Comparison of two speech content authentication approaches

被引:6
|
作者
Wu, CP [1 ]
Kuo, CCJ [1 ]
机构
[1] Univ So Calif, Dept Elect Engn, Los Angeles, CA 90089 USA
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV | 2002年 / 4675卷
关键词
content authentication; speech integrity; tamper detection; fragile watermarking;
D O I
10.1117/12.465272
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Speech content authentication, which is also called speech content integrity or tamper detection, protects the integrity of speech contents instead of the bitstream itself. In this work, two major approaches for flexible speech authentication are presented and compared. The first scheme is based on content feature extraction that is integrated with CELP speech coders to minimize the total computational cost. Speech features relevant to semantic meaning are extracted, encrypted and attached as the header information. The second method embeds fragile watermarks into the speech signal in the frequency domain. If the speech signal is tampered, the secret watermark sequence is also modified. The receiver detects the fragile watermark from received data and compares it to the original secret sequence. These two approaches are compared in terms of computational complexity, false detection rate, and tolerance to mis-synchronization and content preserving operations. It is shown that each approach has its own merits and shortcomings.
引用
收藏
页码:158 / 169
页数:12
相关论文
共 50 条
  • [1] Comparison of the content of two physiotherapy approaches for stroke
    van Vliet, PM
    Lincoln, NB
    Robinson, E
    CLINICAL REHABILITATION, 2001, 15 (04) : 398 - 414
  • [2] Robust Speech Hashing for Content Authentication
    Jiao, Yuhua
    Ji, Liping
    Niu, Xiamu
    IEEE SIGNAL PROCESSING LETTERS, 2009, 16 (09) : 818 - 821
  • [3] Strengthening speech content authentication against tampering
    Phan, Raphael C-W
    Low, Yin-Yin
    Wong, KokSheik
    Minemura, Kazuki
    SPEECH COMMUNICATION, 2021, 129 : 41 - 57
  • [4] Intervention for children with severe speech disorder: A comparison of two approaches
    Crosbie, S
    Holm, A
    Dodd, B
    INTERNATIONAL JOURNAL OF LANGUAGE & COMMUNICATION DISORDERS, 2005, 40 (04) : 467 - 491
  • [5] A comparison of two approaches providing data encryption and authentication on a processor memory bus
    Elbaz, Reouven
    Torres, Lionel
    Sassatelli, Gilles
    Guillemin, Pierre
    Bardouillet, Michel
    Martinez, Albert
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2006, 4148 : 267 - 279
  • [6] Comparison between two hybrid HMM/MLP approaches in speech recognition
    Fontaine, V
    Ris, C
    Leich, H
    Vantieghem, J
    Accaino, S
    VanCompernolle, D
    1996 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, CONFERENCE PROCEEDINGS, VOLS 1-6, 1996, : 3362 - 3365
  • [7] A Comparison of Two Approaches to Bilingual HMM-Based Speech Synthesis
    Pobar, Miran
    Justin, Tadej
    Zibert, Janez
    Mihelic, France
    Ipsic, Ivo
    TEXT, SPEECH, AND DIALOGUE, TSD 2013, 2013, 8082 : 44 - 51
  • [8] Speech content authentication algorithm based on pitch period
    Qian, Qing
    Wang, Hong-Xia
    Liu, Zheng-Hui
    Tiedao Xuebao/Journal of the China Railway Society, 2014, 36 (09): : 60 - 67
  • [9] Comparison of two diagnostic approaches to measure the content of pedophilic sexual fantasies
    Kutscher, Tanja
    Neutze, Janina
    Beier, Klaus M.
    Dahle, Klaus-Peter
    FORENSISCHE PSYCHIATRIE PSYCHOLOGIE KRIMINOLOGIE, 2011, 5 (03) : 165 - 176