2014
DOI: 10.11591/telkomnika.v12i4.4934
|View full text |Cite
|
Sign up to set email alerts
|

Perceptual Speech Hashing Authentication Algorithm Based on Linear Prediction Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…The results illustrate that the method exhibits good performance but a poor efficiency, which is not appropriated for real-time speech authentication. Huang et al (2014) tries to improve the algorithm based on linear forecast analysis, called E+LPC algorithm, experiments of which show that the algorithm has a high efficiency but less robustness.…”
Section: Introductionmentioning
confidence: 99%
“…The results illustrate that the method exhibits good performance but a poor efficiency, which is not appropriated for real-time speech authentication. Huang et al (2014) tries to improve the algorithm based on linear forecast analysis, called E+LPC algorithm, experiments of which show that the algorithm has a high efficiency but less robustness.…”
Section: Introductionmentioning
confidence: 99%
“…The algorithm can better realize the content integrity authentication of speech and broadband audio signal. Since put forward, this technology has been widely used because of its good performance [3][4][5][6][7], but most of them don't consider the security of the algorithm itself. For example, M. Nouri et al [3] proposed a speech perceptual hashing algorithm based on secret key, so the algorithm has certain security and collision resistance.…”
Section: Introductionmentioning
confidence: 99%
“…For example, M. Nouri et al [3] proposed a speech perceptual hashing algorithm based on secret key, so the algorithm has certain security and collision resistance. Y. Huang et al [4] proposed a speech perceptual hashing algorithm based on modified Linear Prediction Analysis. This algorithm has high efficiency for authentication, but it has weak robustness.…”
Section: Introductionmentioning
confidence: 99%
“…It provides secure and reliable technique supports for the content identification, retrieval and authentication of multimedia information [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%