Encrypted speech authentication and recovery scheme based on fragile watermarking

被引:0
作者
Qiu-yu Zhang
Fu-jiu Xu
机构
[1] Lanzhou University of Technology,School of Computer and Communication
来源
Telecommunication Systems | 2023年 / 82卷
关键词
Encrypted speech authentication; Fragile watermarking; Least significant bit; Tamper recovery; Linear interpolation;
D O I
暂无
中图分类号
学科分类号
摘要
In order to solve the problems that most of the existing speech authentication algorithms can only realize tamper localization of frames, and need to the additional recovery information during tamper recovery, an encrypted speech authentication and recovery scheme based on fragile watermarking was proposed by using least significant bit method (LSB) and linear interpolation method. Firstly, a scrambling encryption algorithm based on Henon mapping is designed to encrypt and decrypt speech. Secondly, the frame number of ciphertext speech is used to construct fragile watermarking information. Finally, the LSB method is used to embed the watermarking into the fourth place after the decimal point of encrypted speech for authentication, and residial-based linear interpolation method is used to tamper recover the unauthenticated speech. The experimental results show that the proposed scheme can realize the tamper detection and location of sampling points, and the restored tampered content has good auditory quality.
引用
收藏
页码:125 / 140
页数:15
相关论文
共 50 条
  • [21] Image authentication scheme based on reversible fragile watermarking with two images
    Peng, Yinyin
    Niu, Xuejing
    Fu, Lei
    Yin, Zhaoxia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 236 - 246
  • [22] A New Fragile Watermarking Scheme for Text Documents Authentication
    XIANG Huazheng
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1661 - 1666
  • [23] Authentication and recovery algorithm for speech signal based on digital watermarking
    Liu, Zhenghui
    Zhang, Fan
    Wang, Jing
    Wang, Hongxia
    Huang, Jiwu
    SIGNAL PROCESSING, 2016, 123 : 157 - 166
  • [24] Image Fragile Watermarking with Two Authentication Components for Tamper Detection and Recovery
    Rakhmawati, Lusia
    Wirawan
    Suwadi
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AUTONOMOUS SYSTEMS (ICOIAS), 2018, : 35 - 38
  • [25] An encrypted speech authentication and tampering recovery method based on perceptual hashing
    Zhang, Qiu-yu
    Zhang, Deng-hai
    Xu, Fu-jiu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) : 24925 - 24948
  • [26] An encrypted speech authentication and tampering recovery method based on perceptual hashing
    Qiu-yu Zhang
    Deng-hai Zhang
    Fu-jiu Xu
    Multimedia Tools and Applications, 2021, 80 : 24925 - 24948
  • [27] A new time-frequency based fragile watermarking scheme for image authentication
    Sattar, F
    Barkat, B
    2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 992 - 995
  • [28] A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability
    Rakhmawati, Lusia
    Wirawan, Wirawan
    Suwadi, Suwadi
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2019, 2019 (1)
  • [29] A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability
    Lusia Rakhmawati
    Wirawan Wirawan
    Suwadi Suwadi
    EURASIP Journal on Image and Video Processing, 2019
  • [30] A Fragile Watermarking Scheme for Image Authentication Using Wavelet Transform
    Azeroual, Assma
    Afdel, Karim
    IMAGE AND SIGNAL PROCESSING (ICISP 2016), 2016, 9680 : 337 - 345