期刊文献+
共找到4,996篇文章
< 1 2 250 >
每页显示 20 50 100
One-way hash function based on hyper-chaotic cellular neural network 被引量:1
1
作者 杨群亭 高铁杠 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第7期2388-2393,共6页
The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos ... The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corre- sponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability. 展开更多
关键词 one-way hash function HYPER-CHAOS cellular neural network Runge Kutta formula
下载PDF
One-way hash function construction based on the spatiotemporal chaotic system 被引量:2
2
作者 罗玉玲 杜明辉 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期84-93,共10页
Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the ... Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the hash compression function in parallel. The hash compression is constructed based on the spatiotemporal chaos. In each message block, the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function. The final hash value is generated by further compressing the mixed result of all the hash compression vulues. Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key, good statistical properties, and strong collision resistance. 展开更多
关键词 hash value spatiotemporal chaos hash compression function
下载PDF
Security analysis of a one-way hash function based on spatiotemporal chaos 被引量:2
3
作者 王世红 单鹏洋 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第9期79-85,共7页
The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefo... The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions. 展开更多
关键词 COLLISION spatiotemporal chaos hash function
下载PDF
Constructing a one-way hash function based on the unified chaotic system
4
作者 龙敏 彭飞 陈关荣 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第10期3588-3595,共8页
A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way has... A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security. 展开更多
关键词 hash function unified chaotic system CRYPTOGRAPHY
下载PDF
Security Analysis and Improvement of Authentication Scheme Based on a One-way Hash Function and Diffie-Hellman Key Exchange Using Smart Card 被引量:1
5
作者 Kang-seok CHAE Dai-hoon KIM +1 位作者 Jae-duck CHOI Souh-wan JUNG 《Journal of Measurement Science and Instrumentation》 CAS 2010年第4期360-363,共4页
A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing a... A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing attack. In this paper, the author demonstrate that Yoon's scheme is vulnerable to the off-line password guessing attack by using a stolen smart card and the DoS attack by computational load at the re, note system. An improvement of Yoon's scheme to resist the above attacks is also proposed. 展开更多
关键词 AUTHENTICATION guessing attack DIFFIE-HELLMAN smart card
下载PDF
