":"O Alpar","year":"2018","unstructured":"Alpar O, Krejcar O (2018) Online signature verification by spectrogram analysis. Appl Intell 48(5):1189\u20131199","journal-title":"Appl Intell"},{"issue":"8","key":"9701_CR3","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/s10916-015-0258-7","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin R, Biswas GP (2015) A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. Journal of medical systems 39(8):78","journal-title":"Journal of medical systems"},{"key":"9701_CR4","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1016\/j.future.2019.07.022","volume":"101","author":"K Atighehchi","year":"2019","unstructured":"Atighehchi K, Ghammam L, Barbier M, Rosenberger C (2019) Greyc-hashing: Combining biometrics and secret for enhancing the security of protected templates. Futur Gener Comput Syst 101:819\u2013 830","journal-title":"Futur Gener Comput Syst"},{"key":"9701_CR5","doi-asserted-by":"crossref","unstructured":"Awais A, Kun S, Yue Y, Hayat S, Ahmed A, Tu T (2018) Speaker recognition using mel frequency cepstral coefficient. In: 2018 international conference on artificial intelligence and big data (ICAIBD), IEEE, pp 271\u2013276","DOI":"10.1109\/ICAIBD.2018.8396208"},{"issue":"14","key":"9701_CR6","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.1049\/iet-com.2009.0749","volume":"4","author":"N Chen","year":"2010","unstructured":"Chen N, Wan W, Xiao H-D (2010) Robust audio hashing based on discrete-wavelet-transform and non-negative matrix factorisation. IET communications 4(14):1722\u20131731","journal-title":"IET communications"},{"key":"9701_CR7","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.sigpro.2018.09.013","volume":"154","author":"Y Chen","year":"2019","unstructured":"Chen Y, Wo Y, Xie R, Chudan W, Han G (2019) Deep secure quantization: on secure biometric hashing against similarity-based attacks. Signal Process 154:314\u2013323","journal-title":"Signal Process"},{"issue":"4","key":"9701_CR8","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1016\/j.dsp.2013.01.012","volume":"23","author":"N Chen","year":"2013","unstructured":"Chen N, Xiao H-D (2013) Perceptual audio hashing algorithm based on zernike moment and maximum-likelihood watermark detection. Digit Signal Process 23(4):1216\u20131227","journal-title":"Digit Signal Process"},{"key":"9701_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.3923\/jse.2017.22.31","volume":"11","author":"Y-B Huang","year":"2017","unstructured":"Huang Y-B, Zhang Q-Y (2017) Strong robustness hash algorithm of speech perception based on tensor decomposition model. J Softw Eng 11:22\u201331","journal-title":"J Softw Eng"},{"issue":"2","key":"9701_CR10","first-page":"206","volume":"20","author":"Y-B Huang","year":"2018","unstructured":"Huang Y-B, Zhang Q-Y, Wen-Jin H (2018) Robust speech perception hashing authentication algorithm based on spectral subtraction and multi-feature tensor. IJ Netw Secur 20(2):206\u2013216","journal-title":"IJ Netw Secur"},{"issue":"2","key":"9701_CR11","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TIFS.2017.2753172","volume":"13","author":"Z Jin","year":"2017","unstructured":"Jin Z, Hwang JY, Lai Y-L, Kim S, Teoh ABJ (2017) Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing. IEEE Trans Inform Forensics Secur 13(2):393\u2013407","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"1","key":"9701_CR12","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s10586-015-0523-z","volume":"19","author":"H-G Kim","year":"2016","unstructured":"Kim H-G, Cho H-S, Kim JY (2016) Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. Clust Comput 19(1):315\u2013323","journal-title":"Clust Comput"},{"key":"9701_CR13","first-page":"8","volume":"47","author":"D Kumar","year":"2019","unstructured":"Kumar D, Grover HS et al (2019) A secure authentication protocol for wearable devices environment using ecc. J Inform Secur Appl 47:8\u201315","journal-title":"J Inform Secur Appl"},{"key":"9701_CR14","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.future.2016.10.004","volume":"68","author":"S Kumari","year":"2017","unstructured":"Kumari S, Li X, Fan W, Das AK, Choo K-KR, Shen J (2017) Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Futur Gener Comput Syst 68:320\u2013330","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"9701_CR15","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1049\/cje.2015.07.024","volume":"24","author":"J Li","year":"2015","unstructured":"Li J, Wang H, Yi J (2015) Audio perceptual hashing based on nmf and mdct coefficients. Chin J Electron 24(3):579\u2013588","journal-title":"Chin J Electron"},{"key":"9701_CR16","doi-asserted-by":"crossref","unstructured":"Li J, Wu T (2015) Perceptual audio hashing using rt and dct in wavelet domain. In: 2015 11th international