{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T08:43:17Z","timestamp":1775119397005,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T00:00:00Z","timestamp":1660348800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T00:00:00Z","timestamp":1660348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862041"],"award-info":[{"award-number":["61862041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"youth science and technology fund of Gansu province of China","award":["21JR7RA120"],"award-info":[{"award-number":["21JR7RA120"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11042-022-13387-w","type":"journal-article","created":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T02:02:45Z","timestamp":1660356165000},"page":"7803-7824","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Verifiable speech retrieval algorithm based on KNN secure hashing"],"prefix":"10.1007","volume":"82","author":[{"given":"Li","family":"An","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1667-3114","authenticated-orcid":false,"given":"Yi-bo","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Qiu-yu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,13]]},"reference":[{"key":"13387_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.advengsoft.2017.05.014","volume":"114","author":"G Dhiman","year":"2017","unstructured":"Dhiman G, Kumar V (2017) Spotted hyena optimizer: a novel bio-inspired based metaheuristic technique for engineering applications. Adv Eng Softw 114:48\u201370","journal-title":"Adv Eng Softw"},{"key":"13387_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.knosys.2018.06.001","volume":"159","author":"G Dhiman","year":"2018","unstructured":"Dhiman G, Kumar V (2018) Emperor penguin optimizer: a bio-inspired algorithm for engineering problems. Knowl-Based Syst 159:20\u201350","journal-title":"Knowl-Based Syst"},{"key":"13387_CR3","doi-asserted-by":"crossref","unstructured":"Dong X, Liu L, Zhu L, Cheng Z, Zhang H (2020) Unsupervised deep k-means hashing for efficient image retrieval and clustering. IEEE Trans Circ Syst Video Technol","DOI":"10.1109\/TCSVT.2020.3035775"},{"issue":"1","key":"13387_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/srep28988","volume":"6","author":"M Fujiwara","year":"2016","unstructured":"Fujiwara M, Waseda A, Nojima R, Moriai S, Ogata W, Sasaki M (2016) Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing. Sci Rep 6(1):1\u20138","journal-title":"Sci Rep"},{"key":"13387_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.inffus.2017.10.003","volume":"42","author":"M Gomez-Barrero","year":"2018","unstructured":"Gomez-Barrero M, Rathgeb C, Li G, Ramachandra R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Inf Fusion 42:37\u201350","journal-title":"Inf Fusion"},{"key":"13387_CR6","doi-asserted-by":"crossref","unstructured":"He K, Wen F, Sun J (2013) K-means hashing: an affinity-preserving quantization method for learning binary compact codes. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2938\u20132945","DOI":"10.1109\/CVPR.2013.378"},{"key":"13387_CR7","doi-asserted-by":"crossref","unstructured":"He X, Wang P, Cheng J (2019) K-nearest neighbors hashing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","DOI":"10.1109\/CVPR.2019.00295"},{"issue":"11","key":"13387_CR8","doi-asserted-by":"publisher","first-page":"2304","DOI":"10.1109\/TPAMI.2015.2408363","volume":"37","author":"J-P Heo","year":"2015","unstructured":"Heo J-P, Lee Y, He J, Chang S-F, Yoon S-E (2015) Spherical hashing: binary code embedding with hyperspheres. IEEE Trans Pattern Anal Mach Intell 37(11):2304\u20132316","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"9","key":"13387_CR9","doi-asserted-by":"publisher","first-page":"13065","DOI":"10.1007\/s11042-022-12371-8","volume":"81","author":"Y-b Huang","year":"2022","unstructured":"Huang Y-b, Wang Y, Li H, Zhang Y, Zhang Q-y (2022) Encrypted speech retrieval based on long sequence biohashing. Multimed Tools Appl 81(9):13065\u201313085","journal-title":"Multimed Tools Appl"},{"issue":"33","key":"13387_CR10","doi-asserted-by":"publisher","first-page":"24889","DOI":"10.1007\/s11042-020-09211-y","volume":"79","author":"Y-b Huang","year":"2020","unstructured":"Huang Y-b, Wang Y, Zhang Q-y, Zhang W-z, Fan M-h (2020) Multi-format speech biohashing based on spectrogram. Multimed Tools Appl 79(33):24889\u201324909","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"13387_CR11","first-page":"32","volume":"48","author":"Y-b Huang","year":"2020","unstructured":"Huang Y-b, Wang Y, Zhang Q-y, Chen T-f (2020) Biohashing encrypted speech retrieval based on chaotic measurement matrix. J Huazhong Univ Sci Technol (Nat Sci Ed) 48(12):32\u201337","journal-title":"J Huazhong Univ Sci Technol (Nat Sci Ed)"},{"key":"13387_CR12","first-page":"125478","volume":"386","author":"Y Ji","year":"2020","unstructured":"Ji Y, Shao B, Chang J, Bian G (2020) Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Appl Math Comput 386:125478","journal-title":"Appl Math Comput"},{"key":"13387_CR13","doi-asserted-by":"publisher","first-page":"5336","DOI":"10.1109\/TIP.2020.2971105","volume":"29","author":"S Jin","year":"2020","unstructured":"Jin S, Yao H, Sun X, Zhou S, Zhang L, Hua X (2020) Deep saliency hashing for fine-grained retrieval. IEEE Trans Image Process 29:5336\u20135351","journal-title":"IEEE Trans Image Process"},{"key":"13387_CR14","unstructured":"Kamper H, Shakhnarovich G, Livescu K (2018) Semantic speech retrieval with a visually grounded model of untranscribed speech. