{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:29:13Z","timestamp":1740122953673,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T00:00:00Z","timestamp":1636329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T00:00:00Z","timestamp":1636329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862041"],"award-info":[{"award-number":["61862041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Youth Science and Technology Fund of Gansu Province of China","award":["1606RJYA274"],"award-info":[{"award-number":["1606RJYA274"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11042-021-11708-z","type":"journal-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T13:02:37Z","timestamp":1636376557000},"page":"2873-2899","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Long sequence biometric hashing authentication based on 2D-SIMM and CQCC cosine values"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1667-3114","authenticated-orcid":false,"given":"Yi-bo","family":"Huang","sequence":"first","affiliation":[]},{"given":"Hexiang","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Tengfei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qiu-yu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,8]]},"reference":[{"key":"11708_CR1","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1109\/TIFS.2020.2971142","volume":"15","author":"SM Abdullahi","year":"2020","unstructured":"Abdullahi SM, Wang H, Li T (2020) Fractal coding-based robust and alignment-free fingerprint image hashing. IEEE Trans Inf Forensics Secur 15:2587\u20132601","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11708_CR2","first-page":"42","volume":"15","author":"G Anjith","year":"2019","unstructured":"Anjith G, Zohreh M, David G, Olegs N, Andr\u00e9 A, S\u00e9bastien M (2019) Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans Inf Forensics Secur 15:42\u201355","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11708_CR3","doi-asserted-by":"crossref","unstructured":"Atighehchi K, Ghammam L, Barbier M, Rosenberger C (2019) Greychashing: combining biometrics and secret for enhancing the security of protected templates. Futur Gener Comput Syst","DOI":"10.1016\/j.future.2019.07.022"},{"key":"11708_CR4","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.sysarc.2018.05.010","volume":"88","author":"Ons Boujelben","year":"2018","unstructured":"Boujelben Ons, Bahoura Mohammed (2018) Efficient fpga-based architecture of an automatic wheeze detector using a combination of mfcc and svm algorithms. J Syst Archit 88:54\u201364","journal-title":"J Syst Archit"},{"issue":"3","key":"11708_CR5","doi-asserted-by":"publisher","first-page":"2073","DOI":"10.1007\/s11277-017-3958-0","volume":"95","author":"Danyang Cao","year":"2017","unstructured":"Cao D, Gao X, Gao L (2017) An improved endpoint detection algorithm based on mfcc cosine value. Wirel Pers Commun 95(3):2073\u20132090","journal-title":"Wirel Pers Commun"},{"issue":"99","key":"11708_CR6","first-page":"1","volume":"PP","author":"D Chang","year":"2020","unstructured":"Chang D, Garg S, Hasan M, Mishra S (2020) Cancelable multi-biometric approach using fuzzy extractor and novel bit-wise encryption. IEEE Trans Inform Forensics Secur PP(99):1\u20131","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"11708_CR7","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.sigpro.2018.09.013","volume":"154","author":"Yanzhi Chen","year":"2019","unstructured":"Chen Y, Wo Y, Xie R, Chudan W, Han G (2019) Deep secure quantization: On secure biometric hashing against similarity-based attacks. Signal Process 154:314\u2013323","journal-title":"Signal Process"},{"key":"11708_CR8","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.neunet.2020.06.015","volume":"130","author":"Muqing Deng","year":"2020","unstructured":"Deng M, Meng T, Cao J, Wang S, Zhang J, Fan H (2020) Heart sound classification based on improved mfcc features and convolutional recurrent neural networks. Neural Netw 130:22\u201332","journal-title":"Neural Netw"},{"issue":"12","key":"11708_CR9","doi-asserted-by":"publisher","first-page":"3140","DOI":"10.1109\/TIFS.2019.2912552","volume":"14","author":"Z Dexing","year":"2019","unstructured":"Dexing Z, Huikai S, Du X (2019) A hand-based multi-biometrics via deep hashing network and biometric graph matching. IEEE Trans Inform Forensics Secur 14(12):3140\u20133150","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"11708_CR10","doi-asserted-by":"crossref","unstructured":"Gomez-Barrero M, Fierrez J, Galbally J, Maiorana E, Campisi P (2016) Implementation of fixed-length template protection based on homomorphic encryption with application to signature biometrics. