Loading…

A retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing

In order to achieve extraction perceptual features from the encryption speech as a search digest for the content-based encryption speech retrieval, we present a retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing in this paper. Firstly, the study encr...

Full description

Saved in:
Bibliographic Details
Published in:Multimedia tools and applications 2019-07, Vol.78 (13), p.17825-17846
Main Authors: Zhang, Qiu-yu, Zhou, Liang, Zhang, Tao, Zhang, Deng-hai
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In order to achieve extraction perceptual features from the encryption speech as a search digest for the content-based encryption speech retrieval, we present a retrieval algorithm of encrypted speech based on short-term cross-correlation and perceptual hashing in this paper. Firstly, the study encrypts the speech file and uploads the encrypted speech data to the encryption speech database in cloud server. Secondly, the sample speech clips are obtained by the cutting operation from the speech file for scrambling encryption. The perceptual hashing sequence of the encrypted speech is constructed by extracting the short-term cross-correlation of the encrypted speech signals as the search digest. These perceptual hashing sequences are uploaded into the hashing index table of cloud server. Finally, the Hamming distance algorithm is used for the matching retrieval operation during the search. The experimental results show that the proposed algorithm of encrypted speech perceptual hashing has a better discrimination, robustness and compactness, and the perceptual hashing sequences can be extracted directly from the encrypted sample speech. Meanwhile, the encryption speech signal has high recall and precision ratios after various content preserving operations. In the whole retrieval process, the downloading and decrypting operations of speech data are not necessary.
ISSN:1380-7501
1573-7721
DOI:10.1007/s11042-019-7180-9