Skip to main content

Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment

  • Conference paper
  • First Online:
  • 1880 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9771))

Abstract

To address the problem that there is no universal model for the speech perception hash algorithm in the mobile computing environment, the authentication model is studied and a speech perception hash authentication universal model for the mobile computing environment is proposed. By studying the general model for the multimedia perception hash authentication, the proposed model relies on speech perception signature and uses the multimedia perception authentication algorithm to analyze the characteristics of speech signal processing and transmission in the mobile computing environment. In this way, a complete model for the speech perception hash algorithm in the mobile computing environment is developed, providing the theoretical foundation for the subsequent design of the algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wang, H., Wang, W., Chen, M., et al.: Quality-driven secure audio transmissions in wireless multimedia sensor networks. Multimed. Tools Appl. 67(1), 119–135 (2013)

    Article  Google Scholar 

  2. Wang, Z., Li, W., Zhu, B.: Audio authentication based on music content analysis. J. Comput. Res. Dev. 49(1), 158–166 (2012)

    Google Scholar 

  3. Gu, J.: Research on Key Technologies of Speech Perceptual Authentication. University of Science and Technology of China, Hefei (2009)

    Google Scholar 

  4. Yang, R., Qu, Z., Huang, J.: Detecting digital audio forgeries by checking frame offsets. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, pp. 21–26. ACM, New York (2008)

    Google Scholar 

  5. Zhou, L., Wu, D., Zheng, B., et al.: Joint physical-application layer security for wireless multimedia delivery. IEEE Commun. Mag. 52(3), 66–72 (2014)

    Article  Google Scholar 

  6. Zmudzinski, S., Munir, B., Steinebach, M.: Digital audio authentication by robust feature embedding. In: Proceedings of the SPIE on Media Watermarking, Security, and Forensics, vol. 8303, pp. 1–7 (2012)

    Google Scholar 

  7. Tomar, V.S., Rose, R.C.: Efficient manifold learning for speech recognition using locality sensitive hashing. Acoust. Speech Sig. Process. 2013(5), 6995–6999 (2013)

    Google Scholar 

  8. Pathak, M.A., Raj, B., Rane, S.D., et al.: Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise. Sig. Process. Mag. 30(2), 62–74 (2013)

    Article  Google Scholar 

  9. Niu, X.M., Jiao, Y.H.: An overview of perceptual hashing. Acta Electronica Sinica 36(7), 1405–1411 (2008)

    Google Scholar 

  10. Chen, N., Xiao, H.D.: Perceptual audio hashing algorithm based on Zernike moment and maximum-likelihood watermark detection. Digit. Sig. Process. 23(4), 1216–1227 (2013)

    Article  MathSciNet  Google Scholar 

  11. Huang, Y.B., Zhang, Q.Y., Yuan, Z.T., et al.: The hash algorithm of speech perception based on the integration of adaptive MFCC and LPCC. J. Huazhong Univ. Sci. Tech. 43(2), 124–128 (2015). (Natural Science Edition)

    MATH  Google Scholar 

  12. Yang, G., Chen, X.O., Yang, D.S.: Efficient music identification by utilizing space-saving audio fingerprinting system. In: 2014 IEEE International Conference on Proceedings of the Multimedia and Expo (ICME), pp. 1–6. IEEE, Chengdu (2014)

    Google Scholar 

  13. Grutzek, G., Strobl, J., Mainka, B., et al.: Perceptual hashing for the identification of telephone speech. In: Proceedings of the Speech Communication, 10. ITG Symposium, pp. 1–4 (2012)

    Google Scholar 

  14. Gupta, S., Cho, S., Kuo, C.C.J.: Current developments and future trends in audio authentication. IEEE Multimed. 19(1), 50–59 (2012)

    Article  Google Scholar 

  15. Jiao, Y.H., Ji, L.P., Niu, X.M.: Perceptual speech hashing and performance evaluation. Int. J. Innovative Comput. Inf. Control 6(3), 1447–1458 (2010)

    Google Scholar 

  16. Nickel, C., Zhou, X., Liu, M., et al.: Content identification and quality-based ranking. In: Wahlster, W., Grallert, H.-J., Wess, S., Friedrich, H., Widenka, T. (eds.) Towards the Internet of Services: The THESEUS Research Program, pp. 101–110. Springer, Heidelberg (2014)

    Google Scholar 

  17. Jiao, Y.H., Ji, L.P., Niu, X.M.: Robust speech hashing for content authentication. IEEE Sig. Process. Lett. 16(9), 818–821 (2009)

    Article  Google Scholar 

  18. Li, J.F., Wu, T., Wang, H.X.: Perceptual hashing based on correlation coefficient of MFCC for speech authentication. J. Beijing Univ. Posts Telecommun. 38(2), 89–93 (2015)

    Google Scholar 

  19. Zhang, C.: Research on Key Techniques of Mobile Audio Oriented 3G Communication. Wuhan University, Wuhan (2010)

    Google Scholar 

  20. Xiang, K., Hu, R.M.: Research progress in frame loss concealment for mobile audio coding. J. Chin. Comput. Syst. 36(5), 1133–1137 (2015)

    Google Scholar 

  21. Zhang, D.F.: Research on the Key Technologies of Identity Authentication and Content Security of 3G Network. Beijing University of Posts and Telecommunications, Beijing (2010)

    Google Scholar 

  22. Zhang, Q.Y., Yang, Z.P., Huang, Y.B., et al.: Efficient robust speech authentication algorithm for perceptual hashing based on Hilbert-Huang transform. J. Inf. Comput. Sci. 11(18), 6537–6547 (2014)

    Article  Google Scholar 

  23. Zhang, Q.Y., Yu, S., Xing, P.F., et al.: An improved phase coding-based watermarking algorithm for speech perceptual hashing authentication. J. Inf. Hiding Multimed. Sig. Process. 6(6), 1231–1241 (2015)

    Google Scholar 

  24. Xing, P.F.: Research on Speech Perceptual Hashing Authentication Technology Based on Wavelet Transform. Lanzhou University of Technology, Lanzhou (2015)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (No. 61363078), the Natural Science Foundation of Gansu Province of China (No. 1310RJYA004). The authors would like to thank the anonymous reviewers for their helpful comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiu-Yu Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang, QY., Hu, WJ., Huang, YB., Qiao, SB. (2016). Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment. In: Huang, DS., Bevilacqua, V., Premaratne, P. (eds) Intelligent Computing Theories and Application. ICIC 2016. Lecture Notes in Computer Science(), vol 9771. Springer, Cham. https://doi.org/10.1007/978-3-319-42291-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42291-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42290-9

  • Online ISBN: 978-3-319-42291-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics