A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing
نویسندگان
چکیده
منابع مشابه
Perceptual Speech Hashing Authentication Algorithm Based on Linear Prediction Analysis
According to the situation that traditional speech authentication algorithms are not appropriated for the present speech communication, we proposed a speech authentication algorithm of perceptual hashing which is based on linear forecast analysis (LPC), it can satisfy the requirement of the efficiency and the robustness for the speech authentication. Firstly, the LPC coefficients are optimized,...
متن کاملSpeech Authentication Based on Perceptual Fingerprint Hashing
A perceptual fingerprint hashing method is proposed for audio authentication in this paper. First, the biologic fingerprint image is divided into overlapping rectangle blocks by randomly using a chaotic sequence, and then the gravity center of each block is calculated. Finally, the perceptual Hashing value is generated based on the gravity center of each block. To authenticate the speech identi...
متن کاملSpeech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio
In order to meet the requirements of robustness and discrimination of content preserving operations after conversion of speech communication format on the heterogeneous mobile terminal, and noise reduction and efficient authentication, a new efficient speech perceptual hashing authentication algorithm based on spectral subtraction and energy to entropy ratio was proposed. Firstly the proposed a...
متن کاملAn Efficient Speech Perceptual Hashing Authentication Algorithm Based on Wavelet Packet Decomposition
In this paper, we present a new speech perceptual hashing authentication algorithm based on wavelet packet decomposition (WPD) for speech content authentication. Firstly, a wavelet packet coefficients matrix of wavelet reconstruction is generated from an original speech signal after high frequency pre-processing followed by wavelet packet decomposition. Secondly, the wavelet packet coefficients...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Information Systems
سال: 2017
ISSN: 1820-0214,2406-1018
DOI: 10.2298/csis170112024h