Encrypted speech authentication and recovery scheme based on fragile watermarking

被引:0
作者
Qiu-yu Zhang
Fu-jiu Xu
机构
[1] Lanzhou University of Technology,School of Computer and Communication
来源
Telecommunication Systems | 2023年 / 82卷
关键词
Encrypted speech authentication; Fragile watermarking; Least significant bit; Tamper recovery; Linear interpolation;
D O I
暂无
中图分类号
学科分类号
摘要
In order to solve the problems that most of the existing speech authentication algorithms can only realize tamper localization of frames, and need to the additional recovery information during tamper recovery, an encrypted speech authentication and recovery scheme based on fragile watermarking was proposed by using least significant bit method (LSB) and linear interpolation method. Firstly, a scrambling encryption algorithm based on Henon mapping is designed to encrypt and decrypt speech. Secondly, the frame number of ciphertext speech is used to construct fragile watermarking information. Finally, the LSB method is used to embed the watermarking into the fourth place after the decimal point of encrypted speech for authentication, and residial-based linear interpolation method is used to tamper recover the unauthenticated speech. The experimental results show that the proposed scheme can realize the tamper detection and location of sampling points, and the restored tampered content has good auditory quality.
引用
收藏
页码:125 / 140
页数:15
相关论文
共 50 条
  • [41] A public fragile watermarking scheme for 3D model authentication
    Chou, Chang-Min
    Tseng, Din-Chang
    COMPUTER-AIDED DESIGN, 2006, 38 (11) : 1154 - 1165
  • [42] SVD based fragile watermarking scheme for tamper localization and self-recovery
    Ansari, Irshad Ahmad
    Pant, Millie
    Ahn, Chang Wook
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) : 1225 - 1239
  • [43] New fragile watermarking method for stereo image authentication with localization and recovery
    Yu, Mei
    Wang, Jing
    Jiang, Gangyi
    Peng, Zongju
    Shao, Feng
    Luo, Ting
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (01) : 361 - 370
  • [44] A survey on fragile watermarking based image authentication schemes
    Raj, N. R. Neena
    Shreelekshmi, R.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (13) : 19307 - 19333
  • [45] A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
    Chen, Wei-Che
    Wang, Ming-Shi
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) : 1300 - 1307
  • [46] A survey on fragile watermarking based image authentication schemes
    N. R. Neena Raj
    R. Shreelekshmi
    Multimedia Tools and Applications, 2021, 80 : 19307 - 19333
  • [47] LBP and DWT Based Fragile Watermarking for Image Authentication
    Wang, Chengyou
    Zhang, Heng
    Zhou, Xiao
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (03): : 666 - 679
  • [48] QUANTIZATION-BASED FRAGILE WATERMARKING USING BLOCK-WISE AUTHENTICATION AND PIXEL-WISE RECOVERY SCHEME FOR TAMPERED IMAGE
    Singh, Durgesh
    Shivani, Shivendra
    Agarwal, Suneeta
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2013, 13 (02)
  • [49] A Novel Fragile Watermarking Scheme for 2D Vector Map Authentication
    Zhang, Guoyin
    Da, Qingan
    Zhang, Liguo
    Sun, Jianguo
    Han, Qilong
    Kou, Liang
    Wang, WenShan
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2017, PT II, 2018, 10736 : 880 - 889
  • [50] Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability
    Qin, Chuan
    Chang, Chin-Chen
    Hsu, Tai-Jung
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (11): : 2941 - 2956