Speech content authentication and tamper recovery method based on modifying least significant digit weight

A minimally effective, voice content technology, applied in voice analysis, instrumentation, etc., to solve problems such as low compression efficiency, poor quality of recovered voice, loss, etc.

Active Publication Date: 2018-05-04
SOUTHWEST JIAOTONG UNIV
View PDF10 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage of this method is that the receiver can quickly extract the compressed signal of the tampered speech frame from other speech frames and restore its approximate original content, which solves the problem of a large number of calculations in the restoration process, but the compression efficiency of this method is relatively low. Low, the amount of compressed signal that needs to be embedded is large. In addition, a lot of details in the original speech signal are lost during the compression process, resulting in relatively poor quality of the restored speech

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Speech content authentication and tamper recovery method based on modifying least significant digit weight
  • Speech content authentication and tamper recovery method based on modifying least significant digit weight
  • Speech content authentication and tamper recovery method based on modifying least significant digit weight

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings.

[0057] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0058] 1. Steps of the fragile watermark algorithm modifying the weight of the least significant digit:

[0059] (1) Assume that the original speech segment sampling value is x={x 1 ,x 2 ,...,x n ,...,x N}, the watermark information is w(w∈[0,2 N -1]). First, calculate the least significant number of digits of the speech signal according to the following formula, y={y 1 ,y 2 ,...,y n ,...,y N} is the least significant number of digits of the speech signal x.

[0060] the y n =|x n |mod10

[0061] (2) Calculate the weight value c of the segment by the least significant bit value y of the signal x, and its value range is [0,2 N -1].

[0062]

[0063] (3) Calculate the differenc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a speech content authentication and tamper recovery method based on modifying a least significant digit weight. On the basis of characteristics of a speech signal as well as asensitive position, namely least significant digit, of speech, a novel speech fragile watermarking algorithm is designed; and the method comprises the fragile watermarking algorithm based on modifyingthe least significant digit weight of a speech sampling point, a watermark generating and embedding part based on speech contents, and a speech content authentication and recovery part. In comparisonwith an existing speech content authentication watermarking algorithm, the method provided by the invention achieves full use of such characteristics of a speech coding technology, speech sampling point least significant digit weight sensitivity and the like, so that the sensitivity and fragility of the method to tamper attack are guaranteed, and meanwhile, effective recovery of a tampered regionin the case of tamper is also guaranteed; therefore, the invention is conducive to promotion and application of the method.

Description

technical field [0001] The invention relates to the technical field of integrity authentication and tampering recovery of digital voice content, in particular to a voice content authentication and tampering recovery method based on modifying the weight of the least significant digit. Background technique [0002] As we all know, speech signal is a special audio signal, which often contains sensitive information. Once the sensitive content is damaged, its utilization rate will be reduced. In real life, people not only hope to verify the authenticity of a piece of voice content, but also hope to regain the meaning expressed by the attacked part of the voice when the voice is tampered with. That is, the integrity authentication and tampering recovery of digital voice content can be realized at the same time. [0003] At present, the research on the integrity authentication of digital voice content has made great progress, but there are relatively few literatures on the recover...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L19/018
CPCG10L19/018
Inventor 王宏霞钱清崔允贺
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products