计算机科学 ›› 2009, Vol. 36 ›› Issue (10): 21-24.

• 综述 • 上一篇    下一篇

数字音频认证研究综述

李伟,汪竹蓉,李晓强,刘亚多   

  1. (复旦大学计算机科学与技术学院 上海 200433);(上海大学计算机工程与科学学院 上海 200072)
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(60873255)资助。

Review on Digital Audio Authentication

LI Wei, WANG Zhu-rong, LI Xiao-qiang, LIU Ya-duo   

  • Online:2018-11-16 Published:2018-11-16

摘要: 现代音频信号处理技术使得对音频内容的篡改、替换,对时间序列的调换顺序等恶意操作可以以极低的代价进行,对音频完整性和真实性进行认证变得日益重要。对人类听觉系统来讲,音频认证技术需要保护的是音频内容而不是比特流本身,因此它应该能够容忍一些保持音频听觉质量或者语义的正常信号处理操作而不触发检测器。介绍了音频内容认证技术的产生背景、典型应用场合、需满足的必要性质、硬认证与软认证的特点、保持内容操作和恶意操作的划分,综述了典型的音频内容认证算法,最后总结并讨论了该研究领域的技术特点并提出了可能的解决方案。

关键词: 音频内容认证,保持内容操作,恶意操作,重同步

Abstract: Modern audio processing techniques have made it pretty easy to make modifications like tampering, replace-ment, rearranging etc to audio content and time sectuence. It is more and more important to ascertain the integrity and authenticity of audio data. In toms of human auditory system, audio authentication aims to protect audio content rather than bit stream itself , this way, it should sustain some common signal manipulations that can maintain audio perceptual quality or semantic meaning while leaving authentication detector untriggered. This paper gave a vision on the back-ground, representative application scenarios and properties of audio content authentication, characterized hard authenti-cation and soft authentication, differentiated content preserving and malicious manipulations, and summarized most state-of-the-art audio content authentication algorithms published in the literature. Several technical characteristics in this research field were concluded and discussed, possible solutions were also pointed out for future research.

Key words: Audio content authentication,Content-preserving processing,Malicious processing,Resynchronization

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!