bullet Sensors & Transducers Journal

    (ISSN 1726-5479)


2008 e-Impact Factor

25 Top Downloaded Articles

Best Selling Articles 2012

Journal Subscription 2014

Editorial Calendar

Submit an Article

Editorial Board

Current Issue

S&T journal's cover

Sensors & Transducers Journal 2011

Sensors & Transducers Journal 2010

Sensors & Transducers Journal 2009

Sensors & Transducers Journal 2008

Sensors & Transducers Journal 2007

2000-2002 S&T e-Digest Contents

2003 S&T e-Digest Contents

2004 S&T e-Digest Contents

2005 S&T e-Digest Contents

2006 S&T e-Digest Contents


Best Articles 2011




Vol. 161, Issue 12, December 2013, pp. 375-382




A Robust Content Authentication Algorithm of Speech Based on Perceptual Hashing
Rui-Hong DONG, Yan-Jun DI, Qiu-Yu ZHANG

School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
Tel.: 13919809300, fax: (0931) 2976013
E-mail: dongrh@lut.cn


Received: 18 September 2013   /Accepted: 22 November 2013   /Published: 30 December 2013

Digital Sensors and Sensor Sysstems


Abstract: To solve the problem of real-time authenticating in traditional speech authentication algorithms, an efficient speech content authentication algorithm of perceptual hashing is proposed. Firstly, the speech signal is preprocessed, linear prediction analysis is performed on each frame to get its 10-th order LPCs and then transform them into line spectrum pair (LSP) coefficients by Discrete Fourier Transform(DFT) as perception characteristics; Secondly, speech data are divided into groups orderly, combinative the weighted expectations of each group' LSP coefficients to be the authentication data, and the quantity of authentication data are compressed through hashing construction; Finally it realize the fast authentication through hashing matching. Experiment results show that the algorithm is robust to content preserving operations, such as changing volume, echo, resampling, etc. And it is fragile to malicious operations including replacing, deleting, etc, and also with the ability of locating the tampered position precisely. It has the properties of small authentication data and high running efficiency and applies to limited-sources communication terminals.


Keywords: Line spectrum pair (LSP), Perceptual hashing, Robustness, Speech content authentication, Tamper localization.


Acrobat reader logo Click <here> or title of paper to download the full pages article in pdf format



Download <here> the Library Journal Recommendation Form



Read more about Wireless Sensor Networks






1999 - 2018 Copyright , International Frequency Sensor Association (IFSA). All Rights Reserved.

Home - News - Links - Archives - Tools - Voltage-to-Frequency Converters - Standardization - Patents - Marketplace - Projects - Wish List - e-Shop - Sensor Jobs - Membership - Videos - Publishing - Site Map - Subscribe - Search

 Members Area -Sensors Portal -Training Courses - S&T Digest - For advertisers - Bookstore - Forums - Polls - Submit Press Release - Submit White Paper - Testimonies - Twitter - Facebook - LinkedIn