Audio cognate tampering detection method applying inter-frame amplitude spectrum correlation of bytes
A technology of tamper detection and amplitude spectrum, which is applied in speech analysis, instruments, etc., to achieve the effect of improving accuracy and reducing computing time
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0039] Such as figure 1 Shown is the flow chart of the present invention, including eight steps, respectively, audio pre-emphasis, frame windowing, calculating the zero-crossing rate of each frame, separating bytes, eliminating short bytes, and calculating the amplitude of each frame between two bytes Spectrum similarity, judging byte copy and paste relationship and tampering location.
[0040] In this embodiment, a section of audio in WAV format is used as the analysis object, and the process of judging according to the present invention is as follows: figure 2 As shown, it is the original audio waveform diagram, and the voice content is a human speaking "one, two, three, four, three, four". Such as image 3 As shown, in order to tamper with the audio waveform diagram, the voice content is "one two three four, one two three four", in which the 5th and 6th bytes are copied and pasted from the 1st and 2nd bytes, that is, the There is a copy relationship between 1 and the 5t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


