{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:59:57Z","timestamp":1761897597615,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"25","license":[{"start":{"date-parts":[[2021,8,21]],"date-time":"2021-08-21T00:00:00Z","timestamp":1629504000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,21]],"date-time":"2021-08-21T00:00:00Z","timestamp":1629504000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61862041"],"award-info":[{"award-number":["No.61862041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005229","name":"Youth Science and Technology Foundation of Gansu Province","doi-asserted-by":"crossref","award":["No.1606RJYA274"],"award-info":[{"award-number":["No.1606RJYA274"]}],"id":[{"id":"10.13039\/501100005229","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11042-021-11412-y","type":"journal-article","created":{"date-parts":[[2021,8,21]],"date-time":"2021-08-21T21:02:39Z","timestamp":1629579759000},"page":"33615-33640","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A high security BioHashing encrypted speech retrieval algorithm based on feature fusion"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1667-3114","authenticated-orcid":false,"given":"Yi-bo","family":"Huang","sequence":"first","affiliation":[]},{"given":"Hao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yi-rong","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Qiu-yu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,21]]},"reference":[{"issue":"3","key":"11412_CR1","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1049\/iet-ipr.2018.5288","volume":"13","author":"P Aparna","year":"2019","unstructured":"Aparna P, Kishore PVV (2019) Biometric-based efficient medical image watermarking in e-healthcare application. IET Image Proc 13(3):421\u2013428","journal-title":"IET Image Proc"},{"doi-asserted-by":"crossref","unstructured":"Alweshah M, Al\u00a0Khalaileh S, Gupta BB, Almomani A, Hammouri AI, Azmi Al-Betar MA (2020) The monarch butterfly optimization algorithm for solving feature selection problems. Neural Comput Applic\u00a0pages 1\u201315","key":"11412_CR2","DOI":"10.1007\/s00521-020-05210-0"},{"doi-asserted-by":"crossref","unstructured":"Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019)\u00a0Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl\u00a078(3):3649\u20133688","key":"11412_CR3","DOI":"10.1007\/s11042-017-5537-5"},{"doi-asserted-by":"crossref","unstructured":"AlZu\u2019bi S, Shehab M, Al-Ayyoub M, Jararweh Y, Gupta B (2020)\u00a0Parallel implementation for 3d medical volume fuzzy segmentation. Pattern Recognit Lett\u00a0130:312\u2013318","key":"11412_CR4","DOI":"10.1016\/j.patrec.2018.07.026"},{"unstructured":"Bai\u00a0A Liang, Jiye\u00a0Liang A, and Fuyuan\u00a0Cao B (2020) A multiple k -means clustering ensemble algorithm to find nonlinearly separable clusters. Inf Fusion\u00a061:36\u201347","key":"11412_CR5"},{"doi-asserted-by":"crossref","unstructured":"Chen D, Zhang W, Zhang Z, Huang W, Ao J (2017) Audio retrieval based on wavelet transform. In 2017 IEEE\/ACIS 16th Int Conf Comput Inf Sci (ICIS)\u00a0531\u2013534. IEEE","key":"11412_CR6","DOI":"10.1109\/ICIS.2017.7960049"},{"doi-asserted-by":"crossref","unstructured":"Das D (2020) A minutia detection approach from direct gray-scale fingerprint image using hit-or-miss transformation. In Comput Intell Pattern Recognit\u00a0195\u2013206. Springer","key":"11412_CR7","DOI":"10.1007\/978-981-13-9042-5_17"},{"doi-asserted-by":"crossref","unstructured":"Glackin C, Chollet G, Dugan N, Cannings N, Wall J, Tahir S, Ray IG, Rajarajan M (2017)\u00a0Privacy preserving encrypted phonetic search of speech data. In IEEE International Conference on Acoustics\u00a0pages 