A watermarking-based authentication and recovery scheme for encrypted audio

被引:0
|
作者
Liu, Zhenghui [1 ,2 ,3 ,4 ]
Cao, Yi [1 ]
Lin, Kejia [5 ]
机构
[1] Xinyang Normal Univ, Sch Comp & Informat Technol, Xinyang 464000, Peoples R China
[2] Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[3] Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
[4] Guangdong Prov Key Lab Informat Secur Technol, Guangzhou 510275, Peoples R China
[5] Xinyang Normal Univ Lib, Xinyang 464000, Peoples R China
关键词
Digital watermark; Encrypted audio; Content authentication; Tamper recovery; ROBUST; ALGORITHM; BLIND;
D O I
10.1007/s11042-023-16032-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To protect the audio stored on third-party servers, a novel authentication and recovery watermarking scheme for encrypted audio is proposed. We define the relative energy (RE) feature and analyze the characteristic of the feature. At the embedding stage, the host audio is encrypted firstly. Then the encrypted audio is divided into frames. We embed watermark bits into each frame by quantifying the RE feature. At the decoding stage, the receivers locate the attacked frames based on the watermark extraction and substitute the attacked frames using 0 amplitude signals, which are scattered over different segments after anti-scrambling transformation and do not influence the expressed meaning of watermarked signal. Experimental evaluation results demonstrate that the scheme improves the security of audio signals stored on third-party servers.
引用
收藏
页码:10969 / 10987
页数:19
相关论文
共 50 条
  • [1] A watermarking-based authentication and recovery scheme for encrypted audio
    Zhenghui Liu
    Yi Cao
    Kejia Lin
    [J]. Multimedia Tools and Applications, 2024, 83 : 10969 - 10987
  • [2] Watermarking-based digital audio data authentication
    Steinebach, M
    Dittmann, J
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2003, 2003 (10) : 1001 - 1015
  • [3] Watermarking-Based Digital Audio Data Authentication
    Martin Steinebach
    Jana Dittmann
    [J]. EURASIP Journal on Advances in Signal Processing, 2003
  • [4] Encrypted speech authentication and recovery scheme based on fragile watermarking
    Qiu-yu Zhang
    Fu-jiu Xu
    [J]. Telecommunication Systems, 2023, 82 : 125 - 140
  • [5] Encrypted speech authentication and recovery scheme based on fragile watermarking
    Zhang, Qiu-yu
    Xu, Fu-jiu
    [J]. TELECOMMUNICATION SYSTEMS, 2023, 82 (01) : 125 - 140
  • [6] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [7] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [8] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [9] Fragile Watermarking-based Authentication Scheme for Demosaicked Images
    Lin, Chia-Chen
    Liu, Xiao-Long
    Lin, Cheng-Han
    Yuan, Shyan-Ming
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 97 - 100
  • [10] Watermarking-based Color Image Authentication With Detection And Recovery Capability
    Roldan, L. R.
    Hernandez, M. C.
    Chao, J.
    Miyatake, M. N.
    Meana, H. P.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (02) : 1050 - 1057