conference on computational intelligence and security (CIS), IEEE, pp 363\u2013366","DOI":"10.1109\/CIS.2015.94"},{"issue":"4","key":"9701_CR17","doi-asserted-by":"publisher","first-page":"700","DOI":"10.3390\/app9040700","volume":"9","author":"J Liu","year":"2019","unstructured":"Liu J, Li J, Ma J, Sadiq N, Bhatti UA, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on dtcwt-dct and henon map. Appl Sci 9(4):700","journal-title":"Appl Sci"},{"issue":"8","key":"9701_CR18","first-page":"579","volume":"2","author":"P Lotia","year":"2013","unstructured":"Lotia P, Khan DMR (2013) Significance of complementary spectral features for speaker recognition. IJRCCT 2(8):579\u2013588","journal-title":"IJRCCT"},{"issue":"3","key":"9701_CR19","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern recognition 40(3):1057\u20131065","journal-title":"Pattern recognition"},{"issue":"4","key":"9701_CR20","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1007\/s12652-017-0516-2","volume":"9","author":"J Qi","year":"2018","unstructured":"Qi J, Chen Z, Li B, Shen J, Li Y, Ma J (2018) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Human Comput 9(4):1061\u20131073","journal-title":"J Ambient Intell Human Comput"},{"issue":"4","key":"9701_CR21","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11235-017-0360-x","volume":"67","author":"Q Qian","year":"2018","unstructured":"Qian Q, Wang H, Sun X, Cui Y, Wang H, Shi C (2018) Speech authentication and content recovery scheme for security communication and storage. Telecommun Syst 67(4):635\u2013649","journal-title":"Telecommun Syst"},{"key":"9701_CR22","unstructured":"Qiao S, Zhang T, Huang Y (2017) A fast speech feature extraction method based on perceptual hashing. In: 2017 13th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD),IEEE, pp 1295\u20131300"},{"issue":"1-2","key":"9701_CR23","first-page":"31","volume":"12","author":"Z Qiuyu","year":"2018","unstructured":"Qiuyu Z, Pengfei X, Yibo H, Ruihong D, Zhongping Y (2018) An efficient speech perceptual hashing authentication algorithm based on dwt and symmetric ternary string. Int J Inf Commun Technol 12(1-2):31\u201350","journal-title":"Int J Inf Commun Technol"},{"issue":"19","key":"9701_CR24","doi-asserted-by":"publisher","first-page":"25223","DOI":"10.1007\/s11042-018-5782-2","volume":"77","author":"SJ Sheela","year":"2018","unstructured":"Sheela SJ, Suresh KV, Tandur D (2018) Image encryption based on modified henon map using hybrid chaotic shift transform. Multimed Tools Appl 77 (19):25223\u201325251","journal-title":"Multimed Tools Appl"},{"key":"9701_CR25","doi-asserted-by":"crossref","unstructured":"Siddavatam I, Khatri D, Ashar P, Parekh V, Sharma T (2019) Authentication using dynamic question generation. In: Integrated intelligent computing, communication and security. Springer, New York, pp 293\u2013300","DOI":"10.1007\/978-981-10-8797-4_31"},{"issue":"1","key":"9701_CR26","doi-asserted-by":"publisher","first-page":"129","DOI":"10.5755\/j01.itc.48.1.17270","volume":"48","author":"J Srinivas","year":"2019","unstructured":"Srinivas J, Mishra D, Mukhopadhyay S, Kumari S, Guleria V (2019) An authentication framework for roaming service in global mobility networks. Inform Technol Control 48(1):129\u2013145","journal-title":"Inform Technol Control"},{"issue":"6","key":"9701_CR27","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1016\/j.patcog.2007.12.002","volume":"41","author":"ABJ Teoh","year":"2008","unstructured":"Teoh ABJ, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recog 41(6):2034\u20132044","journal-title":"Pattern Recog"},{"key":"9701_CR28","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.optlaseng.2019.06.028","volume":"123","author":"G Verma","year":"2019","unstructured":"Verma G, Liao M, Dajiang L, He W, Peng X (2019) A novel optical two-factor face authentication scheme. Opt Lasers Eng 123:28\u201336","journal-title":"Opt Lasers Eng"},{"key":"9701_CR29","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.ins.2018.03.040","volume":"450","author":"C Wang","year":"2018","unstructured":"Wang C, Wang X, Li Y, Xia Z, Zhang C (2018) Quaternion polar harmonic fourier moments for color images. Inf Sci 450:141\u2013156","journal-title":"Inf Sci"},{"key":"9701_CR30","doi-asserted-by":"crossref","unstructured":"Wang C, Wang X, Xia Z, Ma B, Shi Y-Q (2019), Image description with polar harmonic fourier moments. IEEE Trans Circ Syst Video Technol","DOI":"10.1109\/TCSVT.2019.2960507"},{"key":"9701_CR31","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang C, Wang X, Xia Z, Zhang C (2019) Ternary radial harmonic fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109\u2013120","journal-title":"Inf Sci"},{"key":"9701_CR32","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.ymssp.2019.05.020","volume":"130","author":"J