Encryption speech content authentication method based on Hash features

A technology of encrypted voice and authentication methods, applied in voice analysis, instruments, etc., can solve the problems of feature disappearance, few encrypted voice content authentication schemes, and unapplied encrypted voice

Active Publication Date: 2018-12-07
CHENGDU UNIV OF INFORMATION TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these techniques have not been systematically studied and have not been applied to encrypted speech
Also, there are few content authentication schemes for encrypted voice
[0004] In addition, there are still some limitations in the field of speech encryption, such as the content of encrypted speech is random, the features of the original speech disappear, and most of the conventional methods for extracting features from the original speech cannot be directly applied to the field of speech encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption speech content authentication method based on Hash features
  • Encryption speech content authentication method based on Hash features
  • Encryption speech content authentication method based on Hash features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0075] Such as figure 1 Shown, the encrypted voice content authentication method based on hash feature of the present invention comprises the following steps:

[0076] S1) input original speech M={m i ,1≤i≤I}, where m i ∈(-32768,32767);

[0077] S2) generate encrypted speech by stream cipher RC4 and Logistic mapping, this step includes:

[0078] S2.1) Transform a sample value m i into 16-bit binary {v i,15 ,v i,14...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to an encryption speech content authentication method based on Hash features. The method comprises the steps of: after original speech is input, performing encryption forthe original speech through Logistic mapping and stream cipher RC4 to generate encrypted speech, performing framing for the encrypted speech, executing integer wavelet transform (IWT) and discrete cosine transform (DCT) for each frame of the encrypted speech, comparing a mean value and a variance of a low-frequency DCT coefficient to calculate Hash features, and employing differential expansion to take the Hash features as watermark embedded into the high-order bit of a detail coefficient of the IWT; and executing inverse IWT transform for an IWT approximation coefficient and the detail coefficient comprising the Hash features to obtain the encrypted speech comprising watermark, and extracting the Hash features and the reconstructed Hash features from the encrypted speech comprising watermark to perform comparison to perform content authentication for the encrypted speech. The encryption speech content authentication method improves the robustness of the speech content authenticationin the cloud computing, can accurately located the tempered speech frame and is wider in the application range in the practical application.

Description

technical field [0001] The invention belongs to the field of encrypted voice content authentication, in particular to a hash feature-based encrypted voice content authentication method. Background technique [0002] Speech signal is an important multimedia signal, which can be applied to scenarios such as military command, judicial department recording evidence and online audio instruction. Since voice files require a lot of storage space, many voice files are stored in the cloud. However, this is not safe because anyone can download, read and tamper with the content of the voice file. Therefore, it is very important to protect the voice file content and judge the integrity of the voice file in cloud computing. [0003] Encryption is one of the most effective methods of voice content protection because it converts raw data into incomprehensible data. For information security and privacy protection, data is usually encrypted before being uploaded and transmitted to the clo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L19/018
CPCG10L19/018
Inventor 李孝杰史沧红吴锡吕建成王录涛郭峰伍贤宇罗超
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products