Encrypted speech authentication and recovery scheme based on fragile watermarking

被引:0
|
作者
Qiu-yu Zhang
Fu-jiu Xu
机构
[1] Lanzhou University of Technology,School of Computer and Communication
来源
Telecommunication Systems | 2023年 / 82卷
关键词
Encrypted speech authentication; Fragile watermarking; Least significant bit; Tamper recovery; Linear interpolation;
D O I
暂无
中图分类号
学科分类号
摘要
In order to solve the problems that most of the existing speech authentication algorithms can only realize tamper localization of frames, and need to the additional recovery information during tamper recovery, an encrypted speech authentication and recovery scheme based on fragile watermarking was proposed by using least significant bit method (LSB) and linear interpolation method. Firstly, a scrambling encryption algorithm based on Henon mapping is designed to encrypt and decrypt speech. Secondly, the frame number of ciphertext speech is used to construct fragile watermarking information. Finally, the LSB method is used to embed the watermarking into the fourth place after the decimal point of encrypted speech for authentication, and residial-based linear interpolation method is used to tamper recover the unauthenticated speech. The experimental results show that the proposed scheme can realize the tamper detection and location of sampling points, and the restored tampered content has good auditory quality.
引用
收藏
页码:125 / 140
页数:15
相关论文
共 50 条
  • [21] Speech authentication by semi-fragile watermarking
    Yan, B
    Lu, ZM
    Sun, SH
    Pan, JS
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 497 - 504
  • [22] A self-recovery fragile watermarking scheme for image authentication with superior localization
    HongJie He
    JiaShu Zhang
    Fan Chen
    Science in China Series F: Information Sciences, 2008, 51 : 1487 - 1507
  • [23] A self-recovery fragile watermarking scheme for image authentication with superior localization
    HE HongJie1
    2 Information Security and National Computing Grid Lab
    Science in China(Series F:Information Sciences), 2008, (10) : 1487 - 1507
  • [24] A self-recovery fragile watermarking scheme for image authentication with superior localization
    He HongJie
    Zhang JiaShu
    Chen Fan
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (10): : 1487 - 1507
  • [25] Oblivious fragile watermarking scheme for image authentication
    Li, CT
    Yang, FM
    Lee, CS
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3445 - 3448
  • [26] Security of fragile watermarking scheme for image authentication
    Liao, K-C
    Lee, W-B
    Liao, C-W
    IMAGING SCIENCE JOURNAL, 2006, 54 (03): : 129 - 133
  • [27] A chaos-based fragile watermarking scheme with recovery
    He, Hongjie
    Zhang, Jiashu
    Chen, Fan
    FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 2, PROCEEDINGS, 2007, : 303 - +
  • [28] A Fragile Watermarking Scheme for Color Image Authentication
    Hassan, M. Hamad
    Gilani, S. A. M.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 312 - 316
  • [29] HIERARCHICAL FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Lin, Shinfeng D.
    Yang, Zong-Lin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 245 - 255
  • [30] A secure fragile watermarking scheme for image authentication
    He, Hongjie
    Zhang, Jiashu
    Tai, Heng-Ming
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1180 - 1185