{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:38Z","timestamp":1740122858726,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T00:00:00Z","timestamp":1618185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T00:00:00Z","timestamp":1618185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862041","61363078"],"award-info":[{"award-number":["61862041","61363078"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10905-0","type":"journal-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T17:02:56Z","timestamp":1618246976000},"page":"24925-24948","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An encrypted speech authentication and tampering recovery method based on perceptual hashing"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1488-388X","authenticated-orcid":false,"given":"Qiu-yu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Deng-hai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fu-jiu","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,12]]},"reference":[{"issue":"23","key":"10905_CR1","doi-asserted-by":"publisher","first-page":"31487","DOI":"10.1007\/s11042-018-6213-0","volume":"77","author":"AH Ali","year":"2018","unstructured":"Ali AH, George LE, Zaidan AA, Mokhtar MR (2018) High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed Tools Appl 77(23):31487\u201331516. https:\/\/doi.org\/10.1007\/s11042-018-6213-0","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10905_CR2","doi-asserted-by":"publisher","first-page":"345","DOI":"10.4218\/etrij.10.0209.0309","volume":"32","author":"N Chen","year":"2010","unstructured":"Chen N, Wan WG (2010) Robust speech hash function. ETRI J 32(2):345\u2013347. https:\/\/doi.org\/10.4218\/etrij.10.0209.0309","journal-title":"ETRI J"},{"doi-asserted-by":"publisher","unstructured":"Chen J, Zheng P, Guo J, Zhang W, Huang JW (2018) A privacy-preserving multipurpose watermarking scheme for audio authentication and protection. In 17th IEEE international conference on trust, security and privacy in computing and communications (IEEE TrustCom) \/ 12th IEEE international conference on big data science and engineering (IEEE BigDataSE). IEEE 86-91. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00023","key":"10905_CR3","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00023"},{"issue":"3","key":"10905_CR4","doi-asserted-by":"publisher","first-page":"703","DOI":"10.2298\/CSIS170112024H","volume":"14","author":"SF He","year":"2017","unstructured":"He SF, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inf Syst 14(3):703\u2013718. https:\/\/doi.org\/10.2298\/CSIS170112024H","journal-title":"Comput Sci Inf Syst"},{"doi-asserted-by":"publisher","unstructured":"Jawad AK, Abdullah HN, Hreshee SS (2018) Secure speech communication system based on scrambling and masking by chaotic maps. In 2018 international conference on advance of sustainable engineering and its application (ICASEA), 2018 international conference on. IEEE 7-12. https:\/\/doi.org\/10.1109\/ICASEA.2018.8370947","key":"10905_CR5","DOI":"10.1109\/ICASEA.2018.8370947"},{"issue":"22","key":"10905_CR6","doi-asserted-by":"publisher","first-page":"29303","DOI":"10.1007\/s11042-018-5959-8","volume":"77","author":"X Jin","year":"2018","unstructured":"Jin X, Yu S, Liang Z, Chen Z, Pei J (2018) Video logo removal detection based on sparse representation. Multimed Tools Appl 77(22):29303\u201329322. https:\/\/doi.org\/10.1007\/s11042-018-5959-8","journal-title":"Multimed Tools Appl"},{"key":"10905_CR7","doi-asserted-by":"publisher","first-page":"102428","DOI":"10.1016\/j.jisa.2019.102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining, Arnold map, DNA sequence operation, and a Mandelbrot set. J Inform Secur Appl 50:102428. https:\/\/doi.org\/10.1016\/j.jisa.2019.102428","journal-title":"J Inform Secur Appl"},{"issue":"1","key":"10905_CR8","doi-asserted-by":"publisher","first-page":"133","DOI":"10.4218\/etrij.2017-0092","volume":"40","author":"A