Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Symmetrical ternary string represented voice perception Hash sequence constructing and authenticating method

A technology of perceptual hashing and sequence construction, applied in voice analysis, instruments, etc., to achieve the effects of improving operating efficiency, reducing computational complexity, and reducing data volume

Inactive Publication Date: 2014-11-05
LANZHOU UNIVERSITY OF TECHNOLOGY
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a voice-aware hash sequence construction and authentication method represented by a symmetrical ternary string, which solves the problem of small-scale tampering and positioning of the voice-aware hash authentication algorithm, overcomes the weakness of the binary hash sequence, and effectively Improve the efficiency of the authentication algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetrical ternary string represented voice perception Hash sequence constructing and authenticating method
  • Symmetrical ternary string represented voice perception Hash sequence constructing and authenticating method
  • Symmetrical ternary string represented voice perception Hash sequence constructing and authenticating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] specific implementation plan

[0054] The present invention is a speech perception hash sequence construction and authentication method represented by a symmetrical ternary string, and its steps are:

[0055] (1) For audio signals S Perform pre-emphasis processing;

[0056] (2) Perform loudness-intensity transformation (ILT) on the pre-emphasized signal;

[0057] (3) Discrete wavelet transform is carried out to the signal transformed by ILT, and the low-frequency coefficients of wavelet decomposition are extracted;

[0058] (4) Carry out non-overlapping blocks on the low-frequency coefficients of wavelet decomposition, the block length is M, and the number of blocks is N 0 , get the matrix T;

[0059] (5) Calculate the logarithmic short-term energy of the matrix T row, and obtain the logarithmic short-term energy characteristic parameter vector H 1 ;

[0060] (6) Perform band-pass filtering on the pre-emphasized signal;

[0061] (7) Extract the time-domain spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a symmetrical ternary string represented voice perception Hash sequence constructing and authenticating method. The method comprises the steps that firstly, overall discrete wavelet transforming (DWT) is carried out on voice signals produced after preprocessing and intensity-loudness transformation (ILT); secondly, non-overlapping partitioning is carried out on the low-frequency part of the voice signals produced after DWT, and short-time logarithm energy of blocks is calculated to obtain the signal frequency-domain features; lastly, a final ternary perception Hash sequence is generated based on the time domain spectrum flux features (SFF) of the voice signals, and the voice frequency content is quickly authenticated through Hash matching. The symmetrical ternary string representation of the perception Hash abstract is superior to that of the binary form, the common voice content is operated between the robustness and the difference in a balanced mode, the time complexity of the algorithm is low, efficiency and the abstraction are high, precise manipulation detecting and positioning can be achieved, and the method can be used for authenticating a mobile voice communication terminal with bandwidth resources limited in real time.

Description

technical field [0001] The invention belongs to the field of multimedia information security, and in particular relates to a voice perception hash sequence construction and authentication method represented by a symmetrical ternary string. The invention adopts the symmetrical ternary string to construct the perceptual hash sequence, which can be effectively applied to realize content authentication, speaker authentication and retrieval in the process of mobile voice communication call, and can realize small-scale tampering detection and positioning. Background technique [0002] With the rapid development of information technology and Internet technology, audio digital works can be recorded, disseminated and preserved indefinitely, playing an important role in the long-distance communication system. However, people can edit and modify digital products with the help of multimedia software (such as Cool Edit), coupled with the openness of communication channels such as wireles...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G10L19/06G10L19/00
Inventor 张秋余省鹏飞彭铎黄羿博杨仲平余爽任占伟
Owner LANZHOU UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products