Skip to main content

2016 | OriginalPaper | Buchkapitel

An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT

verfasst von : Jing Wang, Zhenghui Liu, Junjie He, Chuanda Qi

Erschienen in: Digital-Forensics and Watermarking

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A tamper recovery scheme for speech signal based on digital watermark is proposed. In this paper, a compression method based on discrete wavelet transform is discussed, and one block-based embedding method for speech signal is explored. Firstly, speech signal is framed, scrambled and segmented. Secondly, frame number is embedded into the first two segments. The compressed signal of each frame after being scrambled is embedded into other two segments by using the block-based method. Attacked frames can be located by frame number. If watermarked speech is attacked, compressed signals are extracted to perform tamper recovery. Performance analyses indicate that the scheme proposed not only improves the accuracy of tamper localization and the security, but also has the ability of tamper recovery.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pun, C.M., Yuan, X.C.: Robust segments detector for de-synchronization resilient audio watermarking. IEEE Trans. Audio Speech Lang. Process. 21(11), 2412–2424 (2013)CrossRef Pun, C.M., Yuan, X.C.: Robust segments detector for de-synchronization resilient audio watermarking. IEEE Trans. Audio Speech Lang. Process. 21(11), 2412–2424 (2013)CrossRef
2.
Zurück zum Zitat Peng, H., Li, B., Luo, X.H.: A learning-based audio watermarking scheme using kernel Fisher discriminant analysis. Digit. Sig. Proc. 23(1), 382–389 (2013)MathSciNetCrossRef Peng, H., Li, B., Luo, X.H.: A learning-based audio watermarking scheme using kernel Fisher discriminant analysis. Digit. Sig. Proc. 23(1), 382–389 (2013)MathSciNetCrossRef
3.
Zurück zum Zitat Lei, B., Soon, I.Y., Tan, E.L.: Robust SVD-based audio watermarking scheme with differential evolution optimization. IEEE Trans. Audio Speech Lang. Process. 21(11), 2368–2378 (2013)CrossRef Lei, B., Soon, I.Y., Tan, E.L.: Robust SVD-based audio watermarking scheme with differential evolution optimization. IEEE Trans. Audio Speech Lang. Process. 21(11), 2368–2378 (2013)CrossRef
4.
Zurück zum Zitat Akhaee, M.A., Kalantari, N.K., Marvasti, F.: Robust audio and speech satermarking using Gaussian and Laplacian modeling. Sig. Process. 90(8), 2487–2497 (2010)CrossRefMATH Akhaee, M.A., Kalantari, N.K., Marvasti, F.: Robust audio and speech satermarking using Gaussian and Laplacian modeling. Sig. Process. 90(8), 2487–2497 (2010)CrossRefMATH
5.
Zurück zum Zitat Herbig, T., Gerl, F., Minker, W.: Self-learning speaker identification for enhanced speech recognition. Comput. Speech Lang. 26(3), 210–227 (2012)CrossRef Herbig, T., Gerl, F., Minker, W.: Self-learning speaker identification for enhanced speech recognition. Comput. Speech Lang. 26(3), 210–227 (2012)CrossRef
6.
Zurück zum Zitat Khan, L.A., Baig, M.S., Youssef, A.M.: Speaker recognition from encrypted VoIP communications. Digital Invest. 7(1–2), 65–73 (2010)CrossRef Khan, L.A., Baig, M.S., Youssef, A.M.: Speaker recognition from encrypted VoIP communications. Digital Invest. 7(1–2), 65–73 (2010)CrossRef
7.
Zurück zum Zitat Navarathna, R., Dean, D., Sridharan, S.: Multiple cameras for audio-visual speech recognition in an automotive environment. Comput. Speech Lang. 27(4), 911–927 (2013)CrossRef Navarathna, R., Dean, D., Sridharan, S.: Multiple cameras for audio-visual speech recognition in an automotive environment. Comput. Speech Lang. 27(4), 911–927 (2013)CrossRef
8.
Zurück zum Zitat Sahidullah, M., Saha, G.: Design, analysis and experimental evaluation of block based transformation in MFCC computation for speaker recognition. Speech Commun. 54(4), 543–565 (2012)CrossRef Sahidullah, M., Saha, G.: Design, analysis and experimental evaluation of block based transformation in MFCC computation for speaker recognition. Speech Commun. 54(4), 543–565 (2012)CrossRef
9.
Zurück zum Zitat Park, C., Thapa, M.D., Wang, G.N.: Speech authentication system using digital watermarking and pattern recovery. Pattern Recogn. Lett. 28(8), 931–938 (2007)CrossRef Park, C., Thapa, M.D., Wang, G.N.: Speech authentication system using digital watermarking and pattern recovery. Pattern Recogn. Lett. 28(8), 931–938 (2007)CrossRef
