TY - JOUR
T1 - An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string
AU - Qiuyu, Zhang
AU - Pengfei, Xing
AU - Yibo, Huang
AU - Ruihong, Dong
AU - Zhongping, Yang
N1 - Publisher Copyright:
Copyright © 2018 Inderscience Enterprises Ltd.
PY - 2018
Y1 - 2018
N2 - According to the situation that speech perceptual hashing methods are not appropriated for real-time speech content authentication in mobile computing environment, a novel DWT-based perceptual hashing algorithm, which uses a combination of time-domain and frequency-domain features, was proposed to protect the speech data in the cloud. Firstly, by discrete wavelet transform (DWT), a new signal in frequency-domain is generated from the original speech signal after pre-processing and intensity-loudness transform (ILT). Secondly, coefficients of low frequency wavelet decomposition are partitioned into equal-sized and non-overlapping blocks, and logarithmic short-time energy of each block is computed to obtain speech signal’s features in frequency-domain. Finally, combined with spectral flux features (SFF) of speech signal in time-domain, a ternary perceptual hashing sequence is created. Experiment results illustrate that ternary form is better to stand for hash digest than binary form, the proposed algorithm has a good robustness against content preserving operations, discrimination, good compaction and high efficiency, and detects the tamper localisation as well.
AB - According to the situation that speech perceptual hashing methods are not appropriated for real-time speech content authentication in mobile computing environment, a novel DWT-based perceptual hashing algorithm, which uses a combination of time-domain and frequency-domain features, was proposed to protect the speech data in the cloud. Firstly, by discrete wavelet transform (DWT), a new signal in frequency-domain is generated from the original speech signal after pre-processing and intensity-loudness transform (ILT). Secondly, coefficients of low frequency wavelet decomposition are partitioned into equal-sized and non-overlapping blocks, and logarithmic short-time energy of each block is computed to obtain speech signal’s features in frequency-domain. Finally, combined with spectral flux features (SFF) of speech signal in time-domain, a ternary perceptual hashing sequence is created. Experiment results illustrate that ternary form is better to stand for hash digest than binary form, the proposed algorithm has a good robustness against content preserving operations, discrimination, good compaction and high efficiency, and detects the tamper localisation as well.
KW - Discrete wavelet transform
KW - DWT
KW - Perceptual hashing
KW - Speech perceptual authentication
KW - Symmetric ternary string
KW - Tamper localisation
UR - http://www.scopus.com/inward/record.url?scp=85042289967&partnerID=8YFLogxK
U2 - 10.1504/IJICT.2018.10008897
DO - 10.1504/IJICT.2018.10008897
M3 - 文章
AN - SCOPUS:85042289967
SN - 1466-6642
VL - 12
SP - 31
EP - 50
JO - International Journal of Information and Communication Technology
JF - International Journal of Information and Communication Technology
IS - 1-2
ER -