A dual fragile watermarking scheme for speech authentication

被引:0
|
作者
Qing Qian
Hong-Xia Wang
Yi Hu
Lin-Na Zhou
Jin-Feng Li
机构
[1] Southwest Jiaotong University,School of Information Science and Technology
[2] Northern Kentucky University,Computer Science Department
[3] University of International Relations,undefined
来源
关键词
Fragile watermarking; Hash function; Tamper detection; Precise location; Determine attack type;
D O I
暂无
中图分类号
学科分类号
摘要
In order to achieve the integrity authentication of speech files, a hash-based dual fragile watermarking algorithm is proposed. In the proposed scheme, a host speech signal is firstly transformed into a matrix, then each row and column of the matrix and a sensitive hash function (MD5) are used to generate two fragile watermarks. In the process of tamper detection, extracted watermarks and reconstructed watermarks are applied to construct two verification vectors, which form a verification grid that helps to detect attacks, locate the forgery domain and determine the type of modifications. Experimental results show that the watermarking scheme has good imperceptibility and fragility. More importantly, the proposed algorithm can not only detect attacks, but also accurately locate the tamped samples, and even identify the type of counterfeits.
引用
收藏
页码:13431 / 13450
页数:19
相关论文
共 50 条
  • [1] A dual fragile watermarking scheme for speech authentication
    Qian, Qing
    Wang, Hong-Xia
    Hu, Yi
    Zhou, Lin-Na
    Li, Jin-Feng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13431 - 13450
  • [2] Encrypted speech authentication and recovery scheme based on fragile watermarking
    Zhang, Qiu-yu
    Xu, Fu-jiu
    [J]. TELECOMMUNICATION SYSTEMS, 2023, 82 (01) : 125 - 140
  • [3] Encrypted speech authentication and recovery scheme based on fragile watermarking
    Qiu-yu Zhang
    Fu-jiu Xu
    [J]. Telecommunication Systems, 2023, 82 : 125 - 140
  • [4] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    [J]. ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [5] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    [J]. 2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [6] Speech authentication by semi-fragile watermarking
    Yan, B
    Lu, ZM
    Sun, SH
    Pan, JS
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 497 - 504
  • [7] Oblivious fragile watermarking scheme for image authentication
    Li, CT
    Yang, FM
    Lee, CS
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3445 - 3448
  • [8] Security of fragile watermarking scheme for image authentication
    Liao, K-C
    Lee, W-B
    Liao, C-W
    [J]. IMAGING SCIENCE JOURNAL, 2006, 54 (03): : 129 - 133
  • [9] A Fragile Watermarking Scheme for Color Image Authentication
    Hassan, M. Hamad
    Gilani, S. A. M.
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 312 - 316
  • [10] HIERARCHICAL FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Lin, Shinfeng D.
    Yang, Zong-Lin
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 245 - 255