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 191\u2013198","DOI":"10.1109\/CVPRW.2016.39"},{"issue":"5","key":"11708_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijmecs.2019.05.01","volume":"11","author":"MH Hamd","year":"2019","unstructured":"Hamd MH, Mohammed MY (2019) Multimodal biometric system based face-iris feature level fusion. Int J Mod Educ Comput Sci 11(5):1\u20139","journal-title":"Int J Mod Educ Comput Sci"},{"key":"11708_CR12","unstructured":"Huang Y-B, Zhang Q-Y, Yuan Z-T, Yang Z-P (2015) The hash algorithm of speech perception based on the integration of adaptive mfcc and lpcc. J Huazhong Univ Sci Technol (Natural Science Edition) (in Chinese) (02):124\u2013128"},{"issue":"33","key":"11708_CR13","doi-asserted-by":"publisher","first-page":"24889","DOI":"10.1007\/s11042-020-09211-y","volume":"79","author":"Yi-bo Huang","year":"2020","unstructured":"Huang Yi-bo, Wang Yong, Zhang Qiu-yu, Zhang Wei-zhao, Fan Man-hong (2020) Multi-format speech biohashing based on spectrogram. Multimed Tools Appl 79(33):24889\u201324909","journal-title":"Multimed Tools Appl"},{"key":"11708_CR14","doi-asserted-by":"crossref","unstructured":"Jami SK, Chalamala SR, Jindal AK (2019) Biometric template protection through adversarial learning. In: 2019 IEEE international conference on consumer electronics (ICCE). IEEE, pp 1\u20136","DOI":"10.1109\/ICCE.2019.8661905"},{"issue":"21","key":"11708_CR15","doi-asserted-by":"publisher","first-page":"30011","DOI":"10.1007\/s11042-018-6802-y","volume":"78","author":"Yuantao Jiang","year":"2019","unstructured":"Jiang Y, Chunxue W, Deng K, Yan W (2019) An audio fingerprinting extraction algorithm based on lifting wavelet packet and improved optimal-basis selection. Multimed Tools Appl 78(21):30011\u201330025","journal-title":"Multimed Tools Appl"},{"key":"11708_CR16","first-page":"89","volume":"02","author":"L Jin-feng","year":"2015","unstructured":"Jin-feng L, Wu T, Hong-xia W (2015) Perceptual hashing based on correlation coefficient of mfcc for speech authentication. J Beijing Univ Posts Telecommun 02:89\u201393","journal-title":"J Beijing Univ Posts Telecommun"},{"key":"11708_CR17","first-page":"579","volume":"03","author":"L Jin-feng","year":"2015","unstructured":"Jin-feng L, Wu T, Hong-xia W (2015) Perceptual hashing based on nmf and mdct coefficients. Chin J Electron (in Chinese) 03:579\u2013583","journal-title":"Chin J Electron (in Chinese)"},{"key":"11708_CR18","doi-asserted-by":"crossref","unstructured":"Khurshid M, Selwal A (2020) A novel block hashing-based template security scheme for multimodal biometric system. In: Decision analytics applications in industry. Springer, pp 173\u2013183","DOI":"10.1007\/978-981-15-3643-4_12"},{"issue":"1","key":"11708_CR19","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s10586-015-0523-z","volume":"19","author":"H-G Kim","year":"2016","unstructured":"Kim H-G, Cho H-S, Kim JY (2016) Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. Clust Comput 19(1):315\u2013323","journal-title":"Clust Comput"},{"key":"11708_CR20","doi-asserted-by":"crossref","unstructured":"Li H, Qiu J, Teoh ABJ (2020) Palmprint template protection scheme based on randomized cuckoo hashing and minhash. Multimed Tools Appl: 1\u201325","DOI":"10.1007\/s11042-019-08446-8"},{"key":"11708_CR21","unstructured":"Lifang W, Yukun M, Peng Z, Weishi Z (2016) Review of biometric template protection. Chin J Entific Instrum"},{"key":"11708_CR22","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"Wenhao Liu","year":"2016","unstructured":"Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"key":"11708_CR23","doi-asserted-by":"crossref","unstructured":"Nguyen TAT, Dang TK, Nguyen DT (2019) A new biometric template protection using random orthonormal projection and fuzzy commitment. In International Conference on Ubiquitous Information Management and Communication, pages 723\u2013733. Springer","DOI":"10.1007\/978-3-030-19063-7_58"},{"issue":"3","key":"11708_CR24","first-page":"2363","volume":"79","author":"K Nitin","year":"2020","unstructured":"Nitin K, Manisha R (2020) Rp-lpp: a random permutation based locality preserving projection for cancelable biometric recognition. Multimed Tools Appl 79(3):2363\u20132381","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"11708_CR25","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.1007\/s11042-017-4381-y","volume":"77","author":"Z Qiu-Yu","year":"2018","unstructured":"Qiu-Yu Z, Hu W-J, Yi-bo H, Si-bin Q (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77(2):1555\u20131581","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"11708_CR26","doi-asserted-by":"publisher","first-page":"17825","DOI":"10.1007\/s11042-019-7180-9","volume":"78","author":"Z Qiu-yu","year":"2019","unstructured":"Qiu-yu Z, Liang Z, Tao Z, Deng-hai Z (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78(13):17825\u201317846","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"11708_CR27","first-page":"311","volume":"6","author":"Z Qiu-Yu","year":"2015","unstructured":"Qiu-Yu Z, Peng-Fei X, Yi-Bo H, Rui-Hong D, Zhong-Ping Y (2015) An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition. J Inf Hiding Multimed Signal Process 6(2):311\u2013322","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"16","key":"11708_CR28","doi-asserted-by":"publisher","first-page":"21653","DOI":"10.1007\/s11042-018-5613-5","volume":"77","author":"Z Qiu-yu","year":"2018","unstructured":"Qiu-yu Z, Si-bin Q, Yi-bo H, Tao Z (2018) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimed Tools Appl 77(16):21653\u201321669","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"11708_CR29","first-page":"259","volume":"21","author":"Z Qiu-Yu","year":"2019","unstructured":"Qiu-Yu Z, Tao Z, Si-Bin Q, Wu D-F (2019) Spectrogram-based efficient perceptual hashing scheme for speech identification. IJ Netw Secur 21(2):259\u2013268","journal-title":"IJ Netw Secur"},{"issue":"15","key":"11708_CR30","doi-asserted-by":"publisher","first-page":"9145","DOI":"10.1007\/s11042-015-3081-8","volume":"75","author":"Chahid Ouali","year":"2016","unstructured":"Ouali C, Dumouchel P, Gupta V (2016) A spectrogram-based audio fingerprinting system for content-based copy detection. Multimed Tools Appl 75(15):9145\u20139165","journal-title":"Multimed Tools Appl"},{"key":"11708_CR31","doi-asserted-by":"crossref","unstructured":"Shao H, Zhong D, Du X (2020) Towards efficient unconstrained palmprint recognition via deep distillation hashing. arXiv preprint arXiv:2004.03303","DOI":"10.1109\/CVPRW.2019.00098"},{"key":"11708_CR32","doi-asserted-by":"crossref","unstructured":"Sandhya M, Prasad MVNK (2017) Biometric template protection: a systematic literature review of approaches and modalities. In: Biometric security and privacy. Springer, pp 323\u2013370","DOI":"10.1007\/978-3-319-47301-7_14"},{"issue":"3","key":"11708_CR33","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/TASLP.2015.2509248","volume":"24","author":"Reinhard Sonnleitner","year":"2015","unstructured":"Sonnleitner R, Widmer G (2015) Robust quad-based audio fingerprinting. IEEE\/ACM Trans Audio Speech Language Process 24(3):409\u2013421","journal-title":"IEEE\/ACM Trans Audio Speech Language Process"},{"key":"11708_CR34","doi-asserted-by":"crossref","unstructured":"Tak H, Patino J, Nautsch A, Evans N, Todisco M (2020) An explainability study of the constant q cepstral coefficient spoofing countermeasure for automatic speaker verification. arXiv preprint arXiv:2004.06422","DOI":"10.21437\/Odyssey.2020-47"},{"issue":"2","key":"11708_CR35","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1080\/09720529.2019.1582867","volume":"22","author":"J Vanita","year":"2019","unstructured":"Vanita J, Gopal C, Nalin L, Akshit R, Shlok W (2019) Dynamic handwritten signature and machine learning based identity verification for keyless cryptocurrency transactions. J Discrete Math Sci Cryptogr 22(2):191\u2013202","journal-title":"J Discrete Math Sci Cryptogr"},{"key":"11708_CR36","doi-asserted-by":"crossref","unstructured":"Wen-Sheng C, Haitao C, Binbin P, Bo\u00a0C (2019) Robust nonnegative matrix factorization based on cosine similarity induced metric. In International Conference on Intelligent Science and Big Data Engineering, pages 278\u2013288. Springer, 2019","DOI":"10.1007\/978-3-030-36204-1_23"},{"key":"11708_CR37","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.dsp.2019.02.018","volume":"89","author":"Jichen Yang and Rohan Kumar Das","year":"2019","unstructured":"Jichen Y, Rohan KD (2019) Low frequency frame-wise normalization over constant-q transform for playback speech detection. Digit Signal Process 89:30\u201339","journal-title":"Digit Signal Process"},{"key":"11708_CR38","unstructured":"Zhang Q-Y, Qiao S-B, Zhang T, Huang Y-B (2017) Multi-format audio perception hashing algorithms based on zero ratio. J Huazhong Univ Sci Technol (Natural Science Edition) (in Chinese) 45(6):33\u201338"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11708-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11708-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11708-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T09:32:55Z","timestamp":1643448775000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11708-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,8]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["11708"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11708-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,11,8]]},"assertion":[{"value":"18 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}