bullet Sensors & Transducers Journal

    (ISSN 1726-5479)

205.767

2008 e-Impact Factor

25 Top Downloaded Articles

Best Selling Articles 2012

Journal Subscription 2014

Editorial Calendar

Submit an Article

Editorial Board

Current Issue

S&T journal's cover

Sensors & Transducers Journal 2011

Sensors & Transducers Journal 2010

Sensors & Transducers Journal 2009

Sensors & Transducers Journal 2008

Sensors & Transducers Journal 2007

2000-2002 S&T e-Digest Contents

2003 S&T e-Digest Contents

2004 S&T e-Digest Contents

2005 S&T e-Digest Contents

2006 S&T e-Digest Contents

 

Best Articles 2011

 

 

 

Vol. 161, Issue 12, December 2013, pp. 375-382

 

Bullet

 

A Robust Content Authentication Algorithm of Speech Based on Perceptual Hashing
 
Rui-Hong DONG, Yan-Jun DI, Qiu-Yu ZHANG

School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
Tel.: 13919809300, fax: (0931) 2976013
E-mail: dongrh@lut.cn

 

Received: 18 September 2013   /Accepted: 22 November 2013   /Published: 30 December 2013

Digital Sensors and Sensor Sysstems

 

Abstract: To solve the problem of real-time authenticating in traditional speech authentication algorithms, an efficient speech content authentication algorithm of perceptual hashing is proposed. Firstly, the speech signal is preprocessed, linear prediction analysis is performed on each frame to get its 10-th order LPCs and then transform them into line spectrum pair (LSP) coefficients by Discrete Fourier Transform(DFT) as perception characteristics; Secondly, speech data are divided into groups orderly, combinative the weighted expectations of each group' LSP coefficients to be the authentication data, and the quantity of authentication data are compressed through hashing construction; Finally it realize the fast authentication through hashing matching. Experiment results show that the algorithm is robust to content preserving operations, such as changing volume, echo, resampling, etc. And it is fragile to malicious operations including replacing, deleting, etc, and also with the ability of locating the tampered position precisely. It has the properties of small authentication data and high running efficiency and applies to limited-sources communication terminals.

 

Keywords: Line spectrum pair (LSP), Perceptual hashing, Robustness, Speech content authentication, Tamper localization.

 

 

Buy this article online (it will be send to you in the pdf format by e-mail) or subscribe Sensors & Transducers journal

(12 issues per year plus special issues; 40 % discount for payment IFSA Members):

 

 

Buy this article for
14.95 $ US:

 

 
 

 

 

Download <here> the Library Journal Recommendation Form

 

 

Read more about Wireless Sensor Networks

 

 

 

 

 


1999 - 2013 Copyright , International Frequency Sensor Association (IFSA). All Rights Reserved.


Home - News - Links - Archives - Tools - Voltage-to-Frequency Converters - Standardization - Patents - Marketplace - Projects - Wish List - e-Shop - Sensor Jobs - Membership - Videos - Publishing - Site Map - Subscribe - Search

 Members Area -Sensors Portal -Training Courses - S&T Digest - For advertisers - Bookstore - Forums - Polls - Submit Press Release - Submit White Paper - Testimonies - Twitter - Facebook - LinkedIn