Phonetic empathy Hash content authentication method capable of implementing tamper localization

A technology of perceptual hashing and authentication methods, applied in speech analysis, instruments, etc., can solve the problems that tampering and positioning cannot be realized, and the efficiency is not very high, and achieve the effect of high authentication efficiency and simple construction process

Inactive Publication Date: 2013-02-06
LANZHOU UNIVERSITY OF TECHNOLOGY
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These algorithms can effectively detect malicious tampering, but

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Phonetic empathy Hash content authentication method capable of implementing tamper localization
  • Phonetic empathy Hash content authentication method capable of implementing tamper localization
  • Phonetic empathy Hash content authentication method capable of implementing tamper localization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a phonetic empathy Hash content authentication method capable of implementing tamper localization. The method comprises the following steps: pre-processing a voice signal, carrying out 10-order linear prediction analysis on each frame of the voice signal, and acquiring an LSP (line spectral pair) coefficient through the discrete Fourier transformation as the empathy characteristics; grouping the voice data in sequence, combining LSP coefficient weighted expectations of each group of the voice data as the final authentication data, and compressing the authentication data volume through a Hash structure; and finally, quickly authenticating the voice contents through the Hash match. The method can keep robustness for the operations such as changing the sound volume, resounding and resampling, is sensitive to malicious operations such as replacement and deletion, can accurately locate the tamper area, has the characteristics of low authentication data volume and high operation efficiency, and is suitable for resource-limited voice communication terminals.

Description

technical field [0001] The invention belongs to the field of multimedia information security. Based on the voice perception hash technology, an efficient voice content authentication method capable of realizing accurate positioning of tampered areas is proposed, which can be used for content authentication in voice communication and can realize accurate positioning of tampered areas. Background technique [0002] With the rapid development of digital signal processing technology, mobile communication technology and the Internet and other technologies, the forgery of audio data tends to be concealed and can be carried out at a very low cost. Therefore, the demand for content integrity authentication of audio data is increasing. Voice is an important part of audio, and its integrity is very important in applications such as news reports, telephone communications, financial transactions, and e-government affairs. The semantics of speech can be changed by simply rearranging or ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L19/087G10L25/45
Inventor 张秋余邸燕君黄羿博陈海燕刘扬威省鹏飞杨仲平
Owner LANZHOU UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products