{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:20Z","timestamp":1740122840175,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T00:00:00Z","timestamp":1645920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T00:00:00Z","timestamp":1645920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862041,61363078"],"award-info":[{"award-number":["61862041,61363078"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11042-022-12560-5","type":"journal-article","created":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T04:17:20Z","timestamp":1645935440000},"page":"15127-15151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1488-388X","authenticated-orcid":false,"given":"Qiu-yu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jian","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Fu-jiu","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,27]]},"reference":[{"issue":"20","key":"12560_CR1","doi-asserted-by":"publisher","first-page":"6935","DOI":"10.1049\/joe.2019.0535","volume":"2019","author":"RSAR Abdullah","year":"2019","unstructured":"Abdullah RSAR, Saleh NL, Ahmad SMS, Salah AA, Rashid NE (2019) Ambiguity function analysis of human echolocator waveform by using Gammatone filter processing. J Eng 2019(20):6935\u20136939. https:\/\/doi.org\/10.1049\/joe.2019.0535","journal-title":"J Eng"},{"doi-asserted-by":"publisher","unstructured":"Alasadi AA, Deshmukh RR, Waghmare SD (2019) Review of Modgdf & PNCC techniques for features extraction in speech recognition. In 2019 IEEE international conference on electrical, computer and communication technologies (ICECCT). IEEE 1-7. https:\/\/doi.org\/10.1109\/ICECCT.2019.8869154","key":"12560_CR2","DOI":"10.1109\/ICECCT.2019.8869154"},{"key":"12560_CR3","doi-asserted-by":"publisher","first-page":"15494","DOI":"10.1109\/ACCESS.2018.2805845","volume":"6","author":"Z Ali","year":"2018","unstructured":"Ali Z, Talha M (2018) Innovative method for unsupervised voice activity detection and classification of audio segments. IEEE Access 6:15494\u201315504. https:\/\/doi.org\/10.1109\/ACCESS.2018.2805845","journal-title":"IEEE Access"},{"issue":"1","key":"12560_CR4","doi-asserted-by":"publisher","first-page":"86","DOI":"10.19665\/j.issn1001-2400.2019.01.014","volume":"46","author":"J Bai","year":"2019","unstructured":"Bai J, Shi YY, Xue PY, Guo QY (2019) CFCC feature extraction for fusion of the power-law nonlinearity function and spectral subtraction. J Xidian Univ 46(1):86\u201392. https:\/\/doi.org\/10.19665\/j.issn1001-2400.2019.01.014","journal-title":"J Xidian Univ"},{"issue":"6","key":"12560_CR5","doi-asserted-by":"publisher","first-page":"2301","DOI":"10.1007\/s12652-018-0828-x","volume":"10","author":"M Dua","year":"2019","unstructured":"Dua M, Aggarwal RK, Biswas M (2019) GFCC based discriminatively trained noise robust continuous ASR system for Hindi language. J Ambient Intell Humaniz Comput 10(6):2301\u20132314. https:\/\/doi.org\/10.1007\/s12652-018-0828-x","journal-title":"J Ambient Intell Humaniz Comput"},{"doi-asserted-by":"publisher","unstructured":"Elzaher MFA, Shalaby M, El Ramly SH (2016) An Arnold cat map-based chaotic approach for securing voice communication. In proceedings of the 10th international conference on informatics and systems. ACM 329-331. https:\/\/doi.org\/10.1145\/2908446.2908508","key":"12560_CR6","DOI":"10.1145\/2908446.2908508"},{"issue":"3","key":"12560_CR7","doi-asserted-by":"publisher","first-page":"703","DOI":"10.2298\/CSIS170112024H","volume":"14","author":"SF He","year":"2017","unstructured":"He SF, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inf Syst 14(3):703\u2013718. https:\/\/doi.org\/10.2298\/CSIS170112024H","journal-title":"Comput Sci Inf Syst"},{"issue":"2","key":"12560_CR8","doi-asserted-by":"publisher","first-page":"27","DOI":"10.4018\/IJCAC.2017040103","volume":"7","author":"M Ibtihal","year":"2017","unstructured":"Ibtihal M, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput 7(2):27\u201340. https:\/\/doi.org\/10.4018\/IJCAC.2017040103","journal-title":"Int J Cloud Appl