{"title":"G.729编码语音的内容完整性验证","authors":"Yuhua Jiao, Yubo Tian, Qiong Li, X. Niu","doi":"10.1109/IIH-MSP.2007.371","DOIUrl":null,"url":null,"abstract":"This paper proposes a method to extract speech features for content integrity verification of G. 729 coded speech, which could minimize the computation cost and reduce the sizes of the features. Experiments results show that the method is robust to common operations in speech transmission such as recompression, volume changing, re-sampling and transcoding, and also does well in tamper detection for its ability to distinguish content preserving operations from malicious modifications.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Content Integrity Verification for G.729 Coded Speech\",\"authors\":\"Yuhua Jiao, Yubo Tian, Qiong Li, X. Niu\",\"doi\":\"10.1109/IIH-MSP.2007.371\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a method to extract speech features for content integrity verification of G. 729 coded speech, which could minimize the computation cost and reduce the sizes of the features. Experiments results show that the method is robust to common operations in speech transmission such as recompression, volume changing, re-sampling and transcoding, and also does well in tamper detection for its ability to distinguish content preserving operations from malicious modifications.\",\"PeriodicalId\":385132,\"journal\":{\"name\":\"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIH-MSP.2007.371\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIH-MSP.2007.371","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Content Integrity Verification for G.729 Coded Speech
This paper proposes a method to extract speech features for content integrity verification of G. 729 coded speech, which could minimize the computation cost and reduce the sizes of the features. Experiments results show that the method is robust to common operations in speech transmission such as recompression, volume changing, re-sampling and transcoding, and also does well in tamper detection for its ability to distinguish content preserving operations from malicious modifications.