6414\u20136418. IEEE","key":"11412_CR8","DOI":"10.1109\/ICASSP.2017.7953391"},{"issue":"3","key":"11412_CR9","first-page":"709","volume":"14","author":"K Harkeerat","year":"2018","unstructured":"Harkeerat K, Pritee K (2018) Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Trans Inf Forensics Secur 14(3):709\u2013719","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"11412_CR10","doi-asserted-by":"publisher","first-page":"703","DOI":"10.2298\/CSIS170112024H","volume":"14","author":"S He","year":"2017","unstructured":"He S, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inf Syst 14(3):703\u2013718","journal-title":"Comput Sci Inf Syst"},{"key":"11412_CR11","doi-asserted-by":"publisher","first-page":"34140","DOI":"10.1109\/ACCESS.2020.2974029","volume":"8","author":"Y Huang","year":"2020","unstructured":"Huang Y, Hou H, Wang Y, Zhang Y, Fan M (2020) A long sequence speech perceptual hashing authentication algorithm based on constant q transform and tensor decomposition. IEEE Access 8:34140\u201334152","journal-title":"IEEE Access"},{"issue":"33","key":"11412_CR12","doi-asserted-by":"publisher","first-page":"24889","DOI":"10.1007\/s11042-020-09211-y","volume":"79","author":"YB Huang","year":"2020","unstructured":"Huang YB, Wang Y, Zhang QY, Zhang WZ, Fan MH (2020) Multi-format speech biohashing based on spectrogram. Multimed Tools Appl 79(33):24889\u201324909","journal-title":"Multimed Tools Appl"},{"issue":"21","key":"11412_CR13","doi-asserted-by":"publisher","first-page":"30011","DOI":"10.1007\/s11042-018-6802-y","volume":"78","author":"Y Jiang","year":"2019","unstructured":"Jiang Y, Chunxue W, Deng K, Yan W (2019) An audio fingerprinting extraction algorithm based on lifting wavelet packet and improved optimal-basis selection. Multimed Tools Appl 78(21):30011\u201330025","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"crossref","unstructured":"Karst SM, Dueholm MS, McIlroy SJ, Kirkegaard RH, Nielsen PH, Albertsen M (2018) Retrieval of a million high-quality, full-length microbial 16s and 18s rrna gene sequences without primer bias. Nat Biotechnol\u00a036(2):190","key":"11412_CR14","DOI":"10.1038\/nbt.4045"},{"doi-asserted-by":"crossref","unstructured":"Kashif M, Raja G, Shaukat F (2020) An efficient content-based image retrieval system for the diagnosis of lung diseases. J Digit Imaging 33(2)","key":"11412_CR15","DOI":"10.1007\/s10278-020-00338-w"},{"doi-asserted-by":"crossref","unstructured":"Liao X, Li K, Zhu X, Liu KR (2020) Robust detection of image operator chain with two-stream convolutional neural network.\u00a0IEEE J Sel\u00a0Top Sign Proces\u00a014(5):955\u2013968","key":"11412_CR16","DOI":"10.1109\/JSTSP.2020.3002391"},{"doi-asserted-by":"crossref","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput\u00a0PP(99):1\u20131","key":"11412_CR17","DOI":"10.1109\/TDSC.2020.3004708"},{"key":"11412_CR18","doi-asserted-by":"publisher","first-page":"105995","DOI":"10.1016\/j.asoc.2019.105995","volume":"87","author":"Lin CY","year":"2019","unstructured":"Lin CY (2019) A reversible privacy-preserving clustering technique based on k-means algorithm. Appl Soft Comput 87","journal-title":"Appl Soft Comput"},{"issue":"1","key":"11412_CR19","first-page":"1","volume":"8","author":"D Li","year":"2018","unstructured":"Li D, Yang YG, Bi JL, Yuan JB, Xu J (2018) Controlled alternate quantum walks based quantum hash function. Sci Rep 8(1):1\u20137","journal-title":"Sci Rep"},{"doi-asserted-by":"crossref","unstructured":"Li X, Peng J, Obaidat MS, Wu F, Khan MK, Chen C (2020) A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst J\u00a014(1):39\u201350","key":"11412_CR20","DOI":"10.1109\/JSYST.2019.2899580"},{"key":"11412_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00357-020-09365-2","volume":"37","author":"V