Underwater Pulse Waveform Recognition Based on Hash Aggregate Discriminant Network
6
作者 WANG Fangchen ZHONG Guoqiang WANG Liang 《Journal of Ocean University of China》 SCIE CAS CSCD 2024年第3期654-660,共7页
Underwater pulse waveform recognition is an important method for underwater object detection.Most existing works focus on the application of traditional pattern recognition methods,which ignore the time-and space-vary... Underwater pulse waveform recognition is an important method for underwater object detection.Most existing works focus on the application of traditional pattern recognition methods,which ignore the time-and space-varying characteristics in sound propagation channels and cannot easily extract valuable waveform features.Sound propagation channels in seawater are time-and space-varying convolutional channels.In the extraction of the waveform features of underwater acoustic signals,the effect of high-accuracy underwater acoustic signal recognition is identified by eliminating the influence of time-and space-varying convolutional channels to the greatest extent possible.We propose a hash aggregate discriminative network(HADN),which combines hash learning and deep learning to minimize the time-and space-varying effects on convolutional channels and adaptively learns effective underwater waveform features to achieve high-accuracy underwater pulse waveform recognition.In the extraction of the hash features of acoustic signals,a discrete constraint between clusters within a hash feature class is introduced.This constraint can ensure that the influence of convolutional channels on hash features is minimized.In addition,we design a new loss function called aggregate discriminative loss(AD-loss).The use of AD-loss and softmax-loss can increase the discriminativeness of the learned hash features.Experimental results show that on pool and ocean datasets,which were collected in pools and oceans,respectively,by using acoustic collectors,the proposed HADN performs better than other comparative models in terms of accuracy and mAP. 展开更多
关键词 convolutional channel hash aggregate discriminative network aggregate discriminant loss waveform recognition
下载PDF
A Review of Image Steganography Based on Multiple Hashing Algorithm
7
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
下载PDF
基于多重熵Hash及Box-Cox蓄电池续航时长分析与仿真
8
作者 邓翠艳 齐小刚 +1 位作者 姚旭清 李青云 《通信与信息技术》 2024年第4期18-22,共5页
现代工业生产中,蓄电池是市电停电后通信网络业务能够持续运行的重要保障,是化解网络风险发生的重要一环。针对目前通信行业蓄电池智能化管理水平不高,尤其对于蓄电池的剩余寿命及续航时长无法测算,导致通信机房停电后无法准确预估蓄电... 现代工业生产中,蓄电池是市电停电后通信网络业务能够持续运行的重要保障,是化解网络风险发生的重要一环。针对目前通信行业蓄电池智能化管理水平不高,尤其对于蓄电池的剩余寿命及续航时长无法测算,导致通信机房停电后无法准确预估蓄电池的续航时长。针对该问题,首先设计了一种基于信息熵的多重哈希(Hash)查询方法,然后提出了一种基于对数似然函数优化方法的Box-Cox算法,实现蓄电池时序运维数据续航时长的平稳化处理。实验结果表明对于大量的通信机房运维数据,通过基于熵的多重哈希(Hash)方法进行数据查询结构设计并使用最优化参数的Box-Cox算法可以有效计算得到蓄电池的续航时长。该方法能够将蓄电池机房运维数据转化为蓄电池续航时长生产知识数据,实现通信机房蓄电池能耗的有效管理运营,实际生产实践也证明了该方法的可行性。 展开更多
