Speech Content Authentication Scheme based on High-Capacity Watermark Embedding

2017 ◽  
Vol 9 (2) ◽  
pp. 1-14
Author(s):  
Fang Sun ◽  
Zhenghui Liu ◽  
Chuanda Qi

The existed content authentication schemes based on digital watermark have some shortcomings. In order to solve the problems, a speech content authentication scheme based on high-capacity watermark embedding is proposed, and the high-capacity embedding method is discussed. Firstly, speech signal is framed and segmented, and the samples of each segment are scrambled. Secondly, DCT is performed on the scrambled signal, and low-frequency coefficients are selected as the watermark embedding domain. Lastly, frame number is mapped to a sequence of integers and embedded into the domain based on the embedding method. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks, enhances the embedding capacity, and improves the security of watermark system.

2020 ◽  
pp. 400-413
Author(s):  
Fang Sun ◽  
Zhenghui Liu ◽  
Chuanda Qi

The existed content authentication schemes based on digital watermark have some shortcomings. In order to solve the problems, a speech content authentication scheme based on high-capacity watermark embedding is proposed, and the high-capacity embedding method is discussed. Firstly, speech signal is framed and segmented, and the samples of each segment are scrambled. Secondly, DCT is performed on the scrambled signal, and low-frequency coefficients are selected as the watermark embedding domain. Lastly, frame number is mapped to a sequence of integers and embedded into the domain based on the embedding method. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks, enhances the embedding capacity, and improves the security of watermark system.


2013 ◽  
Vol 5 (3) ◽  
pp. 15-34
Author(s):  
Zhenghui Liu ◽  
Hongxia Wang

A speech content authentication algorithm based on pseudo-Zernike moments in DCT domain is proposed in this paper, which is aimed at some shortcomings in some existing digital watermark schemes. The definition of coefficients self-correlation degree is given. Then the frequency domain watermark embedding method based on pseudo-Zernike moments in DCT domain is proposed. Watermark bits are generated by coefficients self-correlation degree and embedded by quantizing the pseudo-Zernike moments of DCT domain low-frequency coefficients. Comparing with the existing audio watermark algorithms based on pseudo-Zernike moments, the algorithm increases the watermarking embedding capacity and improves the efficiency greatly. Theoretical analysis and experimental evaluation results show that the proposed speech content authentication algorithm is effective.


2019 ◽  
Vol 9 (24) ◽  
pp. 5311 ◽  
Author(s):  
Yu-Xia Sun ◽  
Bin Yan ◽  
Jeng-Shyang Pan ◽  
Hong-Mei Yang ◽  
Na Chen

In recent years, reversible data hiding (RDH) has become a research hotspot in the field of multimedia security that has aroused more and more researchers’ attention. Most of the existing RDH algorithms are aiming at continuous-tone images. For RDH in encrypted halftone images (RDH-EH), the original cover image cannot be recovered losslessly after the watermark is extracted. For some application scenarios such as medical or military images sharing, reversibility is critical. In this paper, a reversible data hiding scheme in encrypted color halftone images (RDH-ECH) is proposed. In the watermark embedding procedure, the cover image is copied into two identical images to increase redundancy. We use wet paper code to embed the watermark into the image blocks. Thus, the receiver only needs to process the image blocks by the check matrices in order to extract the watermarks. To increase embedding capacity, we embed three layers in the embedding procedure and combine the resulting images into one image for convenience of transmission. From the experimental results, it can be concluded that the original image can be restored entirely after the watermarks are extracted. Besides, for marked color halftone images, our algorithm can implement high embedding capacity and moderate visual quality.


Author(s):  
Reena Thomas Et. al.

A hybrid watermarking scheme based on Triangular Vertex Transform (TVT) and Contourlet coefficients for high robustness is implemented. During watermark embedding, the cover image is first decomposed using Contourlet Transform to obtain high frequency and low frequency coefficients. The lower frequency coefficients are applied with TVT. Then, the W coefficients obtained from TVT are again subdivided. The watermark bit is then embedded on the subdivided coefficients to obtain the watermarked image. Reverse operation is followed in the extraction phase. The performance of this algorithm is evaluated using embedding capacity, Normalized cross correlation (Ncc) and Peak Signal to Noise Ratio (PSNR) using standard test images. These evaluation results disclose the domination of proposed scheme over traditional schemes


2015 ◽  
Vol 7 (3) ◽  
pp. 19-36 ◽  
Author(s):  
Fan Zhang ◽  
Zhenghui Liu ◽  
Hongxia Wang

Watermark schemes content-based provide one way to solve the veracity and integrity of speech content. Some existed content-based schemes are vulnerable to feature-analysed substitution attack. Aiming to solve the problems, a secure speech content authentication algorithm is proposed, on the basic of the undeterminate angle of discrete fractional fourier transform. In the paper, the definition and calculation of discrete fractional fourier transform are given. And the watermark generation method based on discrete fractional fourier transform is analyzed. Frame number and watermark bits are embedded into hybrid domain of scrambled signals. Compared with the existed watermark schemes, the features for watermark generation and embedding are secret, which improves the security of watermark system. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks and has the excellent ability of tamper detection and tamper location.


