期刊文献+

基于音乐内容分析的音频认证算法 被引量:2

Audio Authentication Based on Music Content Analysis
下载PDF
导出
摘要 提出一种新颖的基于音符分割和模糊分类的音乐内容认证方法.该算法打破了传统音频认证所采用的固定长度分割方式,将音乐信号分割成一系列具有完整语义信息的不等长音符片段作为认证的基本单元,结合动态时间规整DTW(dynamic time warping)对齐技术,有效解决了大多数现有算法都存在的对同步失真脆弱的问题.在每个音符片段计算基于半阶音符类Chroma的鲁棒Hash值,根据原始音乐与待认证音乐之间Hash值差异的统计特性和时间分布特性,对3种新定义的度量指标进行模糊分类从而得到最终的认证结果.对于未通过认证的音乐信号系统还可以进行篡改区域的检测.实验结果表明,该算法能够有效区分可容许操作和恶意篡改,同时在篡改定位方面具有较高的精度. In almost all the existing audio authentication strategies,the smallest authentication entity is a segment with fixed duration,typically a frame whose size is consistent with both protection stage and verification stage.Such fixed-length segmentation has brought about at least two problems:Firstly,if the audio data to be authenticated has undergone some synchronization manipulations such as time-scale modification(TSM) or random cropping,the displacement between the frame sequences of the tested audio and its original may cause an unreliable authentication result;Secondly,authentication based on those fixed-length frames might not be friendly to users since in most cases a frame cannot satisfactorily cover a complete semantic entity of the audio data.In this paper,a novel music content authentication scheme based on note segmentation and fuzzy classification is proposed.We break the restriction of the traditional fixed-length segmentation strategies used in previous audio authentication methods and partition each track into a sequence of musical notes which correspond to minimum meaningful semantic elements of the music.Feature extraction and robust Hashing are performed on each note-based segment,thus settling the synchronization problem that remains a big challenge in most existing audio authentication algorithms.In the verification stage,three newly defined measures that characterize statistical and temporal properties of the distortion between the original and the dubious music,are exploited and further combined with fuzzy classification to make the final authentication decision.Moreover,tamped regions are also located for unauthentic music signals.Experimental results show that the proposed method features a high distinction between acceptable manipulations and malicious ones,and at the same time achieves satisfying performance in tamper localization.
出处 《计算机研究与发展》 EI CSCD 北大核心 2012年第1期158-166,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60873255)
关键词 音乐内容认证 音符分割 模糊分类 真实性度量 篡改定位 music content authentication note segmentation fuzzy classification degree of authenticity tamper localization
  • 相关文献

参考文献17

  • 1Zmudzinski S, Steinebach M. Perception-based audio authentication watermarking in the time-frequency domain [G] //LNCS 5806: Information Hiding. Berlin: Springer, 2009:146-160. 被引量:1
  • 2Zmudzinski S, Steinebach M. Psycho-acoustic model-based message authentication coding for audio data [C]//Proc of the 10th ACM Workshop on Multimedia and Security. New York: ACM, 2008:75-84. 被引量:1
  • 3Chen F, Li W, Li X Q. Audio quality-based authentication using wavelet packet decomposition and best tree selection [C] //Proc of 2008 Int Conf on Intelligent Information Hiding and Multimedia Signal Processing. Los Alamitos, CA: IEEE Computer Society, 2008:1265-1268. 被引量:1
  • 4Steinebach M, Dittmann J. Watermarking-based digital audio data authentication [J].EURASIP Journal on Applied Signal Processing, 2003, 2003(10): 1001-1015. 被引量:1
  • 5Gomez E, Cano P, Gomes L de C T, et al. Mixed watermarking-fingerprinting approach for integrity verification of audio recordings [C] //Proc of Int Telecommunications Symposium. Natal, Brazil: ITS, 2002. 被引量:1
  • 6Radhakrishnan R, Memon N. Audio content authentication based on psycho acoustic model [G] //LNCS 4675: Proc of the Security and Watermarking of Multimedia Contents. Bellingham WAL: SHE, 2002:110-117. 被引量:1
  • 7Wu C P, Kuo C C. Speech content integrity verification integrated with ITU G. 72a. 1 speech coding [C]//Proc of 1EEE Int Conf on Information Technology. Los Alamitos, CA: 1EEE Computer Society, 2001:680-684. 被引量:1
  • 8Wu C P, Kuo C C. Speech content authentication integrated with CELP speech codes[C] //Proc of IEEE Int Conf on Multimedia and Expo. Los Alamitos, CA: IEEE Computer Society, 2001:22-25. 被引量:1
  • 9Chen F, He H, Wang H. A fragile watermarking scheme for audio detection and recovery [C] //Proc of the 2008 Congress on Image and Signal Processing. Los Alamitos, CA: IEEE Computer Society, 2008:135-138. 被引量:1
  • 10Quan X, Zhang H. Perceptual criterion based fragile audio watermarking using adaptive wavelet packets [C] /]Proe of the 17th Int Conf on Pattern Recognition. Los Al.amitos, CA: IEEE Computer Society, 2004:867-870. 被引量:1

二级参考文献5

共引文献20

同被引文献18

引证文献2

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部