Comput"},{"issue":"7","key":"12560_CR9","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1109\/TASLP.2016.2545928","volume":"24","author":"C Kim","year":"2016","unstructured":"Kim C, Stern RM (2016) Power-normalized cepstral coefficients (PNCC) for robust speech recognition. IEEE\/ACM Trans Audio, Speech, Language Process 24(7):1315\u20131329. https:\/\/doi.org\/10.1109\/TASLP.2016.2545928","journal-title":"IEEE\/ACM Trans Audio, Speech, Language Process"},{"issue":"5","key":"12560_CR10","doi-asserted-by":"publisher","first-page":"12411","DOI":"10.1007\/s10586-017-1640-7","volume":"22","author":"M Kowsigan","year":"2019","unstructured":"Kowsigan M, Balasubramanie P (2019) An efficient performance evaluation model for the resource clusters in cloud environment using continuous time Markov chain and Poisson process. Clust Comput 22(5):12411\u201312419. https:\/\/doi.org\/10.1007\/s10586-017-1640-7","journal-title":"Clust Comput"},{"issue":"7","key":"12560_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s18072068","volume":"18","author":"SC Lee","year":"2018","unstructured":"Lee SC, Wang JF, Chen MH (2018) Threshold-based noise detection and reduction for automatic speech recognition system in human-robot interactions. Sensors 18(7):1\u201312. https:\/\/doi.org\/10.3390\/s18072068","journal-title":"Sensors"},{"unstructured":"Li WJ (2014) A study of encryption technology based on the analog voice. Master thesis, Xidian University (in Chinese), Xian, China.","key":"12560_CR12"},{"key":"12560_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/INVENTIVE.2016.7830133","volume":"3","author":"UR Nair","year":"2016","unstructured":"Nair UR, Birajdar GK (2016) A secure audio watermarking employing AES technique. In 2016 international conference on inventive computation technologies (ICICT). IEEE 3:1\u20135. https:\/\/doi.org\/10.1109\/INVENTIVE.2016.7830133","journal-title":"IEEE"},{"doi-asserted-by":"publisher","unstructured":"Nayyar RK, Nair S, Patil O, Pawar R, Lolage A (2017) Content-based auto-tagging of audios using deep learning. In international conference on big data, IoT and data science, 2017 international conference on. IEEE 30-36. https:\/\/doi.org\/10.1109\/BID.2017.8336569","key":"12560_CR14","DOI":"10.1109\/BID.2017.8336569"},{"issue":"11\u201312","key":"12560_CR15","doi-asserted-by":"publisher","first-page":"7911","DOI":"10.1007\/s11042-019-08279-5","volume":"79","author":"S Waldekar","year":"2020","unstructured":"Waldekar S, Saha G (2020) Analysis and classification of acoustic scenes with wavelet transform-based mel-scaled features. Multimed Tools Appl 79(11\u201312):7911\u20137926. https:\/\/doi.org\/10.1007\/s11042-019-08279-5","journal-title":"Multimed Tools Appl"},{"unstructured":"Wang D, Zhang XW (2015) Thchs-30: a free Chinese speech corpus. arXiv preprint arXiv:1512.01882. https:\/\/arxiv.org\/abs\/1512.01882","key":"12560_CR16"},{"unstructured":"Wang HX, Hao GY (2015) Encryption speech perceptual hashing algorithm and retrieval scheme based on time and frequency domain change characteristics. China patent, CN104835499A, 2015-08-12.","key":"12560_CR17"},{"issue":"2","key":"12560_CR18","doi-asserted-by":"publisher","first-page":"16","DOI":"10.19665\/j.issn1001-2400.2020.02.003","volume":"47","author":"XH Wang","year":"2020","unstructured":"Wang XH, Yao PC, Ma LP, Wang WJ (2020) Algorithm for extraction of features of robot speech control in the factory environment. J Xidian Univ 47(2):16\u201322. https:\/\/doi.org\/10.19665\/j.issn1001-2400.2020.02.003","journal-title":"J Xidian Univ"},{"issue":"2","key":"12560_CR19","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1587\/transinf.2017EDL8162","volume":"101","author":"JF Wu","year":"2018","unstructured":"Wu JF, Qin HB, Hua YZ, Fan LY (2018) Pitch estimation and voicing classification using reconstructed spectrum from MFCC. IEICE Trans Inf Syst 101(2):556\u2013559. https:\/\/doi.org\/10.1587\/transinf.2017EDL8162","journal-title":"IEICE Trans Inf Syst"},{"issue":"2","key":"12560_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.13954\/j.cnki.hdu.2017.02.002","volume":"37","author":"HM