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 2514\u20132517"},{"key":"13387_CR15","doi-asserted-by":"publisher","first-page":"103541","DOI":"10.1016\/j.engappai.2020.103541","volume":"90","author":"S Kaur","year":"2020","unstructured":"Kaur S, Awasthi LK, Sangal A, Dhiman G (2020) Tunicate swarm algorithm: a new bio-inspired based metaheuristic paradigm for global optimization. Eng Appl Artif Intell 90:103541","journal-title":"Eng Appl Artif Intell"},{"key":"13387_CR16","doi-asserted-by":"crossref","unstructured":"Kinnunen T, Sahidullah M, Delgado H, Todisco M, Evans N, Yamagishi J, Lee KA (2017) The asvspoof 2017 challenge: assessing the limits of replay spoofing attack detection","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"13387_CR17","doi-asserted-by":"publisher","first-page":"3170","DOI":"10.1109\/TIFS.2021.3073802","volume":"16","author":"Y Lai","year":"2021","unstructured":"Lai Y, Jin Z, Wong K, Tistarelli M (2021) Efficient known-sample attack for distance-preserving hashing biometric template protection schemes. IEEE Trans Inf Forensic Secur 16:3170\u20133185","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"13387_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TQE.2020.2965697","volume":"1","author":"B Langenberg","year":"2020","unstructured":"Langenberg B, Pham H, Steinwandt R (2020) Reducing the cost of implementing the advanced encryption standard as a quantum circuit. IEEE Trans Quantum Eng 1:1\u201312","journal-title":"IEEE Trans Quantum Eng"},{"issue":"10","key":"13387_CR19","doi-asserted-by":"publisher","first-page":"6543","DOI":"10.1109\/TII.2020.2966069","volume":"16","author":"W Liang","year":"2020","unstructured":"Liang W, Fan Y, Li K-C, Zhang D, Gaudiot J-L (2020) Secure data storage and recovery in industrial blockchain network environments. IEEE Trans Indus Inf 16(10):6543\u20136552","journal-title":"IEEE Trans Indus Inf"},{"key":"13387_CR20","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.future.2020.01.023","volume":"106","author":"Y Liu","year":"2020","unstructured":"Liu Y, Zhang S (2020) Information security and storage of internet of things based on block chains. Futur Gener Comput Syst 106:296\u2013303","journal-title":"Futur Gener Comput Syst"},{"key":"13387_CR21","doi-asserted-by":"crossref","unstructured":"Lu H, Zhang M, Xu X, Li Y, Shen HT (2020) Deep fuzzy hashing network for efficient image retrieval. IEEE Trans Fuzzy Syst","DOI":"10.1109\/TFUZZ.2020.2984991"},{"key":"13387_CR22","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/TIFS.2020.3009590","volume":"16","author":"G Mai","year":"2020","unstructured":"Mai G, Cao K, Lan X, Yuen PC (2020) Secureface: face template protection. IEEE Trans Inf Forensic Secur 16:262\u2013277","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"1","key":"13387_CR23","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/s11042-021-11494-8","volume":"81","author":"WW Ng","year":"2022","unstructured":"Ng WW, Li J, Tian X, Wang H (2022) Bit-wise attention deep complementary supervised hashing for image retrieval. Multimed Tools Appl 81(1):927\u2013951","journal-title":"Multimed Tools Appl"},{"key":"13387_CR24","doi-asserted-by":"publisher","first-page":"101281","DOI":"10.1016\/j.csl.2021.101281","volume":"72","author":"AT Patil","year":"2022","unstructured":"Patil AT, Acharya R, Patil HA, Guido RC (2022) Improving the potential of enhanced teager energy cepstral coefficients (etecc) for replay attack detection. Comput Speech Lang 72:101281","journal-title":"Comput Speech Lang"},{"key":"13387_CR25","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/TASLP.2021.3057230","volume":"29","author":"Y Qian","year":"2021","unstructured":"Qian Y, Chen Z, Wang S (2021) Audio-visual deep neural network for robust person verification. IEEE\/ACM Trans Audio Speech Lang Proc 29:1079\u20131092. https:\/\/doi.org\/10.1109\/TASLP.2021.3057230https:\/\/doi.org\/10.1109\/TASLP.2021.3057230","journal-title":"IEEE\/ACM Trans Audio Speech Lang Proc"},{"key":"13387_CR26","doi-asserted-by":"crossref","unstructured":"Shen HT, Liu L, Yang Y, Xu X, Huang Z, Shen F, Hong R (2020) Exploiting subspace relation in semantic labels for cross-modal hashing. IEEE Trans Knowl Data Eng","DOI":"10.1109\/TKDE.2020.2970050"},{"key":"13387_CR27","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1109\/TIFS.2020.3033189","volume":"16","author":"V