期刊文献+

基于短时自相关的语音感知哈希认证算法 被引量:2

Speech Perceptual Hashing Algorithm Based on Short-term Auto-correlation for Speech Authentication
下载PDF
导出
摘要 针对移动语音通信对语音区分性和内容保持操作鲁棒性,以及实时认证的要求,提出了一种基于短时自相关的语音感知哈希认证算法。该算法对语音进行预处理、分帧和加窗,进行短时自相关分析,并结合非负矩阵分解得到特征参数矩阵,利用特征参数矩阵生成感知哈希序列进行语音内容认证。实验结果表明,该算法具有较好的区分性和鲁棒性,能够满足语音通信实时认证的要求。 In order to meet the requirements of discrimination,robustness and real-time authentication for mobile speech communication,a speech perceptual hashing algorithm based on short-term auto-correlation for speech authentication is proposed.Firstly,the algorithm preprocesses the speech by frame and adds window function.Then,the short-term auto-correlation is carried out,and the characteristic parameter matrix is obtained by decomposition with non-negative matrix.Finally,the characteristic parameter matrix is used to extract perceptual hashing sequence for speech authentication.The experimental results show that the proposed algorithm has a better discrimination,robustness and can meet the requirements of real-time authentication in speech communication.
作者 张永兵 米保全 周亮 张涛 ZHANG Yongbing;MI Baoquan;ZHOU Liang;ZHANG Tao(Gansu Institute of Mechanical & Electrical Engineering,Tianshui 741001,China;School of Computer and Communication,Lanzhou University of Technology,Lanzhou 730050,China)
出处 《无线电工程》 2019年第10期899-904,共6页 Radio Engineering
基金 国家自然科学基金资助项目(61762056) 甘肃省高等学校科研基金资助项目(2018A-187)
关键词 语音认证 短时自相关 感知哈希 鲁棒性 speech authentication short-term auto-correlation speech perceptual hashing robustness
  • 相关文献

参考文献4

二级参考文献31

  • 1陈小平,胡泽.听觉临界频带及其在声频信号处理中的应用[J].北京广播学院学报(自然科学版),2004,11(2):28-35. 被引量:6
  • 2陈慧婷,覃团发,唐振华,常侃.综合纹理统计模型与全局主颜色的图像检索方法[J].北京邮电大学学报,2011,34(S1):100-103. 被引量:3
  • 3Tang Zhenjun, Zhang Xianquan, Huang Liyan, et al. Robust image Hashing using ring-based entropies [ J ]. Signal Processing, 2013, 93 (7): 2061-2069.
  • 4Li Yuenan, Lu Zheming, Zhu Ce, et al. Robust image Hashing based on random Gabor filtering and dithered lat- tice vector quantization [ J 1. Image Processing, IEEE Transactions on, 2012, 21(4): 1963-1980.
  • 5Jiao Yuhua, Ji Liping, Niu Xiamu. Robust speech Has- hing for content authentication [ J ]. Signal Processing Letters, IEEE, 2009, 16(9): 818-821.
  • 6Chen Ning, Wan Wanggen. Robust speech Hash function [Jl. ETRIJournal, 2010, 32(2): 345-347.
  • 7Chen Ning, Wan Wanggen. Speech Hashing algorithm based on short-time stability [ C] //Artificial Neural Net- works-ICANN 2009. Cyprus: Artificial Neural Networks, 2009 : 426-434.
  • 8Nouri M, Farhangian N. Conceptual authentication speech hashing base upon hypotr- ochoid graph [ C] /// Telecommunications (IST), Sixth International Symposi- um on. Tehran: IEEE, 2012: 1136-1141.
  • 9Tang Zhenjun, Wang Shuozhong, Zhang Xinpeng, et al. Structural feature-based image hashing and similarity met- ric for tampering detection [ Jl. Fundamenta Informati- cae, 2011, 106(l): 75-91.
  • 10Chen Ning, Wan Wanggen. Robust audio hashing based on discrete-wavelet-transform and non-negative matrix factorization [ J ]. Communications IET, 2010, 4 ( 14 ) : 1722-1731.

共引文献27

同被引文献16

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部