期刊文献+

一种改进的音频内容认证算法

An Improved Content Based on Audio Authentication Algorithm
下载PDF
导出
摘要 介绍了一种基于内容的数字音频认证算法,主要目的在于突破现有音频认证算法仅能判断音频是否受到篡改、而难以定位一个乃至多个具体受篡改位置的局限性,提供更具意义的认证结果。现有的算法通过鲁棒性哈希和半脆弱水印来进行内容的认证,一般采用固定时间分帧并且缺乏重新同步的机制,因此当多处剪切、插入这类失同步的攻击发生时,这些算法都无法在攻击的结束位置重新同步从而导致认证结果有较高的漏警率。文章所述的算法通过提取音频中的关键锚点,以此将音频划分为一系列不等长片段,利用动态时间规整的方法完成同步,最后由机器学习训练得到的模型协助音频的内容认证。实验结果证明了该方法在多于一次的失同步攻击的情况下仍然保持良好的认证效果。 In this paper an improved content-based audio authentication algorithm is proposed. Most of the existing works either use robust hash methods or semi-fragile watermarks to verify the perceptual integrity in fixed time frames, and thus can hardly tell the manipulation position if attacks occur in multiple places. Our approach focuses on providing the justified content authentication results even one or more de-synchronizing attacks (cropping or inserting) take place. In particular, the audio piece is segmented into a series of non-overlapped sound events to be aligned with the reference audio, and then according to the authentication result from an supervised model, attack positions can be detected. Experiment shows encouraging content authentication results compared to the pervious approaches using fixed framing and without re-synchronizing methods.
出处 《微型电脑应用》 2013年第6期20-24,共5页 Microcomputer Applications
基金 上海市科委计划项目(12dz1500203) 国家自然科学基金(61171128) 863计划(2011AA01A109)
关键词 音频内容认证 失同步攻击 动态时间规整 机器学习 Content-based Audio Authentication De-synchronizing Attack Dynamic Time Warping Machine Learning
  • 相关文献

参考文献15

  • 1Wu C.P., Kuo C.C., Fragile speech watermarking based on exponential scale quantization for tamper detection[C] IEEE International Conference on Acoustic, Speech and Signal Processing, 2002.
  • 2Wu C.P., Kuo C.C., Fragile speech watermarking for content integrity verification[C]. IEEE International Symposium on Circuits and Systems, 2002.
  • 3Wu C.P., Kuo C.C., Speech content integrity verification integrated with ITU g. 723.1 speech coding[C]. I ITCC '01, 2001.
  • 4Park C.M. , Thapaa D., Wang G.N., Speech authentication system using digital watermarking and pattern re- covery[J]. Pattern Recognition Letters,2007, 28:931-938.
  • 5Steinbach M., Dittmann J., Watermarking-based digital audio data authentication[J]. EURASIP Journal on Ap- plied Signal Processing, 2003, September: 1001 - 1015.
  • 6Zmudzinski S., Steinebach M., Perception-based audio authentication watermarking in the Time- Frequency Domain[C]. Proceedings Information Hiding, Springer, 2009.
  • 7Chen T.S., Chen J., Tang J.L., Wu K.,A DAWP tech- nique for audio authentication[C]. Electrical Engineering and Control, 2011.
  • 8Zhao H., Shen D., An audio watermarking algorithm for audio authentication[C]. ICITIS '10, 2010.
  • 9Haitsma J., Kalker T., Oostveen J.,Robust audio hashing for content identification[C]. Proc. of the Content-Based Multimedia Indexing, Firenze, Italy, Sept. 2001.
  • 10Jiao Y., Ji L., Niu X., Robust speech hashing for content authentication[J]. Signal Processing Letters, IEEE, 2009, 818-821.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部