关键词 多重hash Box-Cox 对数似然函数 蓄电池 续航时长 剩余寿命
下载PDF
基于Simhash算法的题库查重系统的设计与实现
9
作者 熊良钰 邓伦丹 《科学技术创新》 2024年第9期91-94,共4页
Simhash算法是一种基于局部敏感哈希(LSH)的技术,以其快速的计算速度和高度的查重准确性而知名。该算法通过将文本特征转换为二进制码,进而通过计算这些二进制码之间的汉明距离来评估文本的相似度。在文本去重和重复文档检测等多个领域,... Simhash算法是一种基于局部敏感哈希(LSH)的技术,以其快速的计算速度和高度的查重准确性而知名。该算法通过将文本特征转换为二进制码,进而通过计算这些二进制码之间的汉明距离来评估文本的相似度。在文本去重和重复文档检测等多个领域,Simhash算法已经展现出了显著的效果。鉴于此,将Simhash算法应用于题库查重具有很高的可行性和实际应用价值。 展开更多
关键词 Simhash算法 汉明距离 题库查重系统 文本相似度计算 哈希函数
下载PDF
基于变色龙hash的区块链可扩展存储方案 被引量:3
10
作者 胡宁玉 郝耀军 +1 位作者 常建龙 冯丽萍 《计算机应用研究》 CSCD 北大核心 2023年第12期3539-3544,3550,共7页
区块链中的节点以副本形式保存数据,随着时间的推移,区块链中的区块数不断增加,导致节点承受的存储压力随之增大,存储压力成为区块链应用落地的瓶颈之一。为了解决区块链中存储压力问题,提出了基于变色龙hash的区块链可扩展存储方案,该... 区块链中的节点以副本形式保存数据,随着时间的推移,区块链中的区块数不断增加,导致节点承受的存储压力随之增大,存储压力成为区块链应用落地的瓶颈之一。为了解决区块链中存储压力问题,提出了基于变色龙hash的区块链可扩展存储方案,该方案利用节点被攻击成功的概率和改进的温度模型,将区块分为高低安全性的冷热区块;基于变色龙hash算法和改进的Merkle tree,对高安全性的冷区块进行部分节点存储。在存储过程中,除高安全性冷区块的区块体信息被重构外,其余数据保持不变。仿真实验表明,在不改变区块链结构和安全性能的情况下,所提出的方案可减少区块链中数据的存储总量,减少存储节点的存储压力;且区块数量越多,其优势越明显。 展开更多
关键词 区块链 变色龙hash 存储扩展性
下载PDF
基于RS_Hash频繁项集的卫星载荷关联规则算法
11
作者 贾澎涛 温滋 《国外电子测量技术》 北大核心 2023年第2期9-15,共7页
遥测数据是反映卫星健康状态的重要依据,对遥测载荷数据进行关联性分析,在一定程度上能反映出卫星的整体运行情况的好坏。针对传统关联规则算法存在效率低下、占用内存过多的问题,提出一种基于RS_Hash频繁项集的卫星载荷关联规则算法。... 遥测数据是反映卫星健康状态的重要依据,对遥测载荷数据进行关联性分析,在一定程度上能反映出卫星的整体运行情况的好坏。针对传统关联规则算法存在效率低下、占用内存过多的问题,提出一种基于RS_Hash频繁项集的卫星载荷关联规则算法。首先对事务数据库使用动态随机抽样的方法获取样本数据,设计抽样误差和抽样停止规则来确定最优的样本容量;其次将抽取出的样本使用哈希桶来存储频繁项集,进而减少占用的内存,提高算法的运行效率;最后使用3个与载荷数据相似的公开数据集和卫星载荷数据集进行实验,结果表明,在公共数据集上取得了良好的效果,尤其是在具有大数据量级的卫星载荷数据集上效果明显,在不同事务长度和支持度的情况下,相较于Apriori、PCY、SON、FP-Growth、RCM_Apriori和Hash_Cumulate算法,RS_Hash算法在平均时间效率上分别提高了75.81%、49.10%、59.38%、50.22%、40.16%和39.22%。 展开更多
关键词 卫星载荷分析 关联规则 频繁项集 动态随机抽样算法 哈希桶
下载PDF
TOE Hash冲突处理设计与实现 被引量:1
12
作者 许旭晗 张俊杰 +1 位作者 陈彦昊 裴华明 《工业控制计算机》 2023年第3期79-81,共3页
随着以太网速率的不断提高,为了处理TCP/IP协议CPU承受了巨大的负担,因此使用单独的TCP卸载引擎处理TCP数据流显得尤为重要。TCP卸载引擎首先需要对链接进行辨认,而Hash函数作为一种发挥映射作用的函数常常被用于TCP链接的辨认。然而使... 随着以太网速率的不断提高,为了处理TCP/IP协议CPU承受了巨大的负担,因此使用单独的TCP卸载引擎处理TCP数据流显得尤为重要。TCP卸载引擎首先需要对链接进行辨认,而Hash函数作为一种发挥映射作用的函数常常被用于TCP链接的辨认。然而使用Hash函数后将不可避免地产生Hash冲突问题。设计实现的孔雀散列冲突解决方式相较传统一冗余与三冗余结构,分别节省4.1%空间与51.57%空间。在使用同种Hash且填充率为106%的情况下,孔雀散列的冲突解决率相较传统一冗余与三冗余结构分别提升21%与降低1%。在综合考虑使用空间与冲突解决率的情况下该方案有显著优势。 展开更多
关键词 TCP卸载引擎 hash冲突处理 孔雀散列
下载PDF
基于Hash和倒排项集的海上钻井平台隐患关.联分析
13
作者 易军 陈凯 +3 位作者 蔡昆 车承志 周伟 刘洪 《安全与环境学报》 CAS CSCD 北大核心 2023年第4期981-988,共8页
为了充分挖掘海上平台隐患案例中隐患属性与致因之间的关联性,提高对平台隐患风险预测的准确性和时效性,提出了一种基于Hash技术和倒排项集的关联规则挖掘模式。首先针对292条平台结构现场数据的每个隐患属性进行分析提取;其次在多支持... 为了充分挖掘海上平台隐患案例中隐患属性与致因之间的关联性,提高对平台隐患风险预测的准确性和时效性,提出了一种基于Hash技术和倒排项集的关联规则挖掘模式。首先针对292条平台结构现场数据的每个隐患属性进行分析提取;其次在多支持度下,按照多维、多层关联规则挖掘模式挖掘隐患设备、隐患位置、隐患现象等属性的关联规则;然后提出用信息增益来衡量关联规则的有效性;最后,根据挖掘结果分析并总结海上钻井平台隐患特征。结果表明:春季油水分离器常出现缺少保养的隐患,护管常出现未封堵的隐患;一般腐蚀和锈蚀的致因为操作维保不当、防护层剥落,以及防护装置锈蚀严重、脱焊、不符合规范,提高海上平台管理水平可减小现场隐患的发生概率。 展开更多
