Phonetic empathy Hash content authentication method capable of implementing tamper localization

A technology for perceiving hashing and authentication methods, applied in speech analysis, instruments, etc., can solve problems such as low efficiency and inability to achieve tampering and positioning, and achieve the effect of simple construction process and high authentication efficiency

Inactive Publication Date: 2014-07-09
LANZHOU UNIVERSITY OF TECHNOLOGY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These algorithms can effectively detect malicious tampering, but the efficiency is not very high, and tampering cannot be achieved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Phonetic empathy Hash content authentication method capable of implementing tamper localization
  • Phonetic empathy Hash content authentication method capable of implementing tamper localization
  • Phonetic empathy Hash content authentication method capable of implementing tamper localization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention is a voice perception hash content authentication method that can realize tampering and positioning, and the steps are as follows:

[0020] (1) Divide the speech signal A into frames, divide it into equal-length frames of 20 ms, use the Hamming window for windowing, and frame shift to 15 ms;

[0021] (2) Perform LPC analysis on each frame of speech signal to obtain its 10th order LPC coefficient;

[0022] (3) Convert each frame of LPC coefficients into LSP coefficients, and the LSP coefficients of each frame of speech signals are combined into matrix A for one row;

[0023] (4) Group the LSP coefficients sequentially, and decompose the weighted matrix A of each group to obtain a new matrix A J ;

[0024] (5) Generate hash vector h, ;in is the value of the nth-order LSP coefficient of the i-th frame data;

[0025] (6) Hash matching: According to the above steps, first extract the perceptual features from the sender, perform calculations and c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A voice-aware hash content authentication method that can realize tampering and positioning. First, the voice signal is preprocessed, and each frame of voice signal is subjected to 10-order linear predictive analysis, and the line spectrum pair LSP coefficient is obtained by the discrete Fourier transform method. As a perceptual feature; then the voice data is grouped sequentially, and the expected sequence weighted by the LSP coefficients of each group of voices is combined as the final authentication data, and the amount of authentication data is compressed by hash construction; finally, the voice content is realized by hash matching. fast authentication. This method is robust to content maintenance operations such as changing volume, echo, and resampling, and is sensitive to malicious operations such as replacement and deletion. It can accurately locate tampered areas, and has the characteristics of small authentication data and high operating efficiency. For resource-constrained voice communication terminals.

Description

technical field [0001] The invention belongs to the field of multimedia information security. Based on the voice perception hash technology, an efficient voice content authentication method capable of realizing accurate positioning of tampered areas is proposed, which can be used for content authentication in voice communication and can realize accurate positioning of tampered areas. Background technique [0002] With the rapid development of digital signal processing technology, mobile communication technology and the Internet and other technologies, the forgery of audio data tends to be concealed and can be carried out at a very low cost. Therefore, the demand for content integrity authentication of audio data is increasing. Voice is an important part of audio, and its integrity is very important in applications such as news reports, telephone communications, financial transactions, and e-government affairs. The semantics of speech can be changed by simply rearranging or r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G10L19/087G10L25/45
Inventor 张秋余邸燕君黄羿博陈海燕刘扬威省鹏飞杨仲平
Owner LANZHOU UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products