2021 ◽  
Vol 129 ◽  
pp. 41-57
Author(s):  
Raphaël C.-W. Phan ◽  
Yin-Yin Low ◽  
KokSheik Wong ◽  
Kazuki Minemura

2010 ◽  
Vol 143-144 ◽  
pp. 915-919
Author(s):  
Yung Cheng Lee

The well-known password authentication mechanisms are widely used in networks to protect resources from unauthorized access. The ad hoc networks, due to their dynamic and lack of network infrastructure features, require authentication schemes to ensure security. In this paper, we propose a new threshold password authentication scheme for ad hoc networks. Our scheme can be efficiently implemented in mobile devices, and can achieve mutual authentication with registered users.


Cryptography ◽  
2020 ◽  
pp. 480-497
Author(s):  
Lin Gao ◽  
Tiegang Gao ◽  
Jie Zhao

This paper proposed a reversible medical image watermarking scheme using Redundant Discrete Wavelet Transform (RDWT) and sub-sample. To meet the highly demand of the perceptional quality, the proposed scheme embedding the watermark by modifying the RDWT coefficients. The sub-sample scheme is introduced to the proposed scheme for the enhancement of the embedding capacity. Moreover, to meet the need of security, a PWLCM based image encryption algorithm is introduced for encrypting the image after the watermark embedding. The experimental results suggests that the proposed scheme not only meet the highly demand of the perceptional quality, but also have better embedding capacity than former DWT based scheme. Also the encryption scheme could protect the image contents efficiently.


Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 111
Author(s):  
Mingliang Zhang ◽  
Zhenyu Li ◽  
Pei Zhang ◽  
Yi Zhang ◽  
Xiangyang Luo

Behavioral steganography is a method used to achieve covert communication based on the sender’s behaviors. It has attracted a great deal of attention due to its robustness and wide application scenarios. Current behavioral steganographic methods are still difficult to apply in practice because of their limited embedding capacity. To this end, this paper proposes a novel high-capacity behavioral steganographic method combining timestamp modulation and carrier selection based on social networks. It is a steganographic method where the embedding process and the extraction process are symmetric. When sending a secret message, the method first maps the secret message to a set of high-frequency keywords and divides them into keyword subsets. Then, the posts containing the keyword subsets are retrieved on social networks. Next, the positions of the keywords in the posts are modulated as the timestamps. Finally, the stego behaviors applied to the retrieved posts are generated. This method does not modify the content of the carrier, which ensures the naturalness of the posts. Compared with typical behavioral steganographic methods, the embedding capacity of the proposed method is 29.23∼51.47 times higher than that of others. Compared to generative text steganography, the embedding capacity is improved by 16.26∼23.94%.


2011 ◽  
Vol 145 ◽  
pp. 552-556 ◽  
Author(s):  
Grace C.W. Ting ◽  
Bok Min Goi ◽  
S. W. Lee

H.264/AVC is a widespread standard for high definition video (HD) for example DVD and HD videos on the internet. To prevent unauthorized modifications, video authentication can be used. In this paper, we present a cryptanalysis of a H.264/AVC video authentication scheme proposed by Saadi et al. [1] at EUSIPCO 2009. Our result will prevent situations where newer schemes are developed from the scheme thus amplifying the flaw. The designers claimed that the scheme can detect modifications on watermarked video. However, we show that an attacker can modify the watermarked video and compute a valid watermark such that the recipient will retrieve a watermark from the modified watermarked video that will match what the recipient computes during video authentication check. Thus, the recipient will think the tampered video is authentic. The first main problem of the scheme is its use of hash functions for watermark generation. Since hash functions are public functions not depending on any secret, the attacker can modify the watermarked video and feed this through the hash function to compute a new watermark. The second problem is that it is possible for the attacker to perform watermark embedding thus producing a modified watermarked video. On receiving the modified video, the recipient recomputes the watermark and compares this with the watermark extracted from the video. They will match because the embedded watermark and recomputed watermark use the same hash function based watermark generation and the same input i.e. the modified video. Our cryptanalysis strategy applies to any watermarking based video authentication scheme where the watermark and embedding are not functions of secrets. As countermeasure, the functions should be designed so that only legitimate parties can perform them. We present two improved schemes that solve this problem based on private key signing functions and message authentication functions respectively.


Sign in / Sign up

Export Citation Format

Share Document