• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Zhurong, Li Wei, Zhu Bilei, Li Xiaoqiang. Audio Authentication Based on Music Content Analysis[J]. Journal of Computer Research and Development, 2012, 49(1): 158-166.
Citation: Wang Zhurong, Li Wei, Zhu Bilei, Li Xiaoqiang. Audio Authentication Based on Music Content Analysis[J]. Journal of Computer Research and Development, 2012, 49(1): 158-166.

Audio Authentication Based on Music Content Analysis

More Information
  • Published Date: January 14, 2012
  • In almost all the existing audio authentication strategies, the smallest authentication entity is a segment with fixed duration, typically a frame whose size is consistent with both protection stage and verification stage. Such fixed-length segmentation has brought about at least two problems: Firstly, if the audio data to be authenticated has undergone some synchronization manipulations such as time-scale modification (TSM) or random cropping, the displacement between the frame sequences of the tested audio and its original may cause an unreliable authentication result; Secondly, authentication based on those fixed-length frames might not be friendly to users since in most cases a frame cannot satisfactorily cover a complete semantic entity of the audio data. In this paper, a novel music content authentication scheme based on note segmentation and fuzzy classification is proposed. We break the restriction of the traditional fixed-length segmentation strategies used in previous audio authentication methods and partition each track into a sequence of musical notes which correspond to minimum meaningful semantic elements of the music. Feature extraction and robust Hashing are performed on each note-based segment, thus settling the synchronization problem that remains a big challenge in most existing audio authentication algorithms. In the verification stage, three newly defined measures that characterize statistical and temporal properties of the distortion between the original and the dubious music, are exploited and further combined with fuzzy classification to make the final authentication decision. Moreover, tamped regions are also located for unauthentic music signals. Experimental results show that the proposed method features a high distinction between acceptable manipulations and malicious ones, and at the same time achieves satisfying performance in tamper localization.
  • Related Articles

    [1]Bi Xiuli, Yan Wuqing, Qiu Yumeng, Xiao Bin, Li Weisheng, Ma Jianfeng. Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image[J]. Journal of Computer Research and Development, 2022, 59(6): 1356-1369. DOI: 10.7544/issn1000-1239.20200995
    [2]Zhang Yumei, He Hongjie, Chen Fan. Webpage Fragile Watermarking Algorithm for Tamper Localization on the Browser[J]. Journal of Computer Research and Development, 2014, 51(12): 2604-2613. DOI: 10.7544/issn1000-1239.2014.20131084
    [3]Wang Kechao, Wang Tiantian, Su Xiaohong, Ma Peijun, Tong Zhixiang. Test Case Selection for Improving the Effectiveness of Software Fault Localization[J]. Journal of Computer Research and Development, 2014, 51(4): 865-873.
    [4]Peng Xin, Li Renfa, Wang Dong, Li Zhetao. Cooperative Localization for Vehicular Ad Hoc Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1210-1216.
    [5]Li Xiaofei, Shen Xuanjing, Chen Haipeng, and Lü Yingda. An Image Identification Algorithm Based on Digital Signature Method[J]. Journal of Computer Research and Development, 2012, 49(6): 1348-1356.
    [6]Wang Chaokun, Fu Junning, Wang Jianmin, Yu Zhiwei. Survey of Software Tamper Proofing Technique[J]. Journal of Computer Research and Development, 2011, 48(6): 923-933.
    [7]Huang He, Chen Guoliang, Sun Yu'e, Xiao Mingjun, Huang Liusheng. Localization Algorithm in Complex Area[J]. Journal of Computer Research and Development, 2011, 48(3): 364-373.
    [8]Wang Xiaoping, Luo Jun, Shen Changxiang. Theory and Algorithms on Localization in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2011, 48(3): 353-363.
    [9]Zhou Quan, Zhu Hongsong, Xu Yongjun, Luo Haiyong, Li Xiaowei. Dynamically Clustering Localization Mechanism for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2009, 46(10): 1642-1650.
    [10]Wang Junwen, Liu Guangjie, Dai Yuewei, Zhang Zhan, and Wang Zhiquan. Image Forensics for Blur Detection Based on Nonsubsampled Contourlet Transform[J]. Journal of Computer Research and Development, 2009, 46(9): 1549-1555.

Catalog

    Article views (939) PDF downloads (487) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return