Encrypted speech authentication and recovery scheme based on fragile watermarking

被引:0
|
作者
Qiu-yu Zhang
Fu-jiu Xu
机构
[1] Lanzhou University of Technology,School of Computer and Communication
来源
Telecommunication Systems | 2023年 / 82卷
关键词
Encrypted speech authentication; Fragile watermarking; Least significant bit; Tamper recovery; Linear interpolation;
D O I
暂无
中图分类号
学科分类号
摘要
In order to solve the problems that most of the existing speech authentication algorithms can only realize tamper localization of frames, and need to the additional recovery information during tamper recovery, an encrypted speech authentication and recovery scheme based on fragile watermarking was proposed by using least significant bit method (LSB) and linear interpolation method. Firstly, a scrambling encryption algorithm based on Henon mapping is designed to encrypt and decrypt speech. Secondly, the frame number of ciphertext speech is used to construct fragile watermarking information. Finally, the LSB method is used to embed the watermarking into the fourth place after the decimal point of encrypted speech for authentication, and residial-based linear interpolation method is used to tamper recover the unauthenticated speech. The experimental results show that the proposed scheme can realize the tamper detection and location of sampling points, and the restored tampered content has good auditory quality.
引用
收藏
页码:125 / 140
页数:15
相关论文
共 50 条
  • [31] Image authentication and recovery scheme based on watermarking technique
    Sumitomo, Kenji
    Nakano, Mariko
    Perez, Hector
    PROCEEDINGS OF THE 2ND WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: MODERN TOPICS OF COMPUTER SCIENCE, 2008, : 94 - +
  • [32] DCT based efficient fragile watermarking scheme for image authentication and restoration
    Singh, Durgesh
    Singh, Sanjay K.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (01) : 953 - 977
  • [33] A wavelet-based fragile watermarking scheme for secure image authentication
    He, HongJie
    Zhang, JiaShu
    Tai, Heng-Ming
    Digital Watermarking, Proceedings, 2006, 4283 : 422 - 432
  • [34] Semi-fragile watermarking based content image authentication scheme
    Cruz, Clara
    Reyes, Rogelio
    Nakano, Mariko
    Perez, Hector
    REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2010, (56): : 160 - 169
  • [35] Image authentication scheme based on reversible fragile watermarking with two images
    Peng, Yinyin
    Niu, Xuejing
    Fu, Lei
    Yin, Zhaoxia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 236 - 246
  • [36] DCT based efficient fragile watermarking scheme for image authentication and restoration
    Durgesh Singh
    Sanjay K. Singh
    Multimedia Tools and Applications, 2017, 76 : 953 - 977
  • [37] A New Fragile Watermarking Scheme for Text Documents Authentication
    XIANG Huazheng
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1661 - 1666
  • [38] Time Sensitive Hash and Adaptive Image Recovery based Self-embedding Fragile Watermarking Scheme in Encrypted Images
    Wang, Xin
    He, Hongjie
    Chen, Fan
    2023 ASIA PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE, APSIPA ASC, 2023, : 2402 - 2408
  • [39] Digital fragile watermarking scheme for authentication of JPEG images
    Li, CT
    IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2004, 151 (06): : 460 - 466
  • [40] Authentication and recovery algorithm for speech signal based on digital watermarking
    Liu, Zhenghui
    Zhang, Fan
    Wang, Jing
    Wang, Hongxia
    Huang, Jiwu
    SIGNAL PROCESSING, 2016, 123 : 157 - 166