Zhang","year":"2017","unstructured":"Zhang HM, Wang GY, Jin PP (2017) Design of VOIP chaotic voice encryption system based on P2P. J Hangzhou Dianzi Univ (Natural Science Edition) 37(2):5\u20139. https:\/\/doi.org\/10.13954\/j.cnki.hdu.2017.02.002","journal-title":"J Hangzhou Dianzi Univ (Natural Science Edition)"},{"doi-asserted-by":"publisher","unstructured":"Zhang K, Zhang G, Jiang C, Yang YS (2016) Research and implementation of security cipher-text clustered index based on B+ tree. In 2016 international conference on network and information Systems for Computers (ICNISC). IEEE 274-278. https:\/\/doi.org\/10.1109\/ICNISC.2016.067","key":"12560_CR21","DOI":"10.1109\/ICNISC.2016.067"},{"issue":"13","key":"12560_CR22","doi-asserted-by":"publisher","first-page":"17825","DOI":"10.1007\/s11042-019-7180-9","volume":"78","author":"Q Zhang","year":"2019","unstructured":"Zhang Q, Zhou L, Zhang T, Zhang D (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78(13):17825\u201317846. https:\/\/doi.org\/10.1007\/s11042-019-7180-9","journal-title":"Multimed Tools Appl"},{"issue":"9\u201310","key":"12560_CR23","doi-asserted-by":"publisher","first-page":"6337","DOI":"10.1007\/s11042-019-08450-y","volume":"79","author":"Q Zhang","year":"2020","unstructured":"Zhang Q, Ge Z, Hu Y, Bai J, Huang Y (2020) An encrypted speech retrieval algorithm based on chirp-Z transform and perceptual hashing second feature extraction. Multimed Tools Appl 79(9\u201310):6337\u20136361. https:\/\/doi.org\/10.1007\/s11042-019-08450-y","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"12560_CR24","doi-asserted-by":"publisher","first-page":"77","DOI":"10.13190\/j.jbupt.2016.04.015","volume":"39","author":"QY Zhang","year":"2016","unstructured":"Zhang QY, Xing PF, Huang YB, Dong RH, Yang ZP (2016) Perceptual hashing algorithm for multi-format. J Beijing Univ Posts Telecomm 39(4):77\u201382. https:\/\/doi.org\/10.13190\/j.jbupt.2016.04.015","journal-title":"J Beijing Univ Posts Telecomm"},{"issue":"6","key":"12560_CR25","first-page":"1452","volume":"9","author":"QY Zhang","year":"2018","unstructured":"Zhang QY, Ge ZX, Qiao SB (2018) An efficient retrieval method of encrypted speech based on frequency band variance. J Inform Hiding Multimedia Signal Process 9(6):1452\u20131463","journal-title":"J Inform Hiding Multimedia Signal Process"},{"unstructured":"Zhang ZT (2018) Research of speech recognition technology based on wavelet and PNCC characteristic parameters. Chongqing University, Chongqing, China, Master thesis","key":"12560_CR26"},{"doi-asserted-by":"publisher","unstructured":"Zhao H, He SF (2016) A retrieval algorithm for encrypted speech based on perceptual hashing. In 2016 12th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD). IEEE 1840-1845. https:\/\/doi.org\/10.1109\/FSKD.2016.7603458","key":"12560_CR27","DOI":"10.1109\/FSKD.2016.7603458"},{"issue":"6","key":"12560_CR28","doi-asserted-by":"publisher","first-page":"118","DOI":"10.6054\/j.jscnun.2019111","volume":"51","author":"SM Zhong","year":"2019","unstructured":"Zhong SM, Kuang P, Zhuang HS, Feng HD, Wang JY, Zhang H (2019) A robust gender recognition scheme for telephone speech based on PNCC and fundamental frequency. J South Chine Normal (Natural Science Edition) 51(6):118\u2013122. https:\/\/doi.org\/10.6054\/j.jscnun.2019111","journal-title":"J South Chine Normal (Natural Science Edition)"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12560-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12560-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12560-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T11:17:10Z","timestamp":1651490230000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12560-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,27]]},"references-count":28,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["12560"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12560-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,2,27]]},"assertion":[{"value":"5 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}