Speech watermarking based tamper detection and recovery scheme with high tolerable tamper rate

被引:3
|
作者
Wang, Shengbei [1 ]
Yuan, Weitao [1 ]
Zhang, Zhen [1 ]
Wang, Lin [2 ]
机构
[1] Tiangong Univ, Tianjin Key Lab Autonomous Intelligence Technol &, Tianjin 300387, Peoples R China
[2] Techfantasy Co Ltd, Tianjin 300387, Peoples R China
基金
中国国家自然科学基金;
关键词
Speech watermarking; Tamper detection; Tamper recovery; Speech authentication; FRAGILE IMAGE WATERMARKING; AUDIO WATERMARKING; AUTHENTICATION; ALGORITHM;
D O I
10.1007/s11042-023-15580-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Speech watermarking has been widely used for tamper detection and recovery. In this paper, we propose a speech watermarking based tamper detection and recovery method after analyzing the characteristics of continuous and discontinuous tamper. The authentication watermarks and recovery watermarks are embedded into the original speech using align embedding and misalign embedding strategies, respectively. In particular, the misalign embedding strategy which distributes the recovery watermarks repeatedly and widely can effectively prevent the speech segment and its recovery watermarks from being tampered simultaneously, which significantly increases the tolerable tamper rate (TTR) of the proposed method. Several experiments concerning inaudibility, recovery rate, sound quality of recovered speech, and recovery percentage were carried out to evaluate the proposed method. The obtained results suggested that the proposed method had good inaudibility. Moreover, it could tolerate high tamper rate (around 50%) and provide satisfactory recovery rate (100%) and speech quality (PESQ & GE; 3.0 ODG and LSD & LE; 1.0 dB) under continuous tamper (for N & GE; 6). Similarly, it could recovery most of the speech after discontinuous tamper even under high tamper rate. These results verified the effectiveness of the proposed method.
引用
收藏
页码:6711 / 6729
页数:19
相关论文
共 50 条
  • [21] An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection
    Singh, Priyanka
    Agarwal, Suneeta
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (14) : 8165 - 8194
  • [22] An Imperceptible Watermarking Scheme for Medical Image Tamper Detection
    Soualmi, Abdallah
    Alti, Adel
    Laouamer, Lamri
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [23] Tamper Detection in Speech based Access Control Systems using Watermarking
    Garlapati, Bala Mallikarjunarao
    Chalamala, Srinivasa Rao
    Kakkirala, Krishna Rao
    2015 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION (AIMS 2015), 2015, : 325 - 331
  • [24] A Fragile Watermarking Scheme for Tamper Detection of Data Cubes
    Xu, Qiao-li
    Guo, Jie
    Xu, Peng
    Qiu, Wei-dong
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, MACHINERY AND MATERIALS (IIMM 2015), 2015, : 329 - 333
  • [25] PSIS-based blind watermarking scheme (PSISBW) with tamper detection
    Kaur, Gurpreet
    Patidar, Vinod
    Agarwal, Rekha
    JOURNAL OF ANALYSIS, 2024, 32 (01): : 283 - 309
  • [26] Reversible Medical Image Watermarking For Tamper Detection And Recovery
    Liew, Siau-Chuin
    Zain, Jasni Mohamad
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 417 - 420
  • [27] PSIS-based blind watermarking scheme (PSISBW) with tamper detection
    Gurpreet Kaur
    Vinod Patidar
    Rekha Agarwal
    The Journal of Analysis, 2024, 32 : 283 - 