Speech watermarking based tamper detection and recovery scheme with high tolerable tamper rate

被引:3
作者
Wang, Shengbei [1 ]
Yuan, Weitao [1 ]
Zhang, Zhen [1 ]
Wang, Lin [2 ]
机构
[1] Tiangong Univ, Tianjin Key Lab Autonomous Intelligence Technol &, Tianjin 300387, Peoples R China
[2] Techfantasy Co Ltd, Tianjin 300387, Peoples R China
基金
中国国家自然科学基金;
关键词
Speech watermarking; Tamper detection; Tamper recovery; Speech authentication; FRAGILE IMAGE WATERMARKING; AUDIO WATERMARKING; AUTHENTICATION; ALGORITHM;
D O I
10.1007/s11042-023-15580-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Speech watermarking has been widely used for tamper detection and recovery. In this paper, we propose a speech watermarking based tamper detection and recovery method after analyzing the characteristics of continuous and discontinuous tamper. The authentication watermarks and recovery watermarks are embedded into the original speech using align embedding and misalign embedding strategies, respectively. In particular, the misalign embedding strategy which distributes the recovery watermarks repeatedly and widely can effectively prevent the speech segment and its recovery watermarks from being tampered simultaneously, which significantly increases the tolerable tamper rate (TTR) of the proposed method. Several experiments concerning inaudibility, recovery rate, sound quality of recovered speech, and recovery percentage were carried out to evaluate the proposed method. The obtained results suggested that the proposed method had good inaudibility. Moreover, it could tolerate high tamper rate (around 50%) and provide satisfactory recovery rate (100%) and speech quality (PESQ & GE; 3.0 ODG and LSD & LE; 1.0 dB) under continuous tamper (for N & GE; 6). Similarly, it could recovery most of the speech after discontinuous tamper even under high tamper rate. These results verified the effectiveness of the proposed method.
引用
收藏
页码:6711 / 6729
页数:19
相关论文
共 50 条
  • [41] Semi-fragile watermarking for tamper detection
    Lin, KZ
    Xiong, CF
    Ma, Q
    Sun, H
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, : 193 - 198
  • [42] A secure image watermarking for tamper detection and localization
    Bhalerao, Siddharth
    Ansari, Irshad Ahmad
    Kumar, Anil
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 1057 - 1068
  • [43] A novel image tamper localization and recovery algorithm based on watermarking technology
    Zhang, Junpeng
    Zhang, Qingfan
    Lv, Hongli
    OPTIK, 2013, 124 (23): : 6367 - 6371
  • [44] Watermarking Algorithm for Tamper Detection and Recovery of E-Invoice Proof Authentication
    Yin B.
    Chen F.
    He H.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2018, 46 (05): : 68 - 77
  • [45] Audio Database Watermarking for Tamper Detection
    Prasannakumari, V.
    Balu, V.
    COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 446 - 448
  • [46] Adaptive tamper detection watermarking scheme for medical images in transform domain
    Sanivarapu, Prasanth Vaidya
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (08) : 11605 - 11619
  • [47] Logistic-map based fragile image watermarking scheme for tamper detection and localization
    Sahu, Aditya Kumar
    Hassaballah, M.
    Rao, Routhu Srinivasa
    Suresh, Gulivindala
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (16) : 24069 - 24100
  • [48] Fragile Watermarking Framework for Tamper Detection of Color Biometric Images
    Thanki, Rohit
    Borra, Surekha
    Kothari, Ashish
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (02) : 35 - 56
  • [49] A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection
    Trivedy, Saswati
    Pal, Arup Kumar
    IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING, 2017, 41 (02) : 103 - 113
  • [50] A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy
    Prasad, Shiv
    Pal, Arup Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (3-4) : 1673 - 1705