An efficient speech perceptual hashing authentication algorithm based on the linear prediction minimum mean squared error

被引:0
|
作者
Zhang Q. [1 ]
Hu W. [1 ]
Qiao S. [1 ]
Zhang T. [1 ]
机构
[1] School of Computer and Communication, Lanzhou University of Technology, Lanzhou
来源
| 1600年 / Huazhong University of Science and Technology卷 / 44期
关键词
Linear prediction-minimum mean squared error (LP-MMSE); Perception of robustness; Perceptual hashing; Spectral entropy; Speech authentication;
D O I
10.13245/j.hust.161222
中图分类号
学科分类号
摘要
In order to meet robustness and discrimination of content preserving operations in mobile speech communication, and the need for high-efficiency certification and other requirements, a novel efficient speech perceptual hashing authentication algorithm based on the linear prediction-minimum mean squared error (LP-MMSE) was proposed. Firstly, the algorithm conducted linear prediction coding (LPC) on speech signal after pre-processing, framing and windowing to obtain the minimum mean squared error (MMSE) coefficient matrix. Secondly, spectral entropy parameter matrix of each frame was calculated through the spectral entropy method. Finally, binary perceptual hash sequence was generated through combining these two matrixes above. Experimental results show that the proposed algorithm is better than other existing algorithms in terms of compactness, and has a good robustness, discrimination against content preserving operations. It also has high authentication efficiency and can meet the requirements of real-time speech authentication. © 2016, Editorial Board of Journal of Huazhong University of Science and Technology. All right reserved.
引用
收藏
页码:127 / 132
页数:5
相关论文
共 10 条
  • [1] Grutzek G., Strobl J., Mainka B., Et al., Perceptual hashing for the identification of telephone speech, Proc of Speech Communication
  • [2] 10.ITG Symposium, pp. 1-4, (2012)
  • [3] Nouri M., Farhangian N., Zeinolabedini Z., Et al., Conceptual authentication speech hashing base upon hypotrochoid graph, 2012 6th Int Symposium on Telecommunications (IST), pp. 1136-1141, (2012)
  • [4] Chen N., Xiao H.D., Wan W.G., Audio hash function based on non-negative matrix factorisation of mel-frequency cepstral coefficients, Information Security IET, 5, 1, pp. 19-25, (2011)
  • [5] Huang Y.B., Zhang Q.Y., Yuan Z.T., Perceptual speech Hashing authentication algorithm based on linear prediction analysis, TELKOMNIKA Indonesian Journal of Electrical Engineering, 12, 4, pp. 3214-3223, (2014)
  • [6] Chen N., Wan W., Robust speech hash function, ETRI Journal, 32, 2, pp. 345-347, (2010)
  • [7] Li J.F., Wang H.X., Jing Y., Audio perceptual hashing based on NMF and MDCT coefficients, Chinese Journal of Electronics, 24, 3, pp. 579-588, (2015)
  • [8] Deng J., Wan W., Yu X., Et al., Audio fingerprinting based on spectral energy structure and NMF, 2011 IEEE 13th Int on Communication Technology (ICCT), pp. 1103-1106, (2011)
  • [9] Chen N., Wan W.G., Xiao H.D., Robust audio hashing based on discrete-wavelet-transform and non-negative matrix factorisation, IET Communications, 4, 14, pp. 1722-1731, (2010)
  • [10] Chen N., Xiao H.D., Zhu J., Et al., Robust audio hashing scheme based on cochleagram and cross recurrence analysis, Electronics Letters, 49, 1, pp. 7-8, (2013)