{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:30:38Z","timestamp":1771705838479,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862041"],"award-info":[{"award-number":["61862041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005229","name":"Key Science and Technology Foundation of Gansu Province","doi-asserted-by":"publisher","award":["21JR7RA120"],"award-info":[{"award-number":["21JR7RA120"]}],"id":[{"id":"10.13039\/501100005229","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11042-022-13933-6","type":"journal-article","created":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T03:28:59Z","timestamp":1665199739000},"page":"16767-16792","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Encrypted speech Biohashing authentication algorithm based on 4D hyperchaotic Bao system and feature fusion"],"prefix":"10.1007","volume":"82","author":[{"given":"Teng-fei","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1667-3114","authenticated-orcid":false,"given":"Yi-bo","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xiang-rong","family":"Pu","sequence":"additional","affiliation":[]},{"given":"Shao-hui","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Qiu-yu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,8]]},"reference":[{"issue":"6","key":"13933_CR1","first-page":"1179","volume":"20","author":"B Bochen","year":"2009","unstructured":"Bochen B, Liu Z, Xu JP (2009) New chaotic system and its hyperchaos generation. J Syst Eng Electron 20(6):1179\u20131187","journal-title":"J Syst Eng Electron"},{"key":"13933_CR2","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2017","unstructured":"Cao C, Sun KH, Liu W (2017) A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"issue":"2","key":"13933_CR3","doi-asserted-by":"publisher","first-page":"345","DOI":"10.4218\/etrij.10.0209.0309","volume":"32","author":"N Chen","year":"2010","unstructured":"Chen N, Wan WG (2010) Robust speech hash function. ETRI J 32(2):345\u2013347","journal-title":"ETRI J"},{"key":"13933_CR4","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.sigpro.2018.09.013","volume":"154","author":"YZ Chen","year":"2019","unstructured":"Chen YZ, Wo Y, Xie R, Wu CD (2019) Deep secure quantization: On secure biometric hashing against similarity-based attacks - sciencedirect. Signal Process 154:314\u2013323","journal-title":"Signal Process"},{"key":"13933_CR5","unstructured":"Cornelius G, Gerard C, Nazim D, Nigel C (2017) Privacy preserving encrypted phonetic search of speech data. In: IEEE international conference on acoustics, pp 6414\u20136418"},{"key":"13933_CR6","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.engappai.2019.03.021","volume":"82","author":"D Gaurav","year":"2019","unstructured":"Gaurav D, Amandeep K (2019) Stoa: A bio-inspired based optimization algorithm for industrial engineering problems. Appl Artif Intell 82:148\u2013174","journal-title":"Appl Artif Intell"},{"key":"13933_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.knosys.2018.06.001","volume":"159","author":"D Gaurav","year":"2018","unstructured":"Gaurav D, Vijay K (2018) Emperor penguin optimizer: A bio-inspired algorithm for engineering problems. Knowl-Based Syst 159:20\u201350","journal-title":"Knowl-Based Syst"},{"issue":"4","key":"13933_CR8","doi-asserted-by":"publisher","first-page":"2051","DOI":"10.1109\/TIP.2018.2883743","volume":"28","author":"S Ge","year":"2018","unstructured":"Ge S, Zhao S, li C, Li J (2018) Low-resolution face recognition in the wild via selective knowledge distillation. IEEE Trans Image Process 28 (4):2051\u20132062","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"13933_CR9","doi-asserted-by":"publisher","first-page":"703","DOI":"10.2298\/CSIS170112024H","volume":"14","author":"SF He","year":"2017","unstructured":"He SF, Zhao H (2017) A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. Comput Sci Inform Syst 14(3):703\u2013718","journal-title":"Comput Sci Inform Syst"},{"key":"13933_CR10","doi-asserted-by":"publisher","first-page":"34140","DOI":"10.1109\/ACCESS.2020.2974029","volume":"8","author":"YB Huang","year":"2020","unstructured":"Huang YB, Hou HX, Wang Y, Zhang Y (2020) A long sequence speech perceptual hashing