Kaur","year":"2018","unstructured":"Kaur A, Dutta MK (2018) High embedding capacity and robust audio watermarking for secure transmission using tamper detection. ETRI J 40(1):133\u2013145. https:\/\/doi.org\/10.4218\/etrij.2017-0092","journal-title":"ETRI J"},{"issue":"5","key":"10905_CR9","doi-asserted-by":"publisher","first-page":"4129","DOI":"10.3906\/elk-1411-167","volume":"24","author":"OH Kocal","year":"2016","unstructured":"Kocal OH, Y\u00fcr\u00fckl\u00fc E, Dilavero\u011flu E (2016) Speech steganalysis based on the delay vector variance method. Turkish J Electric Eng Comput Sci 24(5):4129\u20134141. https:\/\/doi.org\/10.3906\/elk-1411-167","journal-title":"Turkish J Electric Eng Comput Sci"},{"key":"10905_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2019.05.002","volume":"33","author":"R Kumar","year":"2019","unstructured":"Kumar R, Goyal R (2019) On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput Sci Rev 33:1\u201348. https:\/\/doi.org\/10.1016\/j.cosrev.2019.05.002","journal-title":"Comput Sci Rev"},{"doi-asserted-by":"publisher","unstructured":"Kusuma EJ, Indriani OR, Sari CA, Rachmawanto EH (2017) An imperceptible LSB image hiding on edge region using DES encryption. In 2017 international conference on innovative and creative information technology (ICITech). IEEE 1-6. https:\/\/doi.org\/10.1109\/INNOCIT.2017.8319132","key":"10905_CR11","DOI":"10.1109\/INNOCIT.2017.8319132"},{"issue":"3","key":"10905_CR12","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1049\/cje.2015.07.024","volume":"24","author":"JF Li","year":"2015","unstructured":"Li JF, Wang HX, Jing Y (2015) Audio perceptual hashing based on NMF and MDCT coefficients. Chin J Electron 24(3):579\u2013588. https:\/\/doi.org\/10.1049\/cje.2015.07.024","journal-title":"Chin J Electron"},{"key":"10905_CR13","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.dsp.2013.09.007","volume":"24","author":"Z Liu","year":"2014","unstructured":"Liu Z, Wang H (2014) A novel speech content authentication algorithm based on Bessel\u2013Fourier moments. Digital Signal Process 24:197\u2013208. https:\/\/doi.org\/10.1016\/j.dsp.2013.09.007","journal-title":"Digital Signal Process"},{"key":"10905_CR14","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.sigpro.2015.10.023","volume":"123","author":"ZH Liu","year":"2016","unstructured":"Liu ZH, Zhang F, Wang J, Wang HX, Huang JW (2016) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123:157\u2013166. https:\/\/doi.org\/10.1016\/j.sigpro.2015.10.023","journal-title":"Signal Process"},{"key":"10905_CR15","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.eswa.2017.12.003","volume":"97","author":"Y Liu","year":"2018","unstructured":"Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst Appl 97:95\u2013105. https:\/\/doi.org\/10.1016\/j.eswa.2017.12.003","journal-title":"Expert Syst Appl"},{"issue":"7","key":"10905_CR16","doi-asserted-by":"publisher","first-page":"2390","DOI":"10.3390\/s18072390","volume":"18","author":"W Lu","year":"2018","unstructured":"Lu W, Chen Z, Li L, Cao X, Wei J, Xiong N, Dang J (2018) Watermarking based on compressive sensing for digital speech detection and recovery. Sensors 18(7):2390\u20131-22. https:\/\/doi.org\/10.3390\/s18072390","journal-title":"Sensors"},{"issue":"6","key":"10905_CR17","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/s11859-014-1044-y","volume":"19","author":"XR Luo","year":"2014","unstructured":"Luo XR, Xiang SJ (2014) Fragile audio watermarking with perfect restoration capacity based on an adapted integer transform. Wuhan Univ J Nat Sci 19(6):497\u2013504. https:\/\/doi.org\/10.1007\/s11859-014-1044-y","journal-title":"Wuhan Univ J Nat Sci"},{"issue":"12","key":"10905_CR18","doi-asserted-by":"publisher","first-page":"14197","DOI":"10.1007\/s11042-016-3783-6","volume":"76","author":"A Menendez-Ortiz","year":"2017","unstructured":"Menendez-Ortiz