用户名: 密码: 验证码:
An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT
详细信息    查看全文
  • 关键词:Digital watermark ; Tamper recovery ; Speech compression ; Desynchronization attack
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:9569
  • 期:1
  • 页码:206-219
  • 全文大小:471 KB
  • 参考文献:1.Pun, C.M., Yuan, X.C.: Robust segments detector for de-synchronization resilient audio watermarking. IEEE Trans. Audio Speech Lang. Process. 21(11), 2412–2424 (2013)CrossRef
    2.Peng, H., Li, B., Luo, X.H.: A learning-based audio watermarking scheme using kernel Fisher discriminant analysis. Digit. Sig. Proc. 23(1), 382–389 (2013)MathSciNet CrossRef
    3.Lei, B., Soon, I.Y., Tan, E.L.: Robust SVD-based audio watermarking scheme with differential evolution optimization. IEEE Trans. Audio Speech Lang. Process. 21(11), 2368–2378 (2013)CrossRef
    4.Akhaee, M.A., Kalantari, N.K., Marvasti, F.: Robust audio and speech satermarking using Gaussian and Laplacian modeling. Sig. Process. 90(8), 2487–2497 (2010)CrossRef MATH
    5.Herbig, T., Gerl, F., Minker, W.: Self-learning speaker identification for enhanced speech recognition. Comput. Speech Lang. 26(3), 210–227 (2012)CrossRef
    6.Khan, L.A., Baig, M.S., Youssef, A.M.: Speaker recognition from encrypted VoIP communications. Digital Invest. 7(1–2), 65–73 (2010)CrossRef
    7.Navarathna, R., Dean, D., Sridharan, S.: Multiple cameras for audio-visual speech recognition in an automotive environment. Comput. Speech Lang. 27(4), 911–927 (2013)CrossRef
    8.Sahidullah, M., Saha, G.: Design, analysis and experimental evaluation of block based transformation in MFCC computation for speaker recognition. Speech Commun. 54(4), 543–565 (2012)CrossRef
    9.Park, C., Thapa, M.D., Wang, G.N.: Speech authentication system using digital watermarking and pattern recovery. Pattern Recogn. Lett. 28(8), 931–938 (2007)CrossRef
    10.Chen, O.T.C., Liu, C.H.: Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Trans. Audio Speech Lang. Process. 15(5), 1605–1616 (2007)CrossRef
    11.Yuan, S., Huss, S.A.: Audio watermarking algorithm for real-time speech integrity and authentication. In: Proceedings of the 2004 Workshop on Multimedia and Security, pp. 220–226 (2004)
    12.Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578–584 (2010)CrossRef MATH
    13.Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)CrossRef MATH
    14.Li, C.L., Wang, Y.H., Ma, B., Zhang, Z.X.: Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stan. Interfaces 34(4), 367–379 (2012)CrossRef
    15.Roldan, L.R., Hernandez, M.C., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Watermarking-based image authentication with recovery capability using halftoning technique. Sig. Process. Image Commun. 28(1), 69–83 (2013)CrossRef
    16.Fakhr, M.W.: Sparse watermark embedding and recovery using compressed sensing framework for audio signals. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, pp. 535–539 (2012)
    17.Vivekananda, B.K., Indranil, S., Abhijit, D.: A new audio watermarking scheme based on singular value decomposition and quantization. Circuits Syst. Sig. Process. 30(5), 915–927 (2011)CrossRef
    18.Lei, B.Y., Soon, I.Y., Li, Z.: Blind and robust audio watermarking scheme based on SVD-DCT. Sig. Process. 91(8), 1973–1984 (2011)CrossRef MATH
    19.Wang, X.Y., Ma, T.X., Niu, P.P.: A pseudo-Zernike moments based audio watermarking scheme robust against desynchronization attacks. Comput. Electr. Eng. 37(4), 425–443 (2011)MathSciNet CrossRef MATH
    20.Liu, Z.H., Wang, H.X.: A novel speech content authentication algorithm based on Bessel-Fourier moments. Digital Sig. Process. 24, 197–208 (2014)MathSciNet CrossRef
    21.Wang, Y., Wu, S.Q., Huang, J.W.: Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform. J. Adv. Sig. Process. 2010(13), 1–17 (2010)MATH
  • 作者单位:Jing Wang (17)
    Zhenghui Liu (17)
    Junjie He (17)
    Chuanda Qi (17)

    17. College of Mathematics and Information Science, Xinyang Normal University, Xinyang, 464000, China
  • 丛书名:Digital-Forensics and Watermarking
  • ISBN:978-3-319-31960-5
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
文摘
A tamper recovery scheme for speech signal based on digital watermark is proposed. In this paper, a compression method based on discrete wavelet transform is discussed, and one block-based embedding method for speech signal is explored. Firstly, speech signal is framed, scrambled and segmented. Secondly, frame number is embedded into the first two segments. The compressed signal of each frame after being scrambled is embedded into other two segments by using the block-based method. Attacked frames can be located by frame number. If watermarked speech is attacked, compressed signals are extracted to perform tamper recovery. Performance analyses indicate that the scheme proposed not only improves the accuracy of tamper localization and the security, but also has the ability of tamper recovery.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700