authentication algorithm based on constant q transform and tensor decomposition. IEEE Access 8:34140\u201334152","journal-title":"IEEE Access"},{"issue":"33-34","key":"13933_CR11","doi-asserted-by":"publisher","first-page":"24889","DOI":"10.1007\/s11042-020-09211-y","volume":"79","author":"YB Huang","year":"2020","unstructured":"Huang YB, Wang Y, Zhang Q, Zhang WZ (2020) Multi-format speech biohashing based on spectrogram. Multimed Tools Appl 79 (33-34):24889\u201324909","journal-title":"Multimed Tools Appl"},{"key":"13933_CR12","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.neucom.2015.06.098","volume":"181","author":"Q Kang","year":"2016","unstructured":"Kang Q, Liu X, Yao Y, Wang Z, Li Y (2016) Efficient authentication and access control of message dissemination over vehicular ad hoc network. Neurocomputing 181:132\u2013138","journal-title":"Neurocomputing"},{"issue":"1","key":"13933_CR13","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s10586-015-0523-z","volume":"19","author":"HG Kim","year":"2016","unstructured":"Kim HG, Cho HS, Kim JY (2016) Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. Clust Comput 19(1):315\u2013323","journal-title":"Clust Comput"},{"issue":"1","key":"13933_CR14","first-page":"1","volume":"1","author":"R Kumar","year":"2021","unstructured":"Kumar R, Gaurav D (2021) A comparative study of fuzzy optimization through fuzzy number. Int J Mod Res 1(1):1\u201314","journal-title":"Int J Mod Res"},{"issue":"5","key":"13933_CR15","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TFUZZ.2018.2870590","volume":"27","author":"P Kumar","year":"2019","unstructured":"Kumar P, Mukherjee S, Saini R, Kaushik P (2019) Multimodal gait recognition with inertial sensor data and video using evolutionary algorithm. IEEE Trans Fuzzy Syst 27(5):956\u2013965","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"12","key":"13933_CR16","doi-asserted-by":"publisher","first-page":"2363","DOI":"10.1007\/s11042-019-08228-2","volume":"79","author":"N Kumar","year":"2020","unstructured":"Kumar N, Rawat M (2020) Rp-lpp: A random permutation based locality preserving projection for cancelable biometric recognition. Multimed Tools Appl 79(12):2363\u20132381","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"13933_CR17","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1002\/asjc.1593","volume":"20","author":"SM Kumar","year":"2018","unstructured":"Kumar SM, Sharma BB (2018) Control and synchronization of a class of uncertain fractional order chaotic systems via adaptive backstepping control. Asian Journal of Control 20(2):707\u2013720","journal-title":"Asian Journal of Control"},{"key":"13933_CR18","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/s11253-018-1487-y","volume":"70","author":"GA Leonov","year":"2018","unstructured":"Leonov GA (2018) Lyapunov functions in the global analysis of chaotic systems. Ukr Math J 70:42\u201366","journal-title":"Ukr Math J"},{"issue":"3","key":"13933_CR19","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1049\/cje.2015.07.024","volume":"24","author":"JF Li","year":"2015","unstructured":"Li JF, Wang HX, Jing Y (2015) Audio perceptual hashing based on nmf and mdct coefficients. Chin J Electron 24(3):579\u2013588","journal-title":"Chin J Electron"},{"issue":"2","key":"13933_CR20","first-page":"89","volume":"38","author":"JF Li","year":"2015","unstructured":"Li JF, Wu T, Wang H (2015) Perceptual hashing based on correlation coefficient of mfcc for speech authentication. J Beijing Univ Posts Telecommun 38 (2):89\u201393","journal-title":"J Beijing Univ Posts Telecommun"},{"issue":"17","key":"13933_CR21","doi-asserted-by":"publisher","first-page":"3576","DOI":"10.1021\/acs.jpcb.8b12363","volume":"123","author":"QH Liao","year":"2019","unstructured":"Liao QH, L\u00fcking M, Kr\u00fcger DM, Deindl S (2019) Long time-scale atomistic simulations of the structure and dynamics of transcription factor-dna recognition. J Phys Chem B 123(17):3576\u20133590","journal-title":"J Phys Chem B"},{"key":"13933_CR22","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.optlaseng.2016.03.019","volume":"84","author":"WH Liu","year":"2016","unstructured":"Liu WH, Zhu CX, Sun K (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26\u201336","journal-title":"Opt Lasers Eng"},{"issue":"12","key":"13933_CR23","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MC.2019.2943137","volume":"52","author":"A Mendelson","year":"2019","unstructured":"Mendelson A (2019) Security and privacy in the age of big data and machine learning. Computer 52(12):65\u201370","journal-title":"Computer"},{"key":"13933_CR24","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.cose.2018.11.003","volume":"81","author":"H Mohamed","year":"2019","unstructured":"Mohamed H, Wang KQ (2019) Parallel score fusion of ecg and fingerprint for human authentication based on convolution neural network. Comput Secur 81:107\u2013122","journal-title":"Comput Secur"},{"issue":"1","key":"13933_CR25","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1049\/el.2012.3812","volume":"49","author":"HD Ning-Chen","year":"2013","unstructured":"Ning-Chen HD, Zhu J, Lin J (2013) Xiao Robust audio hashing scheme based on cochleagram and cross recurrence analysis. Electron Lett 49(1):7\u20138","journal-title":"Electron Lett"},{"issue":"1","key":"13933_CR26","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TVT.2019.2950670","volume":"69","author":"L Peng","year":"2019","unstructured":"Peng L, Zhang J, Liu M, Hu A (2019) Deep learning based rf fingerprint identification using differential constellation trace figure. IEEE Trans Veh Technol 69(1):1091\u20131095","journal-title":"IEEE Trans Veh Technol"},{"issue":"12","key":"13933_CR27","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1109\/TASL.2013.2273717","volume":"21","author":"AP Prathosh","year":"2013","unstructured":"Prathosh AP, Ananthapadmanabha TV, Ramakrishnan AG (2013) Epoch extraction based on integrated linear prediction residual using plosion index. EEE Transactions on Audio Speech and Language Processing 21 (12):2471\u20132480","journal-title":"EEE Transactions on Audio Speech and Language Processing"},{"issue":"4","key":"13933_CR28","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11235-017-0360-x","volume":"67","author":"Q Qian","year":"2018","unstructured":"Qian Q, Wang HX, Sun X, Cui YH (2018) Speech authentication and content recovery scheme for security communication and storage. Telecommun Syst 67(4):635\u2013649","journal-title":"Telecommun Syst"},{"issue":"21","key":"13933_CR29","doi-asserted-by":"publisher","first-page":"22703","DOI":"10.1007\/s11042-016-4333-y","volume":"76","author":"A Shadi","year":"2017","unstructured":"Shadi A, Bani YM, Adel TW (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703\u201322724","journal-title":"Multimed Tools Appl"},{"key":"13933_CR30","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.neucom.2014.03.005","volume":"140","author":"SM Siniscalchi","year":"2014","unstructured":"Siniscalchi SM, Svendsen T, Lee CH (2014) An artificial neural network approach to automatic speech processing. Neurocomputing 140:326\u2013338","journal-title":"Neurocomputing"},{"issue":"3","key":"13933_CR31","doi-asserted-by":"publisher","first-page":"662","DOI":"10.3390\/s19030662","volume":"19","author":"S Ullah","year":"2019","unstructured":"Ullah S, Mumtaz Z, Liu S, Abubaqr M, Mahboob A, Madni HA (2019) Single-equipment with multiple-application for an automated robot-car control system. Sensors 19(3):662","journal-title":"Sensors"},{"issue":"12","key":"13933_CR32","first-page":"373","volume":"27","author":"L Wang","year":"2010","unstructured":"Wang L, Li CR (2010) An improved speech endpoint detection method based on adaptive band-partition spectral entropy. Comput Simul 27(12):373\u2013375","journal-title":"Comput Simul"},{"issue":"3","key":"13933_CR33","first-page":"1203","volume":"173","author":"Z Wang","year":"2015","unstructured":"Wang Z, Guo L, Adjouadi M (2015) Wavelet decomposition and phase encoding of temporal signals using spiking neurons. Neurocomputing 173 (3):1203\u20131210","journal-title":"Neurocomputing"},{"issue":"3","key":"13933_CR34","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.3906\/elk-1808-161","volume":"27","author":"QY Zhang","year":"2019","unstructured":"Zhang QY, Ge ZX, Zhou L, Zhang Y (2019) An efficient retrieval algorithm of encrypted