A lightweight fragile audio watermarking method using nested hashes for self-authentication and tamper-proof

被引:0
|
作者
AlSabhany A.A. [1 ,2 ]
Ali A.H. [3 ]
Alsaadi M. [1 ,2 ]
机构
[1] Department of Computer Science, Al-Maarif University College, Al Anbar
[2] IT Unit, Al-Maarif University College, Al Anbar
[3] Ministry of Higher Education and Scientific Research, Studies Planning and Follow-Up Directorate, Baghdad
关键词
Audio tampering; Audio watermark; Fragile watermark; Self-authentication;
D O I
10.1007/s11042-024-18930-5
中图分类号
学科分类号
摘要
Watermarking methods have traditionally emerged from the imperative to guarantee the authenticity of digital documents. As we navigate the current landscape of advancing voice imitation and forgery techniques, safeguarding forensic evidence signals, historic speeches, and music signals has become an urgent challenge. A notable concern with existing methods is the presence of blind spots—areas where tampering goes undetected—significantly impacting detection sensitivity and rates. To address these challenges, this research introduces a fragile audio watermarking method designed to identify even the slightest modifications in audio signals. The approach relies on embedded nested SHA-256 hashes. Performance evaluation demonstrates that any inversion of a bit in the watermarked signals is promptly detected on the blind side of detection. Notably, blind spots are minimized, leading to a remarkable 100% detection rate. Furthermore, comparative results highlight the lightweight nature of the watermark, ensuring high signal imperceptibility. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:89135 / 89149
页数:14
相关论文
共 27 条
  • [21] A novel pixel-wise authentication-based self-embedding fragile watermarking method
    Ertugrul Gul
    Serkan Ozturk
    Multimedia Systems, 2021, 27 : 531 - 545
  • [22] Semi-Fragile Watermarking Method Using Slant Transform and LU Decomposition for Image Authentication
    Sikder, Imran
    Dhar, Pranab Kumar
    Shimamura, Tetsuya
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION ENGINEERING (ECCE), 2017, : 881 - 885
  • [23] Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme
    Li, Chunlei
    Wang, Yunhong
    Ma, Bin
    Zhang, Zhaoxiang
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 367 - 379
  • [24] A novel semi-fragile image watermarking, authentication and self-restoration technique using the slant transform
    Zhao, X.
    Ho, A. T. S.
    Treharne, H.
    Pankajakshan, V.
    Culnane, C.
    Jiang, W.
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 283 - 286
  • [25] AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
    Aminuddin, Afrig
    Ernawan, Ferda
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) : 5822 - 5840
  • [26] Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method
    Ayhan Renklier
    Serkan Öztürk
    Multimedia Tools and Applications, 2024, 83 : 13929 - 13951
  • [27] Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method
    Renklier, Ayhan
    Ozturk, Serkan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (05) : 13929 - 13951