A watermarking-based authentication and recovery scheme for encrypted audio

被引:0
|
作者
Zhenghui Liu
Yi Cao
Kejia Lin
机构
[1] Xinyang Normal University,School of Computer and Information Technology
[2] Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security,undefined
[3] Guangdong Provincial Key Laboratory of Information Security Technology,undefined
[4] Xinyang Normal University Library,undefined
来源
关键词
Digital watermark; Encrypted audio; Content authentication; Tamper recovery;
D O I
暂无
中图分类号
学科分类号
摘要
To protect the audio stored on third-party servers, a novel authentication and recovery watermarking scheme for encrypted audio is proposed. We define the relative energy (RE) feature and analyze the characteristic of the feature. At the embedding stage, the host audio is encrypted firstly. Then the encrypted audio is divided into frames. We embed watermark bits into each frame by quantifying the RE feature. At the decoding stage, the receivers locate the attacked frames based on the watermark extraction and substitute the attacked frames using 0 amplitude signals, which are scattered over different segments after anti-scrambling transformation and do not influence the expressed meaning of watermarked signal. Experimental evaluation results demonstrate that the scheme improves the security of audio signals stored on third-party servers.
引用
收藏
页码:10969 / 10987
页数:18
相关论文
共 50 条
  • [1] A watermarking-based authentication and recovery scheme for encrypted audio
    Liu, Zhenghui
    Cao, Yi
    Lin, Kejia
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (04) : 10969 - 10987
  • [2] Watermarking-based digital audio data authentication
    Steinebach, M
    Dittmann, J
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2003, 2003 (10) : 1001 - 1015
  • [3] Watermarking-Based Digital Audio Data Authentication
    Martin Steinebach
    Jana Dittmann
    [J]. EURASIP Journal on Advances in Signal Processing, 2003
  • [4] Encrypted speech authentication and recovery scheme based on fragile watermarking
    Qiu-yu Zhang
    Fu-jiu Xu
    [J]. Telecommunication Systems, 2023, 82 : 125 - 140
  • [5] Encrypted speech authentication and recovery scheme based on fragile watermarking
    Zhang, Qiu-yu
    Xu, Fu-jiu
    [J]. TELECOMMUNICATION SYSTEMS, 2023, 82 (01) : 125 - 140
  • [6] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [7] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [8] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [9] Fragile Watermarking-based Authentication Scheme for Demosaicked Images
    Lin, Chia-Chen
    Liu, Xiao-Long
    Lin, Cheng-Han
    Yuan, Shyan-Ming
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 97 - 100
  • [10] Watermarking-based Color Image Authentication With Detection And Recovery Capability
    Roldan, L. R.
    Hernandez, M. C.
    Chao, J.
    Miyatake, M. N.
    Meana, H. P.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (02) : 1050 - 1057