speech based on inverse fast 2 fourier-transform and measurement matrix. Turk J Electr Eng Comput Sci 27(3):1719\u20131736","journal-title":"Turk J Electr Eng Comput Sci"},{"issue":"2","key":"13933_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-017-4381-y","volume":"77","author":"QY Zhang","year":"2018","unstructured":"Zhang QY, Hu WJ, Huang Y, Qiao SB (2018) An efficient perceptual hashing based on improved spectral entropy for speech authentication. Multimed Tools Appl 77(2):1\u201327","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"13933_CR36","first-page":"899","volume":"49","author":"YB Zhang","year":"2019","unstructured":"Zhang YB, Mi BQ, Zhou L, Zhang T (2019) Speech perceptual hashing algorithm based on short-term auto-correlation for speech authentication. Radio Eng 49(10):899\u2013904","journal-title":"Radio Eng"},{"issue":"9","key":"13933_CR37","first-page":"33","volume":"45","author":"QY Zhang","year":"2017","unstructured":"Zhang QY, Qiao SB, Zhang T, Huang YB (2017) Perceptual hashing authentication algorithm for multi-format audio based on energy to zero ratio. Journal of Huazhong University of Science and Technology(Nature Science Edition) 45(9):33\u201338","journal-title":"Journal of Huazhong University of Science and Technology(Nature Science Edition)"},{"issue":"16","key":"13933_CR38","doi-asserted-by":"publisher","first-page":"21653","DOI":"10.1007\/s11042-018-5613-5","volume":"77","author":"QY Zhang","year":"2019","unstructured":"Zhang QY, Qiao SB, Huang Y, Zhang T (2019) A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix. Multimed Tools Appl 77(16):21653\u201321669","journal-title":"Multimed Tools Appl"},{"key":"13933_CR39","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.ins.2019.03.027","volume":"489","author":"S Zhao","year":"2019","unstructured":"Zhao S, Zhang B, Philip Chen CL (2019) Joint deep convolutional feature representation for hyperspectral palmprint recognition. Inf Sci 489:167\u2013181","journal-title":"Inf Sci"},{"issue":"2","key":"13933_CR40","first-page":"259","volume":"21","author":"QY Zhang","year":"2019","unstructured":"Zhang QY, Zhang T, Qiao S (2019) Spectrogram-based efficient perceptual hashing scheme for speech identification. Int J Netw Secur 21(2):259\u2013268","journal-title":"Int J Netw Secur"},{"key":"13933_CR41","doi-asserted-by":"publisher","first-page":"17825","DOI":"10.1007\/s11042-019-7180-9","volume":"78","author":"QY Zhang","year":"2019","unstructured":"Zhang QY, Zhou L, Zhang T, Zhang DH (2019) A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing. Multimed Tools Appl 78:17825\u201317846","journal-title":"Multimed Tools Appl"},{"key":"13933_CR42","doi-asserted-by":"crossref","unstructured":"Zheng Y, Cao Y, Chang CH (2018) Facial biohashing based user-device physical unclonable function for bring your own device security. In: 2018 ieee international conference on consumer electronics (ICCE).","DOI":"10.1109\/ICCE.2018.8326074"},{"key":"13933_CR43","unstructured":"Zhou ZY, Zhou Y, Philip-Chen CL (2013) A new series-wound framework for generating 1d chaotic maps. In: 2013 IEEE digital signal processing and signal processing education meeting (DSP\/SPE)"},{"issue":"1","key":"13933_CR44","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MMUL.2018.2875256","volume":"26","author":"L Zhou","year":"2019","unstructured":"Zhou L, Rodrigues J (2019) Honggang-wang, and Maria-G-Martini. 5g multimedia communications: theory, technology, and application. IEEE MultiMedia 26(1):8\u20139","journal-title":"IEEE MultiMedia"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13933-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13933-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13933-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T09:17:55Z","timestamp":1681550275000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13933-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,8]]},"references-count":44,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["13933"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13933-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,8]]},"assertion":[{"value":"15 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}