Watermarking-Based Perceptual Hashing Search Over Encrypted Speech
暂无分享,去创建一个
Wei Zhang | Hongxia Wang | Linna Zhou | Shuang Liu | Wei Zhang | Hongxia Wang | Shuang Liu | Linna Zhou
[1] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[2] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[3] Hai Jin,et al. Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data , 2012, 2012 IEEE Asia-Pacific Services Computing Conference.
[4] Hongxia Wang,et al. Centroid-based semi-fragile audio watermarking in hybrid domain , 2010, Science China Information Sciences.
[5] L. Chua. Memristor-The missing circuit element , 1971 .
[6] Jing Wu,et al. Content-Based Audio Retrieval Using Perceptual Hash , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[7] Hongxia Wang,et al. Efficient Image Encryption Using a Chaos-based PWL Memristor , 2010 .
[8] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[9] Lin Wu,et al. A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks , 2013, Int. J. Distributed Sens. Networks.
[10] Andrew Hutchison,et al. An architecture for secure searchable cloud storage , 2011, 2011 Information Security for South Africa.
[11] Shu-Lin Wang,et al. An Efficient Privacy-Preserving Rank Query over Encrypted Data in Cloud Computing , 2012 .
[12] Hongxia Wang,et al. Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[13] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[14] Tetsutaro Uehara,et al. Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[15] Hui Lin,et al. Switching Auxiliary Chains for Speech Recognition , 2007, IEEE Signal Processing Letters.