Abstract
To address the problem that there is no universal model for the speech perception hash algorithm in the mobile computing environment, the authentication model is studied and a speech perception hash authentication universal model for the mobile computing environment is proposed. By studying the general model for the multimedia perception hash authentication, the proposed model relies on speech perception signature and uses the multimedia perception authentication algorithm to analyze the characteristics of speech signal processing and transmission in the mobile computing environment. In this way, a complete model for the speech perception hash algorithm in the mobile computing environment is developed, providing the theoretical foundation for the subsequent design of the algorithm.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wang, H., Wang, W., Chen, M., et al.: Quality-driven secure audio transmissions in wireless multimedia sensor networks. Multimed. Tools Appl. 67(1), 119–135 (2013)
Wang, Z., Li, W., Zhu, B.: Audio authentication based on music content analysis. J. Comput. Res. Dev. 49(1), 158–166 (2012)
Gu, J.: Research on Key Technologies of Speech Perceptual Authentication. University of Science and Technology of China, Hefei (2009)
Yang, R., Qu, Z., Huang, J.: Detecting digital audio forgeries by checking frame offsets. In: Proceedings of the 10th ACM Workshop on Multimedia and Security, pp. 21–26. ACM, New York (2008)
Zhou, L., Wu, D., Zheng, B., et al.: Joint physical-application layer security for wireless multimedia delivery. IEEE Commun. Mag. 52(3), 66–72 (2014)
Zmudzinski, S., Munir, B., Steinebach, M.: Digital audio authentication by robust feature embedding. In: Proceedings of the SPIE on Media Watermarking, Security, and Forensics, vol. 8303, pp. 1–7 (2012)
Tomar, V.S., Rose, R.C.: Efficient manifold learning for speech recognition using locality sensitive hashing. Acoust. Speech Sig. Process. 2013(5), 6995–6999 (2013)
Pathak, M.A., Raj, B., Rane, S.D., et al.: Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise. Sig. Process. Mag. 30(2), 62–74 (2013)
Niu, X.M., Jiao, Y.H.: An overview of perceptual hashing. Acta Electronica Sinica 36(7), 1405–1411 (2008)
Chen, N., Xiao, H.D.: Perceptual audio hashing algorithm based on Zernike moment and maximum-likelihood watermark detection. Digit. Sig. Process. 23(4), 1216–1227 (2013)
Huang, Y.B., Zhang, Q.Y., Yuan, Z.T., et al.: The hash algorithm of speech perception based on the integration of adaptive MFCC and LPCC. J. Huazhong Univ. Sci. Tech. 43(2), 124–128 (2015). (Natural Science Edition)
Yang, G., Chen, X.O., Yang, D.S.: Efficient music identification by utilizing space-saving audio fingerprinting system. In: 2014 IEEE International Conference on Proceedings of the Multimedia and Expo (ICME), pp. 1–6. IEEE, Chengdu (2014)
Grutzek, G., Strobl, J., Mainka, B., et al.: Perceptual hashing for the identification of telephone speech. In: Proceedings of the Speech Communication, 10. ITG Symposium, pp. 1–4 (2012)
Gupta, S., Cho, S., Kuo, C.C.J.: Current developments and future trends in audio authentication. IEEE Multimed. 19(1), 50–59 (2012)
Jiao, Y.H., Ji, L.P., Niu, X.M.: Perceptual speech hashing and performance evaluation. Int. J. Innovative Comput. Inf. Control 6(3), 1447–1458 (2010)
Nickel, C., Zhou, X., Liu, M., et al.: Content identification and quality-based ranking. In: Wahlster, W., Grallert, H.-J., Wess, S., Friedrich, H., Widenka, T. (eds.) Towards the Internet of Services: The THESEUS Research Program, pp. 101–110. Springer, Heidelberg (2014)
Jiao, Y.H., Ji, L.P., Niu, X.M.: Robust speech hashing for content authentication. IEEE Sig. Process. Lett. 16(9), 818–821 (2009)
Li, J.F., Wu, T., Wang, H.X.: Perceptual hashing based on correlation coefficient of MFCC for speech authentication. J. Beijing Univ. Posts Telecommun. 38(2), 89–93 (2015)
Zhang, C.: Research on Key Techniques of Mobile Audio Oriented 3G Communication. Wuhan University, Wuhan (2010)
Xiang, K., Hu, R.M.: Research progress in frame loss concealment for mobile audio coding. J. Chin. Comput. Syst. 36(5), 1133–1137 (2015)
Zhang, D.F.: Research on the Key Technologies of Identity Authentication and Content Security of 3G Network. Beijing University of Posts and Telecommunications, Beijing (2010)
Zhang, Q.Y., Yang, Z.P., Huang, Y.B., et al.: Efficient robust speech authentication algorithm for perceptual hashing based on Hilbert-Huang transform. J. Inf. Comput. Sci. 11(18), 6537–6547 (2014)
Zhang, Q.Y., Yu, S., Xing, P.F., et al.: An improved phase coding-based watermarking algorithm for speech perceptual hashing authentication. J. Inf. Hiding Multimed. Sig. Process. 6(6), 1231–1241 (2015)
Xing, P.F.: Research on Speech Perceptual Hashing Authentication Technology Based on Wavelet Transform. Lanzhou University of Technology, Lanzhou (2015)
Acknowledgments
This work is supported by the National Natural Science Foundation of China (No. 61363078), the Natural Science Foundation of Gansu Province of China (No. 1310RJYA004). The authors would like to thank the anonymous reviewers for their helpful comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhang, QY., Hu, WJ., Huang, YB., Qiao, SB. (2016). Research on Universal Model of Speech Perceptual Hashing Authentication System in Mobile Environment. In: Huang, DS., Bevilacqua, V., Premaratne, P. (eds) Intelligent Computing Theories and Application. ICIC 2016. Lecture Notes in Computer Science(), vol 9771. Springer, Cham. https://doi.org/10.1007/978-3-319-42291-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-42291-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42290-9
Online ISBN: 978-3-319-42291-6
eBook Packages: Computer ScienceComputer Science (R0)