期刊文献+

基于DWT的可恢复数字语音取证算法

Authentication and Recovery Algorithm for Digital Speech Signal Based on DWT
下载PDF
导出
摘要 提出一种可恢复的数字语音取证算法。首先给出基于DWT的数字语音压缩和重构方法,测试该方法压缩和重构语音信号的效果。然后将帧号和压缩语音作为水印进行嵌入。对被攻击的含水印信号用帧号定位被攻击的内容,压缩信号重构被攻击的内容,实施篡改恢复。与常见的语音取证算法相比,本文所提算法除对被攻击内容的篡改定位外,还能够对被攻击内容进行篡改恢复。 In this paper,an authentication and recovery algorithm was proposed for digital speech signal based on DWT.Firstly,a digital speech compression and reconstruction method was presented and the effect of this method on the compression and reconstruction of speech signal was tested.Then,the frame number and the compressed signal were embedded as watermark into the original speech.For watermark speech that was attacked,the frame number was used to locate the contents of the attack and compressed signal was used to reconstruct the attacked content and to implement tamper recovery.Compared with the common speech forensics algorithms,the scheme proposed in this paper has the ability of tamper location and tamper recovery.
出处 《铁道学报》 EI CAS CSCD 北大核心 2018年第3期76-81,共6页 Journal of the China Railway Society
基金 国家自然科学基金(61502409) 信阳师范学院"南湖学者奖励计划"青年项目
关键词 数字水印 内容取证 篡改恢复 篡改定位 digital watermark content authentication tamper recovery tamper location
  • 相关文献

参考文献1

二级参考文献11

  • 1王宏霞,范明泉.基于质心的混合域半脆弱音频水印算法[J].中国科学:信息科学,2010,40(2):313-326. 被引量:12
  • 2PUN C M ,YUAN X C. Robust Segments Detector for DesynchronizationResilient Audio Watermarking [J ]. IEEETransactions on Audio, Speech, and Language Processing,2013,21(11) : 2 412-2 424.
  • 3XIANG S J,K IM H J, HUANG J W. Audio WatermarkingRobust Against Time-sc ale Modification and MP3 Compression[J]. Signal Processing,2008,88(10) : 2 372-2 387.
  • 4WANG X Y ,M A T X ,N IU P P. A Pseudo-zernike MomentsBased Audio Watermarking Scheme Robust AgainstDesynchronization Attacks [J]. Computers and ElectricalEngineering ,2011,37 (4):425-443.
  • 5WANG Y, WU S Q, HUANG J W. Audio WatermarkingScheme Robust Against Desynchronization Based on theDyadic Wavelet Transform [J]. Journal of Advances in SignalProcessing,2010(13) :1-17.
  • 6ZHAO H,M ALIK H. Audio Recording Location IdentificationUsing Acoustic Environment Signature [ J]. IEEETransaction on Information Forensics and Security, 2013,8(11) : 1 676-1 759.
  • 7LIU Z H,W ANG H X. Pseudo-zernike Moments-based AudioContent Authentication Algorithm Robust Against Feature-analysed Substitution Attack [ J ] . Multimedia Toolsand Applications,2014,70(3) : 2 271-2 291.
  • 8LIU Z H,W ANG H X. A Novel Speech Content AuthenticationAlgorithm Based on Bessel-fourier M oments[J]. DigitalSignal Processing,2014,24(1) : 197-208.
  • 9XIANG S J, HUANG J W, YANG R. Robust Audio WatermarkingBased on Low-order Zernike Moments [ C]Proceedings of the 5 th International Workshop of DigitalWatermarking. Berlin:Springer-Verlag Press,2006 :226-240.
  • 10黄诚,易本顺.喷泉码的Logistic映射实现[J].北京邮电大学学报,2009,32(1):103-107. 被引量:11

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部