Robust Speech Hashing for Content Authentication

被引:17
|
作者
Jiao, Yuhua [1 ]
Ji, Liping [2 ]
Niu, Xiamu [1 ]
机构
[1] Harbin Inst Technol, Informat Countermeasure Tech Res Inst, Harbin 150080, Peoples R China
[2] Shenzhen Grad Sch, Harbin Inst Technol, Informat Secur Res Ctr, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
Content-based authentication; LSF; robust hashing; speech;
D O I
10.1109/LSP.2009.2025827
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Robust hashing for multimedia authentication is an emerging research area. A novel key-dependent robust speech hashing based on speech production model is proposed in this letter. Robust hash is calculated based on linear spectrum frequencies (LSFs) which model the vocal tract. The correlation between LSFs is decoupled by discrete cosine transformation (DCT). A randomization scheme controlled by a secret key is applied in hash generation for random feature selection. The hash function is key-dependent and collision resistant. Meanwhile, it is highly robust to content preserving operations as well as having high accuracy of tampering localization.
引用
收藏
页码:818 / 821
页数:4
相关论文
共 50 条
  • [1] A Novel Robust Image-hashing Method for Content Authentication
    Jiang, Cuiling
    Pang, Yilin
    Wu, Anwen
    [J]. 2015 INTERNATIONAL SYMPOSIUM ON SECURITY AND PRIVACY IN SOCIAL NETWORKS AND BIG DATA (SOCIALSEC 2015), 2015, : 22 - 27
  • [2] Robust Image Hashing Technique for Content Authentication based on DWT
    Vadlamudi, Lokanadham Naidu
    Vaddella, Rama Prasad V.
    Devara, Vasumathi
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2016, VOL 1, 2017, 459 : 181 - 191
  • [3] Image Authentication by Content Preserving Robust Image Hashing Using Local and Global Features
    Sebastian, Lima S.
    Varghese, Abraham
    Manesh, T.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 1554 - 1560
  • [4] Robust audio hashing for audio authentication watermarking
    Zmudzinski, Sascha
    Steinebach, Martin
    [J]. SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819
  • [5] Perceptual Video Hashing for Content Identification and Authentication
    Khelifi, Fouad
    Bouridane, Ahmed
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2019, 29 (01) : 50 - 67
  • [6] Security Analysis of Speech Perceptual Hashing Authentication Algorithm
    Zhang Qiu-yu
    Ren Zhan-wei
    Xing Peng-fei
    Huang Yi-bo
    Yu Shuang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 103 - 118
  • [7] Robust speech perception hashing authentication algorithm based on spectral subtraction and multi-feature tensor
    Huang, Yi-Bo
    Zhang, Qiu-Yu
    Hu, Wen-Jin
    [J]. International Journal of Network Security, 2018, 20 (02): : 206 - 216
  • [8] Robust Speech Hashing for Digital Audio Forensics
    Renza, Diego
    Vargas, Jaisson
    Ballesteros, Dora M.
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (01):
  • [9] Conceptual Authentication Speech Hashing base Upon Hypotrochoid Graph
    Nouri, Mahdi
    Farhangian, Nooshin
    Zeinolabedini, Zahra
    Safarinia, Mahyar
    [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1136 - 1141
  • [10] Image authentication based on robust image hashing with geometric correction
    Ram Kumar Karsh
    Arunav Saikia
    Rabul Hussain Laskar
    [J]. Multimedia Tools and Applications, 2018, 77 : 25409 - 25429