A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Perceptual Speech Hashing Authentication Algorithm Based on Linear Prediction Analysis

According to the situation that traditional speech authentication algorithms are not appropriated for the present speech communication, we proposed a speech authentication algorithm of perceptual hashing which is based on linear forecast analysis (LPC), it can satisfy the requirement of the efficiency and the robustness for the speech authentication. Firstly, the LPC coefficients are optimized,...

متن کامل

Speech Authentication Based on Perceptual Fingerprint Hashing

A perceptual fingerprint hashing method is proposed for audio authentication in this paper. First, the biologic fingerprint image is divided into overlapping rectangle blocks by randomly using a chaotic sequence, and then the gravity center of each block is calculated. Finally, the perceptual Hashing value is generated based on the gravity center of each block. To authenticate the speech identi...

متن کامل

Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio

In order to meet the requirements of robustness and discrimination of content preserving operations after conversion of speech communication format on the heterogeneous mobile terminal, and noise reduction and efficient authentication, a new efficient speech perceptual hashing authentication algorithm based on spectral subtraction and energy to entropy ratio was proposed. Firstly the proposed a...

متن کامل

An Efficient Speech Perceptual Hashing Authentication Algorithm Based on Wavelet Packet Decomposition

In this paper, we present a new speech perceptual hashing authentication algorithm based on wavelet packet decomposition (WPD) for speech content authentication. Firstly, a wavelet packet coefficients matrix of wavelet reconstruction is generated from an original speech signal after high frequency pre-processing followed by wavelet packet decomposition. Secondly, the wavelet packet coefficients...

متن کامل

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Science and Information Systems

سال: 2017

ISSN: 1820-0214,2406-1018

DOI: 10.2298/csis170112024h