×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [12]
计算技术研究所 [1]
自动化研究所 [1]
内容类型
期刊论文 [13]
学位论文 [1]
发表日期
2022 [3]
2021 [1]
2020 [1]
2019 [1]
2018 [2]
2017 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共14条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Content-based encrypted speech retrieval scheme with deep hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 7, 页码: 10221-10242
作者:
Zhang, Qiu-yu
;
Zhao, Xue-jiao
;
Zhang, Qi-wen
;
Li, Yu-zhou
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/04/21
Binary codes
Convolutional neural networks
Cryptography
Deep neural networks
Efficiency
Extraction
Feature extraction
Hamming distance
Information retrieval
Mapping
Semantic Web
Semantics
Spectrographs
Speech
Content-based
Convolutional neural network
Deep hashing
Deep semantic feature
Encrypted speech
Encrypted speech retrieval
Semantic features
Spectrograms
Speech retrieval
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
期刊论文
Multimedia Tools and Applications, 2022
作者:
Huang, Yi-bo
;
Yuan-Zhang
;
Chen, Teng-Fei
;
Yan, Shao-Hui
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/07/20
Authentication
Cryptography
Speech recognition
BioHashing
Biosafety template
CNN hyperchaotic map
Content authentication
Hyperchaotic maps
Security authentication
Speech content
Speech content authentication
Tamper detection
Tamper detection and location
Deep video code for efficient face video retrieval
期刊论文
PATTERN RECOGNITION, 2021, 卷号: 113, 页码: 11
作者:
Qiao, Shishi
;
Wang, Ruiping
;
Shan, Shiguang
;
Chen, Xilin
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2021/12/01
Face video retrieval
Temporal feature pooling
Bounded triplet loss
Deep video code
Hash learning
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 9-10, 页码: 6337-6361
作者:
Zhang, Qiu-yu
;
Ge, Zi-xian
;
Hu, Ying-jie
;
Bai, Jian
;
Huang, Yi-bo
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Cryptography
Efficiency
Extraction
Feature extraction
K-means clustering
Matrix algebra
Security of data
Z transforms
Chirp Z transform
Encrypted speech
Perceptual hashing
Random Matrix
Speech denoising
Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding
期刊论文
IET IMAGE PROCESSING, 2019, 卷号: 13, 期号: 14, 页码: 2905-2915
作者:
Zhang, Qiuyu
;
Han, Jitian
;
Ye, Yutong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/06/16
image coding
DNA
statistical analysis
cryptography
image processing
entropy
random sequences
chaos
chaotic communication
image encryption algorithm
image hashing
improved chaotic mapping
image features
fingerprint image
binary hash sequence
generated hash sequence
improved chaotic map
Chen's chaotic system
encryption algorithms
An efficient retrieval method of encrypted speech based on frequency band variance
期刊论文
Journal of Information Hiding and Multimedia Signal Processing, 2018, 卷号: 9, 期号: 6, 页码: 1452-1463
作者:
Zhang, Qiu-Yu
;
Ge, Zi-Xian
;
Qiao, Si-Bin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2020/11/14
Cryptography
Hamming distance
Information retrieval
Distance algorithm
Encrypted speech
Perceptual hashing
Retrieval accuracy
Retrieval efficiency
Retrieval methods
Retrieval performance
Speech features
An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string
期刊论文
International Journal of Information and Communication Technology, 2018, 卷号: 12, 期号: 1-2, 页码: 31-50
作者:
Qiuyu, Zhang
;
Pengfei, Xing
;
Yibo, Huang
;
Ruihong, Dong
;
Zhongping, Yang
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Authentication
Discrete wavelet transforms
Frequency domain analysis
Signal reconstruction
Speech
Speech communication
Time domain analysis
Wavelet decomposition
Authentication algorithm
Coefficients of low frequencies
Frequency domains
Localisation
Mobile computing environment
Perceptual hashing
Short-time energy
Symmetric ternary string
Speech perceptual hashing authentication algorithm based on spectral subtraction and energy to entropy ratio
期刊论文
International Journal of Network Security, 2017, 卷号: 19, 期号: 5, 页码: 752-760
作者:
Zhang, Qiu-Yu
;
Hu, Wen-Jin
;
Qiao, Si-Bin
;
Huang, Yi-Bo
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Authentication
Entropy
Speech
Speech communication
Speech recognition
Authentication algorithm
Efficient authentication
Energy-to-entropy ratio
Perceptual hash
Perceptual hashing
Spectral subtraction methods
Spectral subtractions
Tamper detection
An efficient speech perceptual hashing authentication algorithm based on the linear prediction minimum mean squared error
期刊论文
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2016, 卷号: 44, 期号: 12, 页码: 127-132
作者:
Zhang, Qiuyu
;
Hu, Wenjin
;
Qiao, Sibin
;
Zhang, Tao
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/11/14
Audio signal processing
Authentication
Efficiency
Errors
Forecasting
Matrix algebra
Spectrum analysis
Speech
Speech communication
Authentication algorithm
Coefficient matrix
Linear prediction
Linear prediction coding
Minimum mean squared error
Parameter matrices
Perceptual hashing
Spectral entropy
©版权所有 ©2017 CSpace - Powered by
CSpace