全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于MFCC相关系数的语音感知哈希认证算法

DOI: 10.13190/j.jbupt.2015.02.016, PP. 89-93

Keywords: 感知哈希,梅尔频率倒谱系数,语音认证,相关系数,篡改检测

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出了一种基于梅尔频率倒谱系数相关性的语音感知哈希内容认证算法.该算法提取分段语音的声纹梅尔频率倒谱系数作为感知特征.为提高算法的安全性,算法利用伪随机序列作为密钥,计算得到梅尔频率倒谱系数与伪随机之间的相关度,最后量化相关值并加密生成感知哈希序列.语音认证过程中,采用相似性度量函数用来衡量哈希序列之间的距离,同时与汉明距离方法进行了比较.仿真结果表明,该算法对语音内容保持操作,如重采样、MP3压缩等具有较好的鲁棒性,相似性度量函数也对语音篡改检测定位具有较高的灵敏性.

References

[1]  牛夏牧, 焦玉华. 感知哈希综述[J]. 电子学报, 2008, 36(7): 1405-1411. Niu Xiamu, Jiao Yuhua. An overview of perceptual Hashing[J]. Acta Electronic Sinica, 2008, 36(7): 1405-1411.
[2]  Tang Zhenjun, Zhang Xianquan, Huang Liyan, et al. Robust image Hashing using ring-based entropies[J]. Signal Processing, 2013, 93(7): 2061-2069.
[3]  Li Yuenan, Lu Zheming, Zhu Ce, et al. Robust image Hashing based on random Gabor filtering and dithered lattice vector quantization[J]. Image Processing, IEEE Transactions on, 2012, 21(4): 1963-1980.
[4]  陈慧婷, 覃团发, 唐振华, 等. 综合纹理统计模型与全局主颜色的图像检索方法[J]. 北京邮电大学学报, 2011, 34 (s1): 100-103. Chen Huiting, Qin Tuanfa, Tang Zhenhua, et al. A method of image retrivals based on texture probability statistics and global dominant color[J]. Journal of Beijing University of Posts and Telecommunications, 2011, 34(s1): 100-103.
[5]  Jiao Yuhua, Ji Liping, Niu Xiamu. Robust speech Hashing for content authentication[J]. Signal Processing Letters, IEEE, 2009, 16(9): 818-821.
[6]  Chen Ning, Wan Wanggen. Robust speech Hash function[J]. ETRI Journal, 2010, 32(2): 345-347.
[7]  Chen Ning, Wan Wanggen. Speech Hashing algorithm based on short-time stability[C] //Artificial Neural Networks-ICANN 2009. Cyprus: Artificial Neural Networks, 2009: 426-434.
[8]  Nouri M, Farhangian N. Conceptual authentication speech hashing base upon hypotr- ochoid graph[C]//Telecommunications (IST), Sixth International Symposium on. Tehran: IEEE, 2012: 1136-1141.
[9]  Tang Zhenjun, Wang Shuozhong, Zhang Xinpeng, et al. Structural feature-based image hashing and similarity metric for tampering detection[J]. Fundamenta Informaticae, 2011, 106(1): 75-91.
[10]  Chen Ning, Wan Wanggen. Robust audio hashing based on discrete-wavelet-transform and non-negative matrix factorization[J]. Communications IET, 2010, 4(14): 1722-1731.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133