A lightweight fragile audio watermarking method using nested hashes for self-authentication and tamper-proof

被引:0
|
作者
AlSabhany A.A. [1 ,2 ]
Ali A.H. [3 ]
Alsaadi M. [1 ,2 ]
机构
[1] Department of Computer Science, Al-Maarif University College, Al Anbar
[2] IT Unit, Al-Maarif University College, Al Anbar
[3] Ministry of Higher Education and Scientific Research, Studies Planning and Follow-Up Directorate, Baghdad
关键词
Audio tampering; Audio watermark; Fragile watermark; Self-authentication;
D O I
10.1007/s11042-024-18930-5
中图分类号
学科分类号
摘要
Watermarking methods have traditionally emerged from the imperative to guarantee the authenticity of digital documents. As we navigate the current landscape of advancing voice imitation and forgery techniques, safeguarding forensic evidence signals, historic speeches, and music signals has become an urgent challenge. A notable concern with existing methods is the presence of blind spots—areas where tampering goes undetected—significantly impacting detection sensitivity and rates. To address these challenges, this research introduces a fragile audio watermarking method designed to identify even the slightest modifications in audio signals. The approach relies on embedded nested SHA-256 hashes. Performance evaluation demonstrates that any inversion of a bit in the watermarked signals is promptly detected on the blind side of detection. Notably, blind spots are minimized, leading to a remarkable 100% detection rate. Furthermore, comparative results highlight the lightweight nature of the watermark, ensuring high signal imperceptibility. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:89135 / 89149
页数:14
相关论文
共 27 条
  • [1] A Fragile Software Watermarking for Tamper-Proof
    Zhang, Changle
    Peng, Hong
    Long, Xianzhong
    Pan, Zheng
    Wu, Ying
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 309 - 312
  • [2] A tamper-proof and lightweight authentication scheme
    Hammouri, Ghaith
    Ozturk, Erdinc
    Sunar, Berk
    PERVASIVE AND MOBILE COMPUTING, 2008, 4 (06) : 807 - 818
  • [3] A Fragile Watermarking Scheme for Tamper-Proof of Web Pages
    Long, Xianzhong
    Peng, Hong
    Zhang, Changle
    Pan, Zheng
    Wu, Ying
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 155 - 158
  • [4] An Efficient Fragile Watermarking for Web Pages Tamper-Proof
    Wu, Chia-Chi
    Chang, Chin-Chen
    Yang, Shang-Ru
    ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 654 - +
  • [5] Robust watermarking of audio with blind self-authentication
    Farooq, O.
    Datta, S.
    Blackledge, J.
    ELECTRONICS AND COMMUNICATIONS: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS (EHAC '08), 2008, : 35 - +
  • [6] Web pages tamper-proof method using virus-based watermarking
    Jin, Cong
    Xu, Hongfeng
    Zhang, Xiaoliang
    2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1012 - 1015
  • [7] Self-Authentication Scheme Based on Semi-Fragile Watermarking and Perceptual Hash Function
    Rhayma, Hanen
    Makhloufi, Achraf
    Ben Hmida, Ahmed
    2014 FIRST INTERNATIONAL IMAGE PROCESSING, APPLICATIONS AND SYSTEMS CONFERENCE (IPAS), 2014,
  • [8] Semi-fragile watermarking for image authentication and tamper detection using HVS model
    Yang, Hengfu
    Sun, Xingming
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1112 - +
  • [9] A novel reversible fragile watermarking method in DWT domain for tamper localization and digital image authentication
    Azizoglu, Gokhan
    Toprak, Ahmet Nusret
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2023, 84
  • [10] Blind self-authentication of images for robust watermarking using integer wavelet transform
    Bohra, Amit
    Farooq, Omar
    Izharuddin
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2009, 63 (08) : 703 - 707