10.
Zurück zum Zitat Chen, O.T.C., Liu, C.H.: Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Trans. Audio Speech Lang. Process. 15(5), 1605–1616 (2007)CrossRef Chen, O.T.C., Liu, C.H.: Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Trans. Audio Speech Lang. Process. 15(5), 1605–1616 (2007)CrossRef
11.
Zurück zum Zitat Yuan, S., Huss, S.A.: Audio watermarking algorithm for real-time speech integrity and authentication. In: Proceedings of the 2004 Workshop on Multimedia and Security, pp. 220–226 (2004) Yuan, S., Huss, S.A.: Audio watermarking algorithm for real-time speech integrity and authentication. In: Proceedings of the 2004 Workshop on Multimedia and Security, pp. 220–226 (2004)
12.
Zurück zum Zitat Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578–584 (2010)CrossRefMATH Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578–584 (2010)CrossRefMATH
13.
Zurück zum Zitat Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)CrossRefMATH Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)CrossRefMATH
14.
Zurück zum Zitat Li, C.L., Wang, Y.H., Ma, B., Zhang, Z.X.: Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stan. Interfaces 34(4), 367–379 (2012)CrossRef Li, C.L., Wang, Y.H., Ma, B., Zhang, Z.X.: Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stan. Interfaces 34(4), 367–379 (2012)CrossRef
15.
Zurück zum Zitat Roldan, L.R., Hernandez, M.C., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Watermarking-based image authentication with recovery capability using halftoning technique. Sig. Process. Image Commun. 28(1), 69–83 (2013)CrossRef Roldan, L.R., Hernandez, M.C., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Watermarking-based image authentication with recovery capability using halftoning technique. Sig. Process. Image Commun. 28(1), 69–83 (2013)CrossRef
16.
Zurück zum Zitat Fakhr, M.W.: Sparse watermark embedding and recovery using compressed sensing framework for audio signals. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, pp. 535–539 (2012) Fakhr, M.W.: Sparse watermark embedding and recovery using compressed sensing framework for audio signals. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, pp. 535–539 (2012)
17.
Zurück zum Zitat Vivekananda, B.K., Indranil, S., Abhijit, D.: A new audio watermarking scheme based on singular value decomposition and quantization. Circuits Syst. Sig. Process. 30(5), 915–927 (2011)CrossRef Vivekananda, B.K., Indranil, S., Abhijit, D.: A new audio watermarking scheme based on singular value decomposition and quantization. Circuits Syst. Sig. Process. 30(5), 915–927 (2011)CrossRef
18.
Zurück zum Zitat Lei, B.Y., Soon, I.Y., Li, Z.: Blind and robust audio watermarking scheme based on SVD-DCT. Sig. Process. 91(8), 1973–1984 (2011)CrossRefMATH Lei, B.Y., Soon, I.Y., Li, Z.: Blind and robust audio watermarking scheme based on SVD-DCT. Sig. Process. 91(8), 1973–1984 (2011)CrossRefMATH
19.
Zurück zum Zitat Wang, X.Y., Ma, T.X., Niu, P.P.: A pseudo-Zernike moments based audio watermarking scheme robust against desynchronization attacks. Comput. Electr. Eng. 37(4), 425–443 (2011)MathSciNetCrossRefMATH Wang, X.Y., Ma, T.X., Niu, P.P.: A pseudo-Zernike moments based audio watermarking scheme robust against desynchronization attacks. Comput. Electr. Eng. 37(4), 425–443 (2011)MathSciNetCrossRefMATH
20.
Zurück zum Zitat Liu, Z.H., Wang, H.X.: A novel speech content authentication algorithm based on Bessel-Fourier moments. Digital Sig. Process. 24, 197–208 (2014)MathSciNetCrossRef Liu, Z.H., Wang, H.X.: A novel speech content authentication algorithm based on Bessel-Fourier moments. Digital Sig. Process. 24, 197–208 (2014)MathSciNetCrossRef
21.
Zurück zum Zitat Wang, Y., Wu, S.Q., Huang, J.W.: Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform. J. Adv. Sig. Process. 2010(13), 1–17 (2010)MATH Wang, Y., Wu, S.Q., Huang, J.W.: Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform. J. Adv. Sig. Process. 2010(13), 1–17 (2010)MATH
Metadaten
Titel
An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT
verfasst von
Jing Wang
Zhenghui Liu
Junjie He
Chuanda Qi
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-31960-5_17