关键词 安全工程 海上钻井 多维关联规则 APRIORI算法 hash技术
下载PDF
并行耦合动态整数帐篷Hash函数设计
14
作者 刘玉杰 刘建东 +2 位作者 刘博 钟鸣 李博 《计算机应用与软件》 北大核心 2023年第2期296-301,共6页
提出一种基于耦合动态整数帐篷映射的并行Hash函数。针对数据量较大、处理速度较慢等问题,采用MD6算法框架,利用多核处理器技术并行处理数据。同时在压缩函数中,利用双向耦合映像格子模型进行扩散,用动态整数帐篷映射代替传统的逻辑函... 提出一种基于耦合动态整数帐篷映射的并行Hash函数。针对数据量较大、处理速度较慢等问题,采用MD6算法框架,利用多核处理器技术并行处理数据。同时在压缩函数中,利用双向耦合映像格子模型进行扩散,用动态整数帐篷映射代替传统的逻辑函数。实验结果表明,该算法可根据需要获得不同长度的Hash值,使用较短时间即可完成对数据的杂凑处理,同时具有较为理想的混乱与扩散性质,符合Hash函数的各项性能要求。 展开更多
关键词 hash函数 动态整数帐篷映射 并行 耦合映像格子
下载PDF
Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management 被引量:1
15
作者 Lizhe Zhang Yongqiang Huang +1 位作者 Jia Nie Kenian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第11期1467-1488,共22页
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai... System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing. 展开更多
关键词 System-wide information management(SWIM) consortium blockchain consistent hash cross-domain authentication load balancing
下载PDF
基于hash表的华容道算法研究
16
作者 周扬 陈伊琳 +1 位作者 韦妮君 周一诺 《计算机应用文摘》 2023年第1期102-104,109,共4页
目前,华容道算法是基于广度优先或深度优先搜索策略的改进,时间复杂为O(V+E)。为了提高效率,文章利用排列组合算法找到所有开局,再用广度优先算法找到开局的最优解,将所有开局及对应最优解保存在文件中。执行算法时最快可以以O(1)的时... 目前,华容道算法是基于广度优先或深度优先搜索策略的改进,时间复杂为O(V+E)。为了提高效率,文章利用排列组合算法找到所有开局,再用广度优先算法找到开局的最优解,将所有开局及对应最优解保存在文件中。执行算法时最快可以以O(1)的时间复杂度找到最优解。理论分析和实验结果都表明,基于h as h表的求解华容道的算法能明显提高算法效率。 展开更多
关键词 华容道 时间复杂度 hash
下载PDF
利用HASH方法反演美国三次中等地震的震源机制解
17
作者 仇瀚之 张学涛 《山东石油化工学院学报》 2023年第1期19-23,41,共6页
震源机制是了解震源信息及应力场的重要手段。在对HASH(Hardebeck and Shearer)方法的原理进行详细介绍的基础上,利用该方法反演得到美国3次4级以上天然地震的震源机制解。反演结果与美国地质调查局(USGS)结果基本一致,进一步证实该方... 震源机制是了解震源信息及应力场的重要手段。在对HASH(Hardebeck and Shearer)方法的原理进行详细介绍的基础上,利用该方法反演得到美国3次4级以上天然地震的震源机制解。反演结果与美国地质调查局(USGS)结果基本一致,进一步证实该方法对于中等地震反演计算的可靠性。 展开更多
关键词 震源机制 P波初动极性 hash方法 反演 离源角
下载PDF
基于Vision Transformer Hashing的民族布艺图案哈希检索算法研究 被引量:1
18
作者 韩雨萌 宁涛 +1 位作者 段晓东 高原 《大连民族大学学报》 CAS 2023年第3期250-254,共5页
针对民族布艺图案复杂多样、语义提取、图像识别与检索困难等问题,以蜡染图案和织锦图案为例,提出一种图像检索算法,以提高匹配和检索民族布艺图案的准确度。结合民族布艺图案领域知识将民族布艺图案图像进行预处理,使用VIT为主干网络... 针对民族布艺图案复杂多样、语义提取、图像识别与检索困难等问题,以蜡染图案和织锦图案为例,提出一种图像检索算法,以提高匹配和检索民族布艺图案的准确度。结合民族布艺图案领域知识将民族布艺图案图像进行预处理,使用VIT为主干网络在哈希检索算法框架下进行图像检索。该方法优化了深度哈希检索算法,通过自身的自注意力机制提升了提取图案深层语义特征的能力,提高了深度哈希算法检索民族布艺图案的速度和精度。实验结果表明:提出的方法最佳检索精度可以达到95.32%。 展开更多
关键词 图像检索 深度哈希检索 VIT 民族布艺图案检索
下载PDF
Controlling stationary one-way steering in a three-level atomic ensemble
19
作者 彭洁 徐俊 +1 位作者 刘华忠 赖章丽 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第12期249-255,共7页
