Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment

  • Qiu-Yu ZhangEmail author
  • Wen-Jin Hu
  • Yi-Bo Huang
  • Si-Bin Qiao
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9771)


To address the problem that there is no universal model for the speech perception hash algorithm in the mobile computing environment, the authentication model is studied and a speech perception hash authentication universal model for the mobile computing environment is proposed. By studying the general model for the multimedia perception hash authentication, the proposed model relies on speech perception signature and uses the multimedia perception authentication algorithm to analyze the characteristics of speech signal processing and transmission in the mobile computing environment. In this way, a complete model for the speech perception hash algorithm in the mobile computing environment is developed, providing the theoretical foundation for the subsequent design of the algorithm.


Mobile computing environment Multimedia information security Speech authentication Perceptual hashing Perception feature extraction Tamper detection 



This work is supported by the National Natural Science Foundation of China (No. 61363078), the Natural Science Foundation of Gansu Province of China (No. 1310RJYA004). The authors would like to thank the anonymous reviewers for their helpful comments and suggestions.


  1. 1.
    Wang, H., Wang, W., Chen, M., et al.: Quality-driven secure audio transmissions in wireless multimedia sensor networks. Multimed. Tools Appl. 67(1), 119–135 (2013)CrossRefGoogle Scholar
  2. 2.
    Wang, Z., Li, W., Zhu, B.: Audio authentication based on music content analysis. J. Comput. Res. Dev. 49(1), 158–166 (2012)Google Scholar
  3. 3.
    Gu, J.: Research on Key Technologies of Speech Perceptual Authentication. University of Science and Technology of China, Hefei (2009)Google Scholar
  4. 4.
    Yang, R., Qu, Z., Huang, J.: Detecting digital audio forgeries by checking frame offsets. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, pp. 21–26. ACM, New York (2008)Google Scholar
  5. 5.
    Zhou, L., Wu, D., Zheng, B., et al.: Joint physical-application layer security for wireless multimedia delivery. IEEE Commun. Mag. 52(3), 66–72 (2014)CrossRefGoogle Scholar
  6. 6.
    Zmudzinski, S., Munir, B., Steinebach, M.: Digital audio authentication by robust feature embedding. In: Proceedings of the SPIE on Media Watermarking, Security, and Forensics, vol. 8303, pp. 1–7 (2012)Google Scholar
  7. 7.
    Tomar, V.S., Rose, R.C.: Efficient manifold learning for speech recognition using locality sensitive hashing. Acoust. Speech Sig. Process. 2013(5), 6995–6999 (2013)Google Scholar
  8. 8.
    Pathak, M.A., Raj, B., Rane, S.D., et al.: Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise. Sig. Process. Mag. 30(2), 62–74 (2013)CrossRefGoogle Scholar
  9. 9.
    Niu, X.M., Jiao, Y.H.: An overview of perceptual hashing. Acta Electronica Sinica 36(7), 1405–1411 (2008)Google Scholar
  10. 10.
    Chen, N., Xiao, H.D.: Perceptual audio hashing algorithm based on Zernike moment and maximum-likelihood watermark detection. Digit. Sig. Process. 23(4), 1216–1227 (2013)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Huang, Y.B., Zhang, Q.Y., Yuan, Z.T., et al.: The hash algorithm of speech perception based on the integration of adaptive MFCC and LPCC. J. Huazhong Univ. Sci. Tech. 43(2), 124–128 (2015). (Natural Science Edition)zbMATHGoogle Scholar
  12. 12.
    Yang, G., Chen, X.O., Yang, D.S.: Efficient music identification by utilizing space-saving audio fingerprinting system. In: 2014 IEEE International Conference on Proceedings of the Multimedia and Expo (ICME), pp. 1–6. IEEE, Chengdu (2014)Google Scholar
  13. 13.
    Grutzek, G., Strobl, J., Mainka, B., et al.: Perceptual hashing for the identification of telephone speech. In: Proceedings of the Speech Communication, 10. ITG Symposium, pp. 1–4 (2012)Google Scholar
  14. 14.
    Gupta, S., Cho, S., Kuo, C.C.J.: Current developments and future trends in audio authentication. IEEE Multimed. 19(1), 50–59 (2012)CrossRefGoogle Scholar
  15. 15.
    Jiao, Y.H., Ji, L.P., Niu, X.M.: Perceptual speech hashing and performance evaluation. Int. J. Innovative Comput. Inf. Control 6(3), 1447–1458 (2010)Google Scholar
  16. 16.
    Nickel, C., Zhou, X., Liu, M., et al.: Content identification and quality-based ranking. In: Wahlster, W., Grallert, H.-J., Wess, S., Friedrich, H., Widenka, T. (eds.) Towards the Internet of Services: The THESEUS Research Program, pp. 101–110. Springer, Heidelberg (2014)Google Scholar
  17. 17.
    Jiao, Y.H., Ji, L.P., Niu, X.M.: Robust speech hashing for content authentication. IEEE Sig. Process. Lett. 16(9), 818–821 (2009)CrossRefGoogle Scholar
  18. 18.
    Li, J.F., Wu, T., Wang, H.X.: Perceptual hashing based on correlation coefficient of MFCC for speech authentication. J. Beijing Univ. Posts Telecommun. 38(2), 89–93 (2015)Google Scholar
  19. 19.
    Zhang, C.: Research on Key Techniques of Mobile Audio Oriented 3G Communication. Wuhan University, Wuhan (2010)Google Scholar
  20. 20.
    Xiang, K., Hu, R.M.: Research progress in frame loss concealment for mobile audio coding. J. Chin. Comput. Syst. 36(5), 1133–1137 (2015)Google Scholar
  21. 21.
    Zhang, D.F.: Research on the Key Technologies of Identity Authentication and Content Security of 3G Network. Beijing University of Posts and Telecommunications, Beijing (2010)Google Scholar
  22. 22.
    Zhang, Q.Y., Yang, Z.P., Huang, Y.B., et al.: Efficient robust speech authentication algorithm for perceptual hashing based on Hilbert-Huang transform. J. Inf. Comput. Sci. 11(18), 6537–6547 (2014)CrossRefGoogle Scholar
  23. 23.
    Zhang, Q.Y., Yu, S., Xing, P.F., et al.: An improved phase coding-based watermarking algorithm for speech perceptual hashing authentication. J. Inf. Hiding Multimed. Sig. Process. 6(6), 1231–1241 (2015)Google Scholar
  24. 24.
    Xing, P.F.: Research on Speech Perceptual Hashing Authentication Technology Based on Wavelet Transform. Lanzhou University of Technology, Lanzhou (2015)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Qiu-Yu Zhang
    • 1
    Email author
  • Wen-Jin Hu
    • 1
  • Yi-Bo Huang
    • 2
  • Si-Bin Qiao
    • 1
  1. 1.School of Computer and CommunicationLanzhou University of TechnologyLanzhouChina
  2. 2.College of Physics and Electronic EngineeringNorthwest Normal UniversityLanzhouChina

Personalised recommendations