Melnykov","year":"2020","unstructured":"Melnykov V, Michael S (2020) Clustering large datasets by merging k-means solutions. J Classif 37:1\u201327","journal-title":"J Classif"},{"doi-asserted-by":"crossref","unstructured":"Murthy YS, Koolagudi SG (2018) Content-based music information retrieval (cb-mir) and its applications toward the music industry: A review. ACM Comput Surv (CSUR)\u00a051(3):1\u201346","key":"11412_CR22","DOI":"10.1145\/3177849"},{"doi-asserted-by":"crossref","unstructured":"Nayak S, Panda M, Palai G (2020) Realization of optical adder circuit using photonic structure and knn algorithm. Optik\u00a0212:164675","key":"11412_CR23","DOI":"10.1016\/j.ijleo.2020.164675"},{"doi-asserted-by":"crossref","unstructured":"Pradhan J, Ajad A, Pal AK, Banka H (2020)\u00a0Multi-level colored directional motif histograms for content-based image retrieval. Vis Comput\u00a036(9):1847\u20131868","key":"11412_CR24","DOI":"10.1007\/s00371-019-01773-9"},{"doi-asserted-by":"crossref","unstructured":"Palma D, Blanchini F, Giordano G, Montessoro PL (2020) A dynamic biometric authentication algorithm for near-infrared palm vascular patterns. IEEE Access\u00a08:118978\u2013118988","key":"11412_CR25","DOI":"10.1109\/ACCESS.2020.3005460"},{"issue":"2","key":"11412_CR26","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1007\/s11042-018-6258-0","volume":"78","author":"A Revathi","year":"2019","unstructured":"Revathi A, Jeyalakshmi C, Thenmozhi K (2019) Person authentication using speech as a biometric against play back attacks. Multimed Tools Appl 78(2):1569\u20131582","journal-title":"Multimed Tools Appl"},{"unstructured":"Revathi B, Sudha GF (2018)\u00a0Retrieval performance analysis of multibiometric database using optimised multidimensional spectral hashing based indexing. J King Saud Univ Comput Inf Sci\u00a0pages 1319\u20131578","key":"11412_CR27"},{"issue":"13","key":"11412_CR28","doi-asserted-by":"publisher","first-page":"18339","DOI":"10.1007\/s11042-019-7208-1","volume":"78","author":"N Sasikaladevi","year":"2019","unstructured":"Sasikaladevi N, Geetha K, Revathi A, Mahalakshmi N, Archana N (2019) Scan-speech biometric template protection based on genus-2 hyper elliptic curve. Multimed Tools Appl 78(13):18339\u201318361","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"crossref","unstructured":"Shen Y, Feng Y, Fang B, Zhou M, Kwong S, Qiang BH (2020) DSRPH: Deep semantic-aware ranking preserving hashing for efficient multi-label image retrieval. Inf Sci\u00a0539:145\u2013156","key":"11412_CR29","DOI":"10.1016\/j.ins.2020.05.114"},{"issue":"15","key":"11412_CR30","doi-asserted-by":"publisher","first-page":"6309","DOI":"10.1109\/JSEN.2019.2892443","volume":"19","author":"X Song","year":"2019","unstructured":"Song X, Wang M, Qiu H, Li K, Ang C (2019) Auditory scene analysis-based feature extraction for indoor subarea localization using smartphones. IEEE Sens J 19(15):6309\u20136316","journal-title":"IEEE Sens J"},{"doi-asserted-by":"crossref","unstructured":"Song J (2020) Binary generative adversarial networks for image retrieval. Int J Comput Vis\u00a0pages 1\u201322","key":"11412_CR31","DOI":"10.1007\/978-981-33-6048-8_1"},{"issue":"3","key":"11412_CR32","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1093\/comjnl\/bxz047","volume":"63","author":"A Wadood","year":"2020","unstructured":"Wadood A, Ohoud N, Sanaa G (2020) Combining watermarking and hyper-chaotic map to enhance the security of stored biometric templates. Comput J 63(3):479\u2013493","journal-title":"Comput J"},{"issue":"1","key":"11412_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-018-36543-5","volume":"9","author":"J