Speech watermarking based tamper detection and recovery scheme with high tolerable tamper rate

被引:3
作者
Wang, Shengbei [1 ]
Yuan, Weitao [1 ]
Zhang, Zhen [1 ]
Wang, Lin [2 ]
机构
[1] Tiangong Univ, Tianjin Key Lab Autonomous Intelligence Technol &, Tianjin 300387, Peoples R China
[2] Techfantasy Co Ltd, Tianjin 300387, Peoples R China
基金
中国国家自然科学基金;
关键词
Speech watermarking; Tamper detection; Tamper recovery; Speech authentication; FRAGILE IMAGE WATERMARKING; AUDIO WATERMARKING; AUTHENTICATION; ALGORITHM;
D O I
10.1007/s11042-023-15580-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Speech watermarking has been widely used for tamper detection and recovery. In this paper, we propose a speech watermarking based tamper detection and recovery method after analyzing the characteristics of continuous and discontinuous tamper. The authentication watermarks and recovery watermarks are embedded into the original speech using align embedding and misalign embedding strategies, respectively. In particular, the misalign embedding strategy which distributes the recovery watermarks repeatedly and widely can effectively prevent the speech segment and its recovery watermarks from being tampered simultaneously, which significantly increases the tolerable tamper rate (TTR) of the proposed method. Several experiments concerning inaudibility, recovery rate, sound quality of recovered speech, and recovery percentage were carried out to evaluate the proposed method. The obtained results suggested that the proposed method had good inaudibility. Moreover, it could tolerate high tamper rate (around 50%) and provide satisfactory recovery rate (100%) and speech quality (PESQ & GE; 3.0 ODG and LSD & LE; 1.0 dB) under continuous tamper (for N & GE; 6). Similarly, it could recovery most of the speech after discontinuous tamper even under high tamper rate. These results verified the effectiveness of the proposed method.
引用
收藏
页码:6711 / 6729
页数:19
相关论文
共 50 条
  • [1] Speech watermarking based tamper detection and recovery scheme with high tolerable tamper rate
    Shengbei Wang
    Weitao Yuan
    Zhen Zhang
    Lin Wang
    Multimedia Tools and Applications, 2024, 83 : 6711 - 6729
  • [2] Epoch event based speech watermarking for tamper detection
    Kumar, Rajeev
    Yadav, Jainath
    INDIAN JOURNAL OF ENGINEERING AND MATERIALS SCIENCES, 2024, 31 (02) : 258 - 269
  • [3] A block-based watermarking scheme for image tamper detection and self-recovery
    Chang, Y. -F.
    Tai, W. -L.
    OPTO-ELECTRONICS REVIEW, 2013, 21 (02) : 182 - 190
  • [4] Tamper detection and self-recovery scheme by DWT watermarking
    Oussama Benrhouma
    Houcemeddine Hermassi
    Safya Belghith
    Nonlinear Dynamics, 2015, 79 : 1817 - 1833
  • [5] Tamper detection and self-recovery scheme by DWT watermarking
    Benrhouma, Oussama
    Hermassi, Houcemeddine
    Belghith, Safya
    NONLINEAR DYNAMICS, 2015, 79 (03) : 1817 - 1833
  • [6] Tamper Detection in Speech based Access Control Systems using Watermarking
    Garlapati, Bala Mallikarjunarao
    Chalamala, Srinivasa Rao
    Kakkirala, Krishna Rao
    2015 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION (AIMS 2015), 2015, : 325 - 331
  • [7] A NEW IMAGE WATERMARKING SCHEME FOR EFFICIENT TAMPER DETECTION, LOCALIZATION AND RECOVERY
    Tohidi, Faranak
    Paul, Manoranjan
    2019 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA & EXPO WORKSHOPS (ICMEW), 2019, : 19 - 24
  • [8] A chaotic system based fragile watermarking scheme for image tamper detection
    Rawat, Sanjay
    Raman, Balasubramanian
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2011, 65 (10) : 840 - 847
  • [9] Tamper Detection and Self-Recovery Watermarking Scheme Based on DWT-SVD
    Hu, YuPing
    Zhang, Jun
    Yin, Hua
    Liu, YiChun
    Liang, YingHong
    ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 614 - 618
  • [10] A majority-voting based watermarking scheme for color image tamper detection and recovery
    Wang, Ming-Shi
    Chen, Wei-Che
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 561 - 570