Sensing Hash value extracting method and sensing Hash value authenticating method for voice sensing Hash authentication
A technology of perceptual hashing and extraction methods, applied in speech analysis, instruments, etc., can solve problems such as poor robustness, and achieve the effect of good robustness, improved robustness and discrimination
Inactive Publication Date: 2013-01-16
LANZHOU UNIVERSITY OF TECHNOLOGY
View PDF4 Cites 17 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More
Abstract
Disclosed are a sensing Hash value extracting method and a sensing Hash value authenticating method for voice sensing Hash authentication. According to the characteristics of LPC (linear prediction coefficients), robustness of an LPC method is improved by optimizing the LPC method and performing three steps of optimizing and blocking of the LPC and disintegrating matrix of parameters after blocking, the optimized LPC are high in robustness and calculating efficiency, and robustness of a sensing Hash sequence formed is improved as well. The sensing Hash value calculated by the optimized LPC maintains the advantages of good instantaneity of a simple LPC method while having good robustness for attacks to the voice during transmission.
Description
technical field [0001] The invention belongs to the field of multimedia information security, and specifically relates to a method for extracting and authenticating voice-perceptual hash features based on linear prediction analysis (Linear Prediction Coefficients, LPC), which can be used for content authentication and speaker authentication of voice signals during voice communication calls . Background technique [0002] Voice is the most important communication tool for human beings. It is natural, convenient, accurate and efficient. With the rapid development of modern network technology and multimedia technology, people get more and more multimedia information from the network. As the most natural, effective and convenient means for human beings to exchange information, voice information enables people in any area on the earth to make phone calls anytime and anywhere, and people are getting closer and closer to each other. The existing form of voice has also been exte...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More
IPC IPC(8): G10L19/087
Inventor 张秋余黄羿博邸燕君刘扬威杨仲平省鹏飞
Owner LANZHOU UNIVERSITY OF TECHNOLOGY
Who we serve
- R&D Engineer
- R&D Manager
- IP Professional
Why Patsnap Eureka
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com