Encrypted speech authentication and recovery scheme based on fragile watermarking

被引:0
作者
Qiu-yu Zhang
Fu-jiu Xu
机构
[1] Lanzhou University of Technology,School of Computer and Communication
来源
Telecommunication Systems | 2023年 / 82卷
关键词
Encrypted speech authentication; Fragile watermarking; Least significant bit; Tamper recovery; Linear interpolation;
D O I
暂无
中图分类号
学科分类号
摘要
In order to solve the problems that most of the existing speech authentication algorithms can only realize tamper localization of frames, and need to the additional recovery information during tamper recovery, an encrypted speech authentication and recovery scheme based on fragile watermarking was proposed by using least significant bit method (LSB) and linear interpolation method. Firstly, a scrambling encryption algorithm based on Henon mapping is designed to encrypt and decrypt speech. Secondly, the frame number of ciphertext speech is used to construct fragile watermarking information. Finally, the LSB method is used to embed the watermarking into the fourth place after the decimal point of encrypted speech for authentication, and residial-based linear interpolation method is used to tamper recover the unauthenticated speech. The experimental results show that the proposed scheme can realize the tamper detection and location of sampling points, and the restored tampered content has good auditory quality.
引用
收藏
页码:125 / 140
页数:15
相关论文
共 50 条
  • [31] A novel NMF-based authentication scheme for encrypted speech in cloud computing
    Shi, Canghong
    Wang, Hongxia
    Hu, Yi
    Li, Xiaojie
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (17) : 25773 - 25798
  • [32] A novel NMF-based authentication scheme for encrypted speech in cloud computing
    Canghong Shi
    Hongxia Wang
    Yi Hu
    Xiaojie Li
    Multimedia Tools and Applications, 2021, 80 : 25773 - 25798
  • [33] Fragile watermarking scheme for H.264 video authentication
    Wang, Chuen-Ching
    Hsu, Yu-Chang
    OPTICAL ENGINEERING, 2010, 49 (02)
  • [34] An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability
    Durgesh Singh
    Sanjay K Singh
    Sandeep Sambhaji Udmale
    Multimedia Tools and Applications, 2023, 82 : 1045 - 1066
  • [35] An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability
    Singh, Durgesh
    Singh, Sanjay K.
    Udmale, Sandeep Sambhaji
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (01) : 1045 - 1066
  • [36] A fragile watermarking scheme for tamper detection and recovery of image
    Zhu, Haifeng
    Chao, Chunhui
    Tang, Chunming
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 475 - 475
  • [37] A new time-frequency based private fragile watermarking scheme for image authentication
    Barkat, B
    Sattar, F
    SEVENTH INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND ITS APPLICATIONS, VOL 2, PROCEEDINGS, 2003, : 363 - 366
  • [38] A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits
    Qian, Qing
    Cui, Yunhe
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 680 - 684
  • [39] SVD based fragile watermarking scheme for tamper localization and self-recovery
    Irshad Ahmad Ansari
    Millie Pant
    Chang Wook Ahn
    International Journal of Machine Learning and Cybernetics, 2016, 7 : 1225 - 1239
  • [40] Fragile watermarking scheme for digital image authentication using pixel difference
    Chang, C-C
    Lin, P-Y
    Chuang, J-C
    IMAGING SCIENCE JOURNAL, 2007, 55 (03) : 140 - 147