Title: An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string

Authors: Zhang Qiuyu; Xing Pengfei; Huang Yibo; Dong Ruihong; Yang Zhongping

Addresses: School of Computer and Communication, Lanzhou University of Technology, Lanzhou, 730050, China ' School of Computer and Communication, Lanzhou University of Technology, Lanzhou, 730050, China ' School of Computer and Communication, Lanzhou University of Technology, Lanzhou, 730050, China ' School of Computer and Communication, Lanzhou University of Technology, Lanzhou, 730050, China ' School of Computer and Communication, Lanzhou University of Technology, Lanzhou, 730050, China

Abstract: According to the situation that speech perceptual hashing methods are not appropriated for real-time speech content authentication in mobile computing environment, a novel DWT-based perceptual hashing algorithm, which uses a combination of time-domain and frequency-domain features, was proposed to protect the speech data in the cloud. Firstly, by discrete wavelet transform (DWT), a new signal in frequency-domain is generated from the original speech signal after pre-processing and intensity-loudness transform (ILT). Secondly, coefficients of low frequency wavelet decomposition are partitioned into equal-sized and non-overlapping blocks, and logarithmic short-time energy of each block is computed to obtain speech signals features in frequency-domain. Finally, combined with spectral flux features (SFF) of speech signal in time-domain, a ternary perceptual hashing sequence is created. Experiment results illustrate that ternary form is better to stand for hash digest than binary form, the proposed algorithm has a good robustness against content preserving operations, discrimination, good compaction and high efficiency, and detects the tamper localisation as well.

Keywords: speech perceptual authentication; perceptual hashing; discrete wavelet transform; DWT; symmetric ternary string; tamper localisation.

DOI: 10.1504/IJICT.2018.089021

International Journal of Information and Communication Technology, 2018 Vol.12 No.1/2, pp.31 - 50

Received: 18 Sep 2014
Accepted: 12 Feb 2015

Published online: 08 Nov 2017 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article