A Robust Speech Content Authentication Algorithm Against Desynchronization Attacks

2014 ◽  
Vol 9 (9) ◽  
pp. 723-728 ◽  
Author(s):  
Bin Han ◽  
Enjie Gou
2021 ◽  
Vol 129 ◽  
pp. 41-57
Author(s):  
Raphaël C.-W. Phan ◽  
Yin-Yin Low ◽  
KokSheik Wong ◽  
Kazuki Minemura

2017 ◽  
Vol 9 (2) ◽  
pp. 1-14
Author(s):  
Fang Sun ◽  
Zhenghui Liu ◽  
Chuanda Qi

The existed content authentication schemes based on digital watermark have some shortcomings. In order to solve the problems, a speech content authentication scheme based on high-capacity watermark embedding is proposed, and the high-capacity embedding method is discussed. Firstly, speech signal is framed and segmented, and the samples of each segment are scrambled. Secondly, DCT is performed on the scrambled signal, and low-frequency coefficients are selected as the watermark embedding domain. Lastly, frame number is mapped to a sequence of integers and embedded into the domain based on the embedding method. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks, enhances the embedding capacity, and improves the security of watermark system.


2020 ◽  
pp. 400-413
Author(s):  
Fang Sun ◽  
Zhenghui Liu ◽  
Chuanda Qi

The existed content authentication schemes based on digital watermark have some shortcomings. In order to solve the problems, a speech content authentication scheme based on high-capacity watermark embedding is proposed, and the high-capacity embedding method is discussed. Firstly, speech signal is framed and segmented, and the samples of each segment are scrambled. Secondly, DCT is performed on the scrambled signal, and low-frequency coefficients are selected as the watermark embedding domain. Lastly, frame number is mapped to a sequence of integers and embedded into the domain based on the embedding method. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks, enhances the embedding capacity, and improves the security of watermark system.


2015 ◽  
Vol 7 (3) ◽  
pp. 19-36 ◽  
Author(s):  
Fan Zhang ◽  
Zhenghui Liu ◽  
Hongxia Wang

Watermark schemes content-based provide one way to solve the veracity and integrity of speech content. Some existed content-based schemes are vulnerable to feature-analysed substitution attack. Aiming to solve the problems, a secure speech content authentication algorithm is proposed, on the basic of the undeterminate angle of discrete fractional fourier transform. In the paper, the definition and calculation of discrete fractional fourier transform are given. And the watermark generation method based on discrete fractional fourier transform is analyzed. Frame number and watermark bits are embedded into hybrid domain of scrambled signals. Compared with the existed watermark schemes, the features for watermark generation and embedding are secret, which improves the security of watermark system. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks and has the excellent ability of tamper detection and tamper location.


2013 ◽  
Vol 5 (3) ◽  
pp. 15-34
Author(s):  
Zhenghui Liu ◽  
Hongxia Wang

A speech content authentication algorithm based on pseudo-Zernike moments in DCT domain is proposed in this paper, which is aimed at some shortcomings in some existing digital watermark schemes. The definition of coefficients self-correlation degree is given. Then the frequency domain watermark embedding method based on pseudo-Zernike moments in DCT domain is proposed. Watermark bits are generated by coefficients self-correlation degree and embedded by quantizing the pseudo-Zernike moments of DCT domain low-frequency coefficients. Comparing with the existing audio watermark algorithms based on pseudo-Zernike moments, the algorithm increases the watermarking embedding capacity and improves the efficiency greatly. Theoretical analysis and experimental evaluation results show that the proposed speech content authentication algorithm is effective.


Sign in / Sign up

Export Citation Format

Share Document