audio authentication
Recently Published Documents


TOTAL DOCUMENTS

29
(FIVE YEARS 1)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Dongmei Li

The current music multiterminal audio authentication algorithm does not consider the mutation of music signal, which leads to poor tamper detection ability and long time of audio authentication. By analyzing the characteristics and key technologies of wireless network, a wireless multiterminal audio system is established. The short-term energy calculation method is used to consider the sudden change of music signal. The music signal is divided into note segments, and chroma features of half order notes are extracted. The robust hash value is calculated by nonuniform quantization method. The dynamic time warping algorithm is used to align the notes, and the Hamming distance between the hash values of each two corresponding notes is calculated to obtain the measurement values of error series, statistical characteristics, and time distribution characteristics. According to the measurement value, the fuzzy classification method is applied to calculate the membership degree of the signals belonging to two different types of operation, and the authentication confidence degree is obtained. The tampered area of the music signal that has not passed the authentication is detected, and the music multiterminal audio authentication is realized. Experimental results show that the proposed algorithm has good tamper detection ability and can effectively shorten the audio authentication time.



2020 ◽  
pp. 179-240
Author(s):  
James Zjalic
Keyword(s):  


Author(s):  
Rashmika Kiran Patole ◽  
Priti Paresh Rege

The field of audio forensics has seen a huge advancement in recent years with an increasing number of techniques used for the analysis of the audio recordings submitted as evidence in legal investigations. Audio forensics involves authentication of the evidentiary audio recordings, which is an important procedure to verify the integrity of audio recordings. This chapter focuses two audio authentication procedures, namely acoustic environment identification and tampering detection. The authors provide a framework for the above-mentioned procedures discussing in detail the methodology and feature sets used in the two tasks. The main objective of this chapter is to introduce the readers to different machine learning algorithms that can be used for environment identification and forgery detection. The authors also provide some promising results that prove the utility of machine learning algorithms in this interesting field.



2019 ◽  
Vol 16 (6) ◽  
pp. 6562-6586
Author(s):  
Jia-Ning Luo ◽  
◽  
Meng-Hsuan Tsai ◽  
Nai-Wei Lo ◽  
Chih-Yang Kao ◽  
...  
Keyword(s):  


Sign in / Sign up

Export Citation Format

Share Document