We propose a scheme for establishing the stationary one-way quantum steering in a three-level Λ-type atomic ensemble. In our system, the cavity modes are generated from two atomic dipole-allowed transitions, which ar... We propose a scheme for establishing the stationary one-way quantum steering in a three-level Λ-type atomic ensemble. In our system, the cavity modes are generated from two atomic dipole-allowed transitions, which are in turn driven by two external classical fields. The atomic ensemble can act as an engineered reservoir to put two cavity modes into a squeezed state by two Bogoliubov dissipation pathways. When the damping rates of the two cavity modes are different,the steady-state one-way quantum steering of the intracavity and output fields is presented by adjusting the normalized detuning. The physical mechanism is analyzed based on a dressed state representation and Bogoliubov mode transformation.The achieved optical one-way quantum steering scheme has potential applications in quantum secret information sharing protocols. 展开更多
关键词 one-way quantum steering ENTANGLEMENT quantum correlation reservoir-engineered method
下载PDF
An Efficient Encrypted Speech Retrieval Based on Unsupervised Hashing and B+ Tree Dynamic Index
20
作者 Qiu-yu Zhang Yu-gui Jia +1 位作者 Fang-Peng Li Le-Tian Fan 《Computers, Materials & Continua》 SCIE EI 2023年第7期107-128,共22页
Existing speech retrieval systems are frequently confronted with expanding volumes of speech data.The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech dat... Existing speech retrieval systems are frequently confronted with expanding volumes of speech data.The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech data to meet users’real-time retrieval requirements.This study proposes an efficient method for retrieving encryption speech,using unsupervised deep hashing and B+ tree dynamic index,which avoid privacy leak-age of speech data and enhance the accuracy and efficiency of retrieval.The cloud’s encryption speech library is constructed by using the multi-threaded Dijk-Gentry-Halevi-Vaikuntanathan(DGHV)Fully Homomorphic Encryption(FHE)technique,which encrypts the original speech.In addition,this research employs Residual Neural Network18-Gated Recurrent Unit(ResNet18-GRU),which is used to learn the compact binary hash codes,store binary hash codes in the designed B+tree index table,and create a mapping relation of one to one between the binary hash codes and the corresponding encrypted speech.External B+tree index technology is applied to achieve dynamic index updating of the B+tree index table,thereby satisfying users’needs for real-time retrieval.The experimental results on THCHS-30 and TIMIT showed that the retrieval accuracy of the proposed method is more than 95.84%compared to the existing unsupervised hashing methods.The retrieval efficiency is greatly improved.Compared to the method of using hash index tables,and the speech data’s security is effectively guaranteed. 展开更多
关键词 Encrypted speech retrieval unsupervised deep hashing learning to hash B+tree dynamic index DGHV fully homomorphic encryption
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部