An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string

Zhang Qiuyu, Xing Pengfei, Huang Yibo, Dong Ruihong, Yang Zhongping

科研成果: 期刊稿件文章同行评审

5 引用 (Scopus)

摘要

According to the situation that speech perceptual hashing methods are not appropriated for real-time speech content authentication in mobile computing environment, a novel DWT-based perceptual hashing algorithm, which uses a combination of time-domain and frequency-domain features, was proposed to protect the speech data in the cloud. Firstly, by discrete wavelet transform (DWT), a new signal in frequency-domain is generated from the original speech signal after pre-processing and intensity-loudness transform (ILT). Secondly, coefficients of low frequency wavelet decomposition are partitioned into equal-sized and non-overlapping blocks, and logarithmic short-time energy of each block is computed to obtain speech signal’s features in frequency-domain. Finally, combined with spectral flux features (SFF) of speech signal in time-domain, a ternary perceptual hashing sequence is created. Experiment results illustrate that ternary form is better to stand for hash digest than binary form, the proposed algorithm has a good robustness against content preserving operations, discrimination, good compaction and high efficiency, and detects the tamper localisation as well.

源语言英语
页(从-至)31-50
页数20
期刊International Journal of Information and Communication Technology
12
1-2
DOI
出版状态已出版 - 2018
已对外发布

指纹

探究 'An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string' 的科研主题。它们共同构成独一无二的指纹。

引用此