Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    An Efficient Encrypted Speech Retrieval Based on Unsupervised Hashing and B+ Tree Dynamic Index

    Qiu-yu Zhang*, Yu-gui Jia, Fang-Peng Li, Le-Tian Fan

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 107-128, 2023, DOI:10.32604/cmc.2023.038911

    Abstract Existing speech retrieval systems are frequently confronted with expanding volumes of speech data. The dynamic updating strategy applied to construct the index can timely process to add or remove unnecessary speech data to meet users’ real-time retrieval requirements. This study proposes an efficient method for retrieving encryption speech, using unsupervised deep hashing and B+ tree dynamic index, which avoid privacy leakage of speech data and enhance the accuracy and efficiency of retrieval. The cloud’s encryption speech library is constructed by using the multi-threaded Dijk-Gentry-Halevi-Vaikuntanathan (DGHV) Fully Homomorphic Encryption (FHE) technique, which encrypts the original speech. In addition, this research employs… More >

  • Open Access

    ARTICLE

    Secure Content Based Image Retrieval Scheme Based on Deep Hashing and Searchable Encryption

    Zhen Wang, Qiu-yu Zhang*, Ling-tao Meng, Yi-lin Liu

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6161-6184, 2023, DOI:10.32604/cmc.2023.037134

    Abstract To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security, retrieval efficiency, and retrieval accuracy. This research suggests a searchable encryption and deep hashing-based secure image retrieval technique that extracts more expressive image features and constructs a secure, searchable encryption scheme. First, a deep learning framework based on residual network and transfer learning model is designed to extract more representative image deep features. Secondly, the central similarity is used to quantify and construct the deep hash sequence of features. The Paillier homomorphic encryption encrypts the deep hash sequence to build a high-security and… More >

  • Open Access

    ARTICLE

    Enhanced Disease Identification Model for Tea Plant Using Deep Learning

    Santhana Krishnan Jayapal1, Sivakumar Poruran2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1261-1275, 2023, DOI:10.32604/iasc.2023.026564

    Abstract Tea plant cultivation plays a significant role in the Indian economy. The Tea board of India supports tea farmers to increase tea production by preventing various diseases in Tea Plant. Various climatic factors and other parameters cause these diseases. In this paper, the image retrieval model is developed to identify whether the given input tea leaf image has a disease or is healthy. Automation in image retrieval is a hot topic in the industry as it doesn’t require any form of metadata related to the images for storing or retrieval. Deep Hashing with Integrated Autoencoders is our proposed method for… More >

Displaying 1-10 on page 1 of 3. Per Page