Music authentication method and device, equipment and medium
A music and authentication technology, applied in the Internet field, can solve problems such as low efficiency and poor accuracy, and achieve the effect of reducing costs, improving efficiency and accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0152] As a possible implementation, the method also includes:
[0153] For each character contained in the target word, if it is determined that the character matches the preconfigured character to be replaced, the character is replaced according to the target character corresponding to the preconfigured matching character to be replaced.
[0154]Because it may also appear that the song information of the infringing music is to convert the song information of the original music into simplified and traditional characters, or to replace the upper and lower case of the English contained in the song information of the original music, or to replace the upper and lower case letters contained in the song information of the original music The symbols of the original music are replaced by similar symbols, or the characters contained in the song information of the original music are replaced by pinyin, which makes it impossible to accurately identify the infringing music and reduces the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


