Unlock instant, AI-driven research and patent intelligence for your innovation.

Audio cognate tampering detection method applying inter-frame amplitude spectrum correlation of bytes

A technology of tamper detection and amplitude spectrum, which is applied in speech analysis, instruments, etc., to achieve the effect of improving accuracy and reducing computing time

Active Publication Date: 2018-09-07
SOUTH CHINA UNIV OF TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are serious consequences when criminals use distorted doctored audio for courtroom evidence, departmental confidential information, and more

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Audio cognate tampering detection method applying inter-frame amplitude spectrum correlation of bytes
  • Audio cognate tampering detection method applying inter-frame amplitude spectrum correlation of bytes
  • Audio cognate tampering detection method applying inter-frame amplitude spectrum correlation of bytes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] Such as figure 1 Shown is the flow chart of the present invention, including eight steps, respectively, audio pre-emphasis, frame windowing, calculating the zero-crossing rate of each frame, separating bytes, eliminating short bytes, and calculating the amplitude of each frame between two bytes Spectrum similarity, judging byte copy and paste relationship and tampering location.

[0040] In this embodiment, a section of audio in WAV format is used as the analysis object, and the process of judging according to the present invention is as follows: figure 2 As shown, it is the original audio waveform diagram, and the voice content is a human speaking "one, two, three, four, three, four". Such as image 3 As shown, in order to tamper with the audio waveform diagram, the voice content is "one two three four, one two three four", in which the 5th and 6th bytes are copied and pasted from the 1st and 2nd bytes, that is, the There is a copy relationship between 1 and the 5t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an audio cognate tampering detection method applying the inter-frame amplitude spectrum correlation of bytes. The method includes the following steps of: carrying out audio pre-emphasis; performing framing and windowing; calculating the zero-crossing rate of each frame; separating bytes; eliminating short bytes; and calculating the amplitude spectrum similarity of each frame between two bytes; judging a byte copy and paste relationship; and positioning tampering. The method of the invention has the advantages of high detection accuracy, high positioning accuracy and lowcomputational complexity.

Description

technical field [0001] The invention relates to the technical field of audio forensics, in particular to an audio homologous tampering detection method using amplitude spectrum correlation between byte frames. Background technique [0002] With the widespread use and maturity of multimedia technology, it is easier for people to obtain information, and the problem of how to verify the integrity and reliability of multimedia information arises. How to effectively detect tampering of multimedia data has become an important research topic in the field of information security. Compared with images and videos, tampering detection for digital audio is less researched. For audio tampering, homologous copy-paste tampering is the easiest and most common. A tamperer changes the true semantics of the audio by copying and pasting a segment of the audio elsewhere in the audio. When criminals use distorted doctored audio for courtroom evidence, departmental confidential information, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G10L19/018G10L25/18G10L25/24G10L25/45
CPCG10L19/018G10L25/18G10L25/24G10L25/45
Inventor 胡永健余颖娟刘琲贝贺前华
Owner SOUTH CHINA UNIV OF TECH