期刊文献+

基于声母和深度哈希的密文语音全文检索方法 被引量:2

Full-text retrieval algorithm for encrypted speech based on initial consonant and deep hashing
原文传递
导出
摘要 为了实现基于内容的语音全文检索,提高语音检索性能,以及保障云端语音数据的隐私安全,提出了一种基于声母和深度哈希的密文语音全文检索方法.该方法将提出的基于汉语声母和元音的双向循环递归神经网络(RNN)-长短时记忆(LSTM)深度学习模型与语音感知哈希相结合,分别将加密语音和生成的哈希码上传至云端密文语音库和全文哈希索引表,并建立一一映射关系.查询时提取待查询语音的哈希码,并与云端的全文哈希索引表进行阶段式匹配检索.实验结果表明:该方法既能保障语音隐私安全,又能获得较高的检索精确度与可观的召回率(当精确度为97.68%时召回率可达47.60%),并在一定程度上减弱了说话人声音特征对全文检索的不利影响. To improve the retrieval performance and guarantee the privacy security of cloud speech data,a new encrypted speech retrieval algorithm was proposed based on initial consonant and deep hashing,aimed at the content based speech full-text retrieval.The proposed bidirectional recurrent neural network(RNN)-long short term memory(LSTM)model,which was on initial consonant and vowels of Chinese Pinyin,was used to generate perceptual deep hashing.Then the encrypted speech data and its hash code would be uploaded to cloud encrypted speech library and full-text hash index,and one to one mapping relationship would be built.To obtain the retrieval results,the hash code of query speech would be matched with the full-text hash index stage by stage.The experiments show that the proposed algorithm has high retrieval precision(97.68%)and considerable recall rate(47.60%)with good privacy security,to some extent it can weaken the negative impact of speaker's identity on full-text retrieval.
作者 胡颖杰 张秋余 李昱州 HU Yingjie;ZHANG Qiuyu;LI Yuzhou(School of Computer and Communication,Lanzhou University of Technology,Lanzhou 730050,China)
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2021年第12期83-88,共6页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(61862041).
关键词 密文语音检索 全文检索 声母 深度学习 哈希编码 递归神经网络 长短时记忆 encrypted speech retrieval full text searching consonant deep learning hash coding recurrent neural network(RNN) long short term memory(LSTM)
  • 相关文献

参考文献4

二级参考文献125

  • 1罗骏,欧智坚,王作英.基于拼音图的两阶段关键词检索系统[J].清华大学学报(自然科学版),2005,45(10):1356-1359. 被引量:1
  • 2Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [C] //Proc of ACM Workshop Cloud Computing Security (CCSW 2009). New York: ACM, 2009:67-76.
  • 3Rackspace. JungleDisk [EB/OL]. 2010 [ 2011-01-09 ]. http://www, jungledisk, com/.
  • 4Vrable M, Savage S, Voelker G M. Cumulus: Filesystem Backup to the cloud [J]. ACM Trans on Storage, 2009, 5 (4): 1-28.
  • 5Cramer R, Shoup V. Design and analysis of practical public- key eneryption schemes secure against adaptive chosen ciphertext attack [J]. SIAM Journal on Computing, 2004, 33(1) : 167-226.
  • 6Hofheinz D, Eike K. Secure hybrid encryption from weakened key encapsulation [G] //LNCS 4622: Proc of CRYPTO 2007. Berlin: Springer,2007: 553-571.
  • 7Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography [G] //LNCS 1403: Proc of EUROCRYPT 1998. Berlin.. Springer, 1998:127-144.
  • 8Ateniese G, Fu K, Green M, et al. Improved proxy re- encryption schemes with applications to secure distributed storage [J]. ACM Trans on Information and System Security, 2006, 9(1): 1-30.
  • 9Green M, Ateniese G. Identity-based proxy re-encryption[G] //LNCS 4521: Proc of the 5th Applied Cryptography and Network Security Conf. Berlin: Springer, 2007: 288- 306.
  • 10Hohenberger S, Rothblum G, Shelat A, et al. Securely obfuscating reencryption [C] //Proc of the 4th Theory of Cryptography Conf. Berlin: Springer, 2007:233-252.

共引文献107

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部