Talreja","year":"2020","unstructured":"Talreja V, Valenti MC, Nasrabadi NM (2020) Deep hashing for secure multimodal biometrics. IEEE Trans Inf Forensic Secur 16:1306\u20131321","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"1","key":"13387_CR28","first-page":"1","volume":"5","author":"X Wang","year":"2015","unstructured":"Wang X, Chen W, Mei S, Chen X (2015) Optically secured information retrieval using two authenticated phase-only masks. Sci Rep 5(1):1\u20139","journal-title":"Sci Rep"},{"issue":"7","key":"13387_CR29","doi-asserted-by":"publisher","first-page":"10013","DOI":"10.1007\/s11042-020-09701-z","volume":"80","author":"Y Wang","year":"2021","unstructured":"Wang Y, Huang Y-b, Zhang R, Zhang Q-y (2021) Multi-format speech biohashing based on energy to zero ratio and improved lp-mmse parameter fusion. Multimed Tools Appl 80(7):10013\u201310036","journal-title":"Multimed Tools Appl"},{"key":"13387_CR30","doi-asserted-by":"publisher","first-page":"107785","DOI":"10.1016\/j.patcog.2020.107785","volume":"112","author":"Y Wang","year":"2021","unstructured":"Wang Y, Song J, Zhou K, Liu Y (2021) Unsupervised deep hashing with node representation for image retrieval. Pattern Recogn 112:107785","journal-title":"Pattern Recogn"},{"key":"13387_CR31","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang Z, Wu B, Shen F, Lu G (2021) Prototype-supervised adversarial network for targeted attack of deep hashing. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 16357\u201316366","DOI":"10.1109\/CVPR46437.2021.01609"},{"key":"13387_CR32","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.neucom.2019.06.053","volume":"364","author":"Z Weng","year":"2019","unstructured":"Weng Z, Zhu Y, Lan Y, Huang L-K (2019) A fast online spherical hashing method based on data sampling for large scale image retrieval. Neurocomputing 364:209\u2013218","journal-title":"Neurocomputing"},{"key":"13387_CR33","doi-asserted-by":"publisher","first-page":"1233","DOI":"10.1109\/TASLP.2021.3065234","volume":"29","author":"H Xie","year":"2021","unstructured":"Xie H, Virtanen T (2021) Zero-shot audio classification via semantic embeddings. IEEE\/ACM Trans Audio Speech Lang Process 29:1233\u20131242. https:\/\/doi.org\/10.1109\/TASLP.2021.3065234","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"key":"13387_CR34","doi-asserted-by":"crossref","unstructured":"Xu L, Zeng X, Zheng B, Li W (2022) Multi-manifold deep discriminative cross-modal hashing for medical image retrieval. IEEE Trans Image Process","DOI":"10.1109\/TIP.2022.3171081"},{"key":"13387_CR35","doi-asserted-by":"crossref","unstructured":"Yan C, Gong B, Wei Y, Gao Y (2020) Deep multi-view enhancement hashing for image retrieval. IEEE Trans Pattern Anal Mach Intell","DOI":"10.1109\/TPAMI.2020.2975798"},{"key":"13387_CR36","doi-asserted-by":"crossref","unstructured":"Zhang Z, Liu L, Luo Y, Huang Z, Shen F, Shen HT, Lu G (2020) Inductive structure consistent hashing via flexible semantic calibration. IEEE Trans Neural Netw Learn Syst","DOI":"10.1109\/TNNLS.2020.3018790"},{"issue":"9","key":"13387_CR37","doi-asserted-by":"publisher","first-page":"6337","DOI":"10.1007\/s11042-019-08450-y","volume":"79","author":"Q-y Zhang","year":"2020","unstructured":"Zhang Q-y, Ge Z-x, Hu Y-j, Bai J, Huang Y-b (2020) An encrypted speech retrieval algorithm based on chirp-z transform and perceptual hashing second feature extraction. Multimed Tools Appl 79(9):6337\u20136361","journal-title":"Multimed Tools Appl"},{"key":"13387_CR38","doi-asserted-by":"publisher","first-page":"102301","DOI":"10.1016\/j.media.2021.102301","volume":"77","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Xie F, Song X, Zheng Y, Liu J, Wang J (2022) Dermoscopic image retrieval based on rotation-invariance deep hashing. Med Image Anal 77:102301","journal-title":"Med Image Anal"},{"issue":"9","key":"13387_CR39","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.1109\/TMM.2017.2703636","volume":"19","author":"X Zhu","year":"2017","unstructured":"Zhu X, Li X, Zhang S, Xu Z, Yu L, Wang C (2017) Graph pca hashing for similarity search. IEEE Trans Multimed 19(9):2033\u20132044","journal-title":"IEEE Trans Multimed"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13387-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13387-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13387-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T08:18:24Z","timestamp":1674721104000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13387-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,13]]},"references-count":39,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["13387"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13387-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,13]]},"assertion":[{"value":"9 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}