×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [28]
内容类型
期刊论文 [23]
会议论文 [5]
发表日期
2022 [1]
2020 [2]
2019 [1]
2018 [4]
2017 [1]
2016 [7]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共28条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 39-40, 页码: 29775-29798
作者:
Zhang, Qiu-yu
;
Li, Gai-li
;
Huang, Yi-bo
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Authentication
Conformal mapping
Cryptography
Discrete wavelet transforms
Efficiency
Fast Fourier transforms
Hamming distance
Photomapping
Signal reconstruction
Speech
Speech communication
Autocorrelation functions
Distance algorithm
Encrypted speech
Integrity authentications
Mapping algorithms
Retrieval efficiency
Spectral subtractions
Strong robustness
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 9-10, 页码: 6337-6361
作者:
Zhang, Qiu-yu
;
Ge, Zi-xian
;
Hu, Ying-jie
;
Bai, Jian
;
Huang, Yi-bo
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Cryptography
Efficiency
Extraction
Feature extraction
K-means clustering
Matrix algebra
Security of data
Z transforms
Chirp Z transform
Encrypted speech
Perceptual hashing
Random Matrix
Speech denoising
An efficient retrieval algorithm of encrypted speech based on inverse fast Fourier transform and measurement matrix
期刊论文
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 卷号: 27, 期号: 3, 页码: 1719-1736
作者:
Zhang, Qiuyu
;
Ge, Zixian
;
Zhou, Liang
;
Zhang, Yongbing
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/15
Encrypted speech retrieval
perceptual hashing
inverse fast Fourier transform
measurement matrix
Henon chaotic scrambling
speech feature extraction
An efficient retrieval method of encrypted speech based on frequency band variance
期刊论文
Journal of Information Hiding and Multimedia Signal Processing, 2018, 卷号: 9, 期号: 6, 页码: 1452-1463
作者:
Zhang, Qiu-Yu
;
Ge, Zi-Xian
;
Qiao, Si-Bin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2020/11/14
Cryptography
Hamming distance
Information retrieval
Distance algorithm
Encrypted speech
Perceptual hashing
Retrieval accuracy
Retrieval efficiency
Retrieval methods
Retrieval performance
Speech features
A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 期号: 16, 页码: 21653-21669
作者:
Zhang, Qiu-yu
;
Qiao, Si-bin
;
Huang, Yi-bo
;
Zhang, Tao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
Speech authentication
Perceptual hashing
Discrete wavelet transform (DWT)
Measurement matrix
Tampering detection
An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string
期刊论文
International Journal of Information and Communication Technology, 2018, 卷号: 12, 期号: 1-2, 页码: 31-50
作者:
Qiuyu, Zhang
;
Pengfei, Xing
;
Yibo, Huang
;
Ruihong, Dong
;
Zhongping, Yang
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Authentication
Discrete wavelet transforms
Frequency domain analysis
Signal reconstruction
Speech
Speech communication
Time domain analysis
Wavelet decomposition
Authentication algorithm
Coefficients of low frequencies
Frequency domains
Localisation
Mobile computing environment
Perceptual hashing
Short-time energy
Symmetric ternary string
The Speech multi features fusion perceptual hash algorithm based on tensor decomposition
会议论文
作者:
Huang, Y. B.
;
Fan, M. H.
;
Zhang, Q. Y.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/15
Speech perceptual hashing authentication algorithm based on spectral subtraction and energy to entropy ratio
期刊论文
International Journal of Network Security, 2017, 卷号: 19, 期号: 5, 页码: 752-760
作者:
Zhang, Qiu-Yu
;
Hu, Wen-Jin
;
Qiao, Si-Bin
;
Huang, Yi-Bo
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Authentication
Entropy
Speech
Speech communication
Speech recognition
Authentication algorithm
Efficient authentication
Energy-to-entropy ratio
Perceptual hash
Perceptual hashing
Spectral subtraction methods
Spectral subtractions
Tamper detection
An efficient speech perceptual hashing authentication algorithm based on the linear prediction minimum mean squared error
期刊论文
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2016, 卷号: 44, 期号: 12, 页码: 127-132
作者:
Zhang, Qiuyu
;
Hu, Wenjin
;
Qiao, Sibin
;
Zhang, Tao
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/11/14
Audio signal processing
Authentication
Efficiency
Errors
Forecasting
Matrix algebra
Spectrum analysis
Speech
Speech communication
Authentication algorithm
Coefficient matrix
Linear prediction
Linear prediction coding
Minimum mean squared error
Parameter matrices
Perceptual hashing
Spectral entropy
©版权所有 ©2017 CSpace - Powered by
CSpace