A, Feregrino-Uribe C, Garcia-Hernandez JJ, Guzman-Zavaleta ZJ (2017) Self-recovery scheme for audio restoration after a content replacement attack. Multimed Tools Appl 76(12):14197\u201314224. https:\/\/doi.org\/10.1007\/s11042-016-3783-6","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"10905_CR19","doi-asserted-by":"publisher","first-page":"e0204442","DOI":"10.1371\/journal.pone.0204442","volume":"13","author":"A Menendez-Ortiz","year":"2018","unstructured":"Menendez-Ortiz A, Feregrino-Uribe C, Garcia-Hernandez JJ (2018) Self-recovery scheme for audio restoration using auditory masking. PloS one 13(9):e0204442, 1-23. https:\/\/doi.org\/10.1371\/journal.pone.0204442","journal-title":"PloS one"},{"doi-asserted-by":"publisher","unstructured":"Mostafa A, Soliman NF, Abdalluh M, EI-samie FE (2015) Speech encryption using two dimensional chaotic maps. In Computer Engineering Conference (ICENCO), 2015 Computer engineering conference on. IEEE 235\u2013240. https:\/\/doi.org\/10.1109\/ICENCO.2015.7416354","key":"10905_CR20","DOI":"10.1109\/ICENCO.2015.7416354"},{"key":"10905_CR21","doi-asserted-by":"publisher","first-page":"123028","DOI":"10.1016\/j.physa.2019.123028","volume":"540","author":"I Mustafa","year":"2020","unstructured":"Mustafa I, Abbas Z, Arif A, Javed T, Ghaffari A (2020) Stability analysis for multiple solutions of boundary layer flow towards a shrinking sheet: analytical solution by using least square method. Physica A-StatisticMechan Applications 540:123028. https:\/\/doi.org\/10.1016\/j.physa.2019.123028","journal-title":"Physica A-StatisticMechan Applications"},{"doi-asserted-by":"publisher","unstructured":"Qian Q, Wang H, Shi C, Wang H (2016) An efficient content authentication scheme in encrypted speech based on integer wavelet transform. In 2016 Asia-Pacific signal and information processing association annual summit and conference (APSIPA). IEEE 1\u20138. https:\/\/doi.org\/10.1109\/APSIPA.2016.7820814","key":"10905_CR22","DOI":"10.1109\/APSIPA.2016.7820814"},{"issue":"21","key":"10905_CR23","doi-asserted-by":"publisher","first-page":"13431","DOI":"10.1007\/s11042-015-2801-4","volume":"75","author":"Q Qian","year":"2016","unstructured":"Qian Q, Wang HX, Hu Y, Zhou LN, Li JF (2016) A dual fragile watermarking scheme for speech authentication. Multimed Tools Appl 75(21):13431\u201313450. https:\/\/doi.org\/10.1007\/s11042-015-2801-4","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10905_CR24","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11235-017-0360-x","volume":"67","author":"Q Qian","year":"2018","unstructured":"Qian Q, Wang HX, Sun XM, Cui YH, Wang H, Shi CH (2018) Speech authentication and content recovery scheme for security communication and storage. Telecommun Syst 67(4):635\u2013649. https:\/\/doi.org\/10.1007\/s11235-017-0360-x","journal-title":"Telecommun Syst"},{"issue":"12","key":"10905_CR25","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/ICICT.2005.1598556","volume":"4","author":"SD Rihan","year":"2015","unstructured":"Rihan SD, Khalid A, Osman SEF (2015) A performance comparison of encryption algorithms AES and DES. Int J Eng Res Technol (IJERT) 4(12):151\u2013154. https:\/\/doi.org\/10.1109\/ICICT.2005.1598556","journal-title":"Int J Eng Res Technol (IJERT)"},{"key":"10905_CR26","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.compeleceng.2018.04.018","volume":"68","author":"HI Shahadi","year":"2018","unstructured":"Shahadi HI (2018) Covert communication model for speech signals based on an indirect and adaptive encryption technique. Comput Electric Eng 68:425\u2013436. https:\/\/doi.org\/10.1016\/j.compeleceng.2018.04.018","journal-title":"Comput Electric Eng"},{"doi-asserted-by":"publisher","unstructured":"Sheela SJ, Suresh KV, Tandur D (2017) Chaos based speech encryption using modified Henon map. In 2017 second international conference on electrical, computer and communication technologies (ICECCT). 