A Hash Feature-Based Encrypted Voice Content Authentication Method

A technology of encrypted voice and authentication method, which is applied in voice analysis, instruments, etc., and can solve problems such as unencrypted voice, few encrypted voice content authentication schemes, and conventional methods that cannot be directly applied to the field of voice encryption.

Active Publication Date: 2019-11-15
CHENGDU UNIV OF INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these techniques have not been systematically studied and have not been applied to encrypted speech
Also, there are few content authentication schemes for encrypted voice
[0004] In addition, there are still some limitations in the field of speech encryption, such as the content of encrypted speech is random, the features of the original speech disappear, and most of the conventional methods for extracting features from the original speech cannot be directly applied to the field of speech encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Hash Feature-Based Encrypted Voice Content Authentication Method
  • A Hash Feature-Based Encrypted Voice Content Authentication Method
  • A Hash Feature-Based Encrypted Voice Content Authentication Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0075] like figure 1 Shown, the encrypted voice content authentication method based on hash feature of the present invention comprises the following steps:

[0076] S1) input original speech M={m i ,1≤i≤I}, where m i ∈(-32768,32767);

[0077] S2) generate encrypted speech by stream cipher RC4 and Logistic mapping, this step includes:

[0078] S2.1) Transform a sample value m i into 16-bit binary {v i,15 ,v i,14 ,....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention involves an encrypted voice content authentication method based on hash special symbols. It includes: after entering the original voice, encrypted the original voice through the Logistic mapping and flow password RC4 to generate encrypted voice.Frame encrypted voice execution integer wavelet transformation and discrete string transform, calculate the Hashtter signs through the mean and variance of a relatively low -frequency DCT coefficient, use the differential extension to embed the Hagi symbol into the high -level bit of the details coefficient of IWT; then to the IWT IWTThe approximate coefficient and the detailed coefficient containing the hash special sympathetic coefficient execute the inverse IWT change to obtain the encrypted voice containing the watermark, and the Hagto symbol of the Hagt signs and the reconfuctant of the Hydal signs from the encrypted voice containing watermarks is compared to compare the content certification of the encrypted voice.The present invention improves the robustness of the voice content certification in cloud computing, which can accurately locate the tampering of the voice frames, and has a wider range of applications in practical applications.

Description

technical field [0001] The invention belongs to the field of encrypted voice content authentication, in particular to a hash feature-based encrypted voice content authentication method. Background technique [0002] Speech signal is an important multimedia signal, which can be applied to scenarios such as military command, judicial department recording evidence and online audio instruction. Since voice files require a lot of storage space, many voice files are stored in the cloud. However, this is not safe because anyone can download, read and tamper with the content of the voice file. Therefore, it is very important to protect the voice file content and judge the integrity of the voice file in cloud computing. [0003] Encryption is one of the most effective methods of voice content protection because it converts raw data into incomprehensible data. For information security and privacy protection, data is usually encrypted before being uploaded and transmitted to the clo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G10L19/018
CPCG10L19/018
Inventor 李孝杰史沧红吴锡吕建成王录涛郭峰伍贤宇罗超
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products