Walln\u00f6fer","year":"2019","unstructured":"Walln\u00f6fer J, Pirker A, Zwerger M, D\u00fcr W (2019) Multipartite state generation in quantum networks with optimal scaling. Sci Rep 9(1):1\u201318","journal-title":"Sci Rep"},{"issue":"8","key":"11412_CR34","doi-asserted-by":"publisher","first-page":"085206","DOI":"10.1088\/1402-4896\/ab0033","volume":"94","author":"F Yang","year":"2019","unstructured":"Yang F, Mou J, Luo C, Cao Y (2019) An improved color image encryption scheme and cryptanalysis based on hyperchaotic sequence. Phys Scr 94(8)","journal-title":"Phys Scr"},{"doi-asserted-by":"crossref","unstructured":"Yu C, Li J, Li X, Ren X, Gupta BB (2018)\u00a0Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl\u00a077(4):4585\u20134608","key":"11412_CR35","DOI":"10.1007\/s11042-017-4637-6"},{"unstructured":"Zhang QY, Ge ZX, Qiao SB (2018)\u00a0An efficient retrieval method of encrypted speech based on frequency band variance. 9. Ubiquitous International","key":"11412_CR36"},{"doi-asserted-by":"crossref","unstructured":"Zhang QY, Zhou L, Zhang T, Zhang DH (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl\u00a078(13):17825\u201317846","key":"11412_CR37","DOI":"10.1007\/s11042-019-7180-9"},{"doi-asserted-by":"crossref","unstructured":"Zhang Q, Ge Z, Zhou L, Zhang Y (2019) An efficient retrieval algorithm of encrypted speech based on inverse fast fourier transform and measurement matrix. Turk J Electr Eng Comput Sci\u00a027(3):1719\u20131736","key":"11412_CR38","DOI":"10.3906\/elk-1808-161"},{"doi-asserted-by":"crossref","unstructured":"Zhang QY, Ge ZX, Hu YJ, Bai J, Huang YB (2020)\u00a0An encrypted speech retrieval algorithm based on chirp-z transform and perceptual hashing second feature extraction. Multimed Tools Appl\u00a079(9):6337\u20136361","key":"11412_CR39","DOI":"10.1007\/s11042-019-08450-y"},{"issue":"39","key":"11412_CR40","doi-asserted-by":"publisher","first-page":"29775","DOI":"10.1007\/s11042-020-09446-9","volume":"79","author":"QY Zhang","year":"2020","unstructured":"Zhang QY, Li GL, Huang YB (2020) An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction. Multimed Tools Appl 79(39):29775\u201329798","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"11412_CR41","doi-asserted-by":"publisher","first-page":"3677","DOI":"10.1007\/s11042-017-5219-3","volume":"77","author":"F Zou","year":"2018","unstructured":"Zou F, Tang X, Li K, Wang Y, Song J, Yang S, Ling H (2018) Hidden semantic hashing for fast retrieval over large scale document collection. Multimed Tools Appl 77(3):3677\u20133697","journal-title":"Multimed Tools Appl"},{"issue":"29","key":"11412_CR42","doi-asserted-by":"publisher","first-page":"2050327","DOI":"10.1142\/S0217984920503273","volume":"34","author":"L Zhou","year":"2020","unstructured":"Zhou L, Zhao Z, Chen F (2020) Stability and hopf bifurcation analysis of a new four-dimensional hyper-chaotic system. Mod Phys Lett B 34(29):2050327","journal-title":"Mod Phys Lett B"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11412-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11412-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11412-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,21]],"date-time":"2021-10-21T21:05:34Z","timestamp":1634850334000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11412-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,21]]},"references-count":42,"journal-issue":{"issue":"25","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["11412"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11412-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,8,21]]},"assertion":[{"value":"24 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}