期刊文献+

一种基于离散余弦变换的数字语音篡改恢复算法 被引量:2

A Tamper Recovery Scheme for Digital Speech Forensics Based on Discrete Cosine Transform
下载PDF
导出
摘要 利用离散余弦变换(Discrete Cosine Transform, DCT),提出了一种篡改恢复的语音水印算法。首先,分析了语音信号DCT系数的分布,选取部分DCT系数并编码,生成语音信号压缩数据。然后,将帧号和压缩数据一起作为水印信息,嵌入到语音信号DCT域中,得到含水印的信号。在语音被攻击后,由帧号定位被攻击帧,提取被攻击帧的压缩数据,以此来重构被攻击的内容进行篡改恢复。最后,通过实验证明了本文算法的有效性。 A speech watermarking algorithm for tampering recovery based on Discrete Cosine Transform(DCT) is proposed. First, the distribution of DCT coefficients of the speech signal is analyzed, and some DCT coefficients are selected and encoded to generate compressed data of the speech signal. Then, the frame number and compressed data are used as the watermark and embedded in the DCT domain to obtain a watermarked signal. When the speech is attacked, the attacked frame is detected by the frame number. And the compressed data of the attacked frame is extracted to reconstruct the attacked content for tampering recovery. Finally, the experiments are conducted to verify the effectiveness of the algorithm.
作者 赵岩松 钱清 熊晶晶 ZHAO Yansong;QIAN Qing;XIONG Jingjing(College of Foreign Languages,Xinyang Normal University,Xinyang 464000,China;School of Information,Guizhou University of Finance and Economics,Guiyang 550025,China;Medical Department,Xinyang Central Hospital,Xinyang 464000,China)
出处 《信阳师范学院学报(自然科学版)》 CAS 北大核心 2022年第4期645-650,共6页 Journal of Xinyang Normal University(Natural Science Edition)
基金 国家自然科学基金项目(61902085)。
关键词 数字语音 数字水印 篡改定位 篡改恢复 digital speech digital watermark tampering detection tampering recovery
  • 相关文献

参考文献2

二级参考文献16

  • 1王宏霞,范明泉.基于质心的混合域半脆弱音频水印算法[J].中国科学:信息科学,2010,40(2):313-326. 被引量:12
  • 2PUN C M,YUAN X C.Robust segments detector for de-synchronization resilient audio watermarking[J].IEEE Transactions on Audio Speech and Language Processing,2013,21(11):2412-2424.
  • 3LEI B Y,SOON I Y,TAN E L.ROBUST SVD-Based audio watermarking scheme with differential evolution optimization[J].IEEE Transactions on Audio Speech and Language Processing,2013,21(11):2368-2378.
  • 4WANG Y,WU S Q,HUANG J W.Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform[J].EURASIP Journal on Advances in Signal Processing,2010(13):1-17.
  • 5BHAT V K,SENGUPTA I,DAS A.A new audio watermarking scheme based on singular value decomposition and quantization[J].Circuits Systems and Signal Processing,2011,30(5):915-927.
  • 6LEI B Y,SOON I Y,LI Z.Blind and robust audio watermarking scheme based on SVD-DCT[J].Signal Processing,2011,91(8):1973-1984.
  • 7WANG X Y,MA T X,NIU P P.A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks[J].Computers and Electrical Engineering,2011,37(4):425-443.
  • 8LIU Z H,WANG H X.A novel speech content authentication algorithm based on Bessel-Fourier moments[J].Digital Signal Processing,2014(24):197-208.
  • 9LIU Z H,WANG H X.Pseudo-zernike moments-based audio content authentication algorithm robust against feature-analysed substitution attack[J].Multimedia Tools and Applications,2014,70(3):2271-2291.
  • 10LIU Z H,WANG H X.A speech content authentication algorithm based on Pseudo-Zernike moments in DCT domain[J].International Journal of Digital Crime and Forensics,2013,5(3):15-34.

共引文献2

同被引文献9

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部