Wodecki","year":"2019","unstructured":"Wodecki J, Kruczek P, Bartkowiak A, Zimroz R, Wy\u0142oma\u0144ska A (2019) Novel method of informative frequency band selection for vibration signal using nonnegative matrix factorization of spectrogram matrix. Mech Syst Signal Process 130:585\u2013596","journal-title":"Mech Syst Signal Process"},{"key":"9701_CR33","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.sigpro.2018.11.011","volume":"157","author":"Zhiqiu Xia","year":"2019","unstructured":"Xia Zhiqiu, Wang Xingyuan, Zhou Wenjie, Li Rui, Wang Chunpeng, Zhang Chuan (2019) Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process 157:108\u2013118","journal-title":"Signal Process"},{"key":"9701_CR34","doi-asserted-by":"crossref","unstructured":"Yenigalla P, Kumar A, Tripathi S, Singh C, Kar S, Vepa J (2018) Speech emotion recognition using spectrogram & phoneme embedding. In: Interspeech, pp 3688\u20133692","DOI":"10.21437\/Interspeech.2018-1811"},{"key":"9701_CR35","first-page":"1452","volume":"9","author":"Q-Y Zhang","year":"2018","unstructured":"Zhang Q-Y, Ge Z-X, Qiao S-B (2018) An efficient retrieval method of encrypted speech based on frequency band variance. J Inform Hiding Multimed Signal Process 9:1452\u20131463 11","journal-title":"J Inform Hiding Multimed Signal Process"},{"issue":"16","key":"9701_CR36","doi-asserted-by":"publisher","first-page":"21653","DOI":"10.1007\/s11042-018-5613-5","volume":"77","author":"Q-Y Zhang","year":"2018","unstructured":"Zhang Q-Y, Qiao S-B, Huang Y-B, Zhang T (2018) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimed Tools Appl 77(16):21653\u201321669","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"9701_CR37","first-page":"33","volume":"45","author":"Q Zhang","year":"2017","unstructured":"Zhang Q, Qiao S, Zhang T, Huang Y (2017) Perception hashing authentication algorithm for multi-format audio based on energy to zero ratio. J Huazhong Univ Sci Technol (Nat Sci Edition) 45(9):33\u201338","journal-title":"J Huazhong Univ Sci Technol (Nat Sci Edition)"},{"issue":"2","key":"9701_CR38","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.1007\/s11042-017-4381-y","volume":"77","author":"Q-Y Zhang","year":"2018","unstructured":"Zhang Q-Y, Wen-jin H, Huang Y-B, Qiao S-B (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77(2):1555\u20131581","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"9701_CR39","first-page":"127","volume":"44","author":"Q-Y Zhang","year":"2016","unstructured":"Zhang Q-Y, Wen-jin H, Qiao S-B, Zhang T (2016) An efficient speech perception hash authentication algorithm based on the linear prediction minimum mean squared error. J Huazhong Univ Sci Technol (Nat Sci Edition) 44 (12):127\u2013132","journal-title":"J Huazhong Univ Sci Technol (Nat Sci Edition)"},{"issue":"2","key":"9701_CR40","first-page":"311","volume":"6","author":"Q-Y Zhang","year":"2015","unstructured":"Zhang Q-Y, Xing P-F, Huang Y-B, Dong R-H, Yang Z-P (2015) An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition. J Inform Hiding Multimed Signal Process 6(2):311\u2013322","journal-title":"J Inform Hiding Multimed Signal Process"},{"issue":"4","key":"9701_CR41","first-page":"77","volume":"39","author":"Q-Y Zhang","year":"2016","unstructured":"Zhang Q-Y, Xing P-F, Huang Y-B, Dong R-H, Yang R-H (2016) Perception hashing algorithm for multi-format audio. J Beijing Univ Posts Telecommun 39(4):77\u201382","journal-title":"J Beijing Univ Posts Telecommun"},{"issue":"3","key":"9701_CR42","first-page":"58","volume":"46","author":"Q-Y Zhang","year":"2018","unstructured":"Zhang Q-Y, Zhang T, Dong-Fang W, Ge Z-X (2018) Strong robust speech authentication algorithm based on quasi-harmonic model. J Huazhong Univ Sci Technol (Nat Sci Edition) 46(3):58\u201364","journal-title":"J Huazhong Univ Sci Technol (Nat Sci Edition)"},{"key":"9701_CR43","doi-asserted-by":"crossref","unstructured":"Zhang X, Zhang J, He T, Chen Y, Shen Y, Xu X (2018) A speech and lip authentication system based on android smart phone. In: Proceedings of the 6th international conference on information technology: IoT and Smart City, ACM, pp 110\u2013114","DOI":"10.1145\/3301551.3301600"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09701-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-09701-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09701-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T23:57:05Z","timestamp":1616716625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-09701-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":43,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["9701"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09701-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,16]]},"assertion":[{"value":"2 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}