Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks

被引:29
作者
Chen, Oscal T. -C. [1 ]
Liu, Chia-Hsiung [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Elect Engn, Chiayi 621, Taiwan
来源
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING | 2007年 / 15卷 / 05期
关键词
content-dependent watermark; speech codec; speech watermark; watermark attack;
D O I
10.1109/TASL.2007.896658
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
As speech compression technologies have advanced, digital recording devices have become increasingly. popular. However, data formats used in popular speech codecs are known a priori, such that compressed data can be modified easily via insertion, deletion, and replacement. This work proposes a content-dependent watermarking scheme suitable for code-book-excited linear prediction (CELP)-based speech codec that ensures the integrity of compressed speech data. Speech data are initially partitioned into.many groups, each of which includes multiple speech frames. The watermark embedded in each frame is then generated according to the line spectrum frequency (LSF) feature in the current frame, the pitch extracted from the succeeding frame, the watermark embedded in the preceding frame, and the group index which is determined by the location of the current frame. Finally, some of the least significant bits (LSBs) of the indices indicating the excitation pulse positions or excitation vectors are substituted for the watermark. Conventional watermarking schemes can only detect whether compressed speech data are intact. They cannot determine where compressed speech data are altered by insertion, deletion, or replacement, whereas the proposed scheme can. Experiments established that the proposed scheme used in the 6.723.1 6.3 kb/s speech codecs embeds 12 bits in each compressed speech frame with 189 bits, and only decreases the perceptual evaluation of speech quality (PESQ) by 0.11. Additionally, its accuracy in detecting the locations of attacked frames is very high, with only two normal frames mistaken as attacked frames. Therefore, the proposed watermarking scheme effectively ensures the integrity of compressed speech data.
引用
收藏
页码:1605 / 1616
页数:12
相关论文
共 22 条
  • [1] Toward secure public-key blockwise fragile authentication watermarking
    Barreto, PSLM
    Kim, HY
    Rijmen, V
    [J]. IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02): : 57 - 62
  • [2] Cox RJ, 1996, RECORDS RETRIEVAL RE, V12, P1
  • [3] Analysis and design of secure watermark-based authentication systems
    Fei, Chuhong
    Kundur, Deepa
    Kwong, Raymond H.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) : 43 - 55
  • [4] Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    Holliman, M
    Memon, N
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) : 432 - 441
  • [5] An ill-posed operator for secure image authentication
    Izquierdo, E
    Guerra, V
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) : 842 - 852
  • [6] Digital fragile watermarking scheme for authentication of JPEG images
    Li, CT
    [J]. IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2004, 151 (06): : 460 - 466
  • [7] LIU CH, 2004, P IEEE MIDW S CIRC S, V2, P165
  • [8] LIU CH, 2005, P IEEE MIDW S CIRC S, P432
  • [9] Watermarking combined with CELP speech coding for authentication
    Lu, ZM
    Yan, B
    Sun, SH
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (02): : 330 - 334
  • [10] Digital watermarking: Algorithms and applications
    Podilchuk, CI
    Delp, EJ
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2001, 18 (04) : 33 - 46