Pseudo-Zernike moment based voice content authentication method
A technology of voice content and authentication method, which is applied in voice analysis, instruments, etc., can solve the problems of large amount of original audio changes, algorithm loss of copyright protection, original audio signal quality damage, etc., to achieve enhanced security, easy practical application, and reduce The effect of transmission bandwidth
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] The technical solution of the present invention will be further described below in combination with appendices and embodiments.
[0020] 1. Generation and embedding of watermark:
[0021] (1) Framing of voice data and division of voice segments in each frame. The original speech signal A={a(l), 1≤l≤LA+K} is divided into P frames (K is used as the key of the watermark system), and the length of each frame is I=LA / P, and the i-th frame is recorded as A (i) (i=1, 2, . . . , P). Each frame is equally divided into N segments, and the length of each segment is I / N. The jth segment of the i-th frame is recorded as A(i, j), 1≤i≤P, 1≤j≤N.
[0022] (2) DCT transformation. Perform DCT transformation on A(i, j), D(i, j) represents the DCT coefficient of the j-th segment of the i-th frame, and the DCT coefficient of the first N / 2 segment of the i-frame is recorded as D 1 (i,j).
[0023] (3) Calculate n-order m-fold pseudo Zernike moments. Will D 1 the first m of (i,j) 1 ×m ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 