2017 international conference on. IEEE 1-7. https:\/\/doi.org\/10.1109\/ICECCT.2017.8117918","key":"10905_CR27","DOI":"10.1109\/ICECCT.2017.8117918"},{"key":"10905_CR28","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-981-13-0344-9_14","volume-title":"Speech forensics based on sample correlation degree. Advances in computer communication and computational sciences","author":"F Sun","year":"2019","unstructured":"Sun F, Li Y, Liu Z, Qi C (2019) Speech forensics based on sample correlation degree. Advances in computer communication and computational sciences. Springer, Singapore, pp 173\u2013183. https:\/\/doi.org\/10.1007\/978-981-13-0344-9_14"},{"issue":"5","key":"10905_CR29","doi-asserted-by":"publisher","first-page":"40","DOI":"10.16311\/j.audioe.2016.05.09","volume":"40","author":"W Wang","year":"2016","unstructured":"Wang W, Hu GM, Yang L, Huang DF, Zhou Y (2016) Research of endpoint detection based on spectral subtraction and uniform sub-band spectrum variance. Audio Eng 40(5):40\u201343. https:\/\/doi.org\/10.16311\/j.audioe.2016.05.09","journal-title":"Audio Eng"},{"issue":"2","key":"10905_CR30","doi-asserted-by":"publisher","first-page":"83","DOI":"10.13190\/j.jbupt.2018-228","volume":"42","author":"XZ Wu","year":"2019","unstructured":"Wu XZ, Xia LX, Zhang X, Zhou C (2019) Voice activity detection method based on MFPH. J Beijing Univ Posts Telecommun 42(2):83\u201389. https:\/\/doi.org\/10.13190\/j.jbupt.2018-228","journal-title":"J Beijing Univ Posts Telecommun"},{"issue":"1","key":"10905_CR31","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1049\/iet-ifs.2017.0092","volume":"12","author":"S Xiang","year":"2017","unstructured":"Xiang S, He J (2017) Database authentication watermarking scheme in encrypted domain. IET Inf Secur 12(1):42\u201351. https:\/\/doi.org\/10.1049\/iet-ifs.2017.0092","journal-title":"IET Inf Secur"},{"issue":"14","key":"10905_CR32","doi-asserted-by":"publisher","first-page":"17937","DOI":"10.1007\/s11042-017-5505-0","volume":"77","author":"WX Yang","year":"2018","unstructured":"Yang WX, Tang SY, Li MQ, Zhou BB, Jiang YJ (2018) Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates. Multimed Tools Appl 77(14):17937\u201317952. https:\/\/doi.org\/10.1007\/s11042-017-5505-0","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10905_CR33","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.1007\/s11042-017-4381-y","volume":"77","author":"QY Zhang","year":"2018","unstructured":"Zhang QY, Hu WJ, Huang YB, Qiao SB (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77(2):1555\u20131581. https:\/\/doi.org\/10.1007\/s11042-017-4381-y","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"publisher","unstructured":"Zhang QY, Zhou L, Zhang T, Zhang DH (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78(13):17825\u201317846. https:\/\/doi.org\/10.1007\/s11042-019-7180-9","key":"10905_CR34","DOI":"10.1007\/s11042-019-7180-9"},{"doi-asserted-by":"crossref","unstructured":"Zhao H, He SF (2016) A retrieval algorithm for encrypted speech based on perceptual hashing. In IEEE 2016 natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD). IEEE 1840-1845. 10.1109 \/ FSKD.2016.7603458","key":"10905_CR35","DOI":"10.1109\/FSKD.2016.7603458"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10905-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10905-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10905-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T04:20:54Z","timestamp":1625458854000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10905-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,12]]},"references-count":35,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10905"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10905-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,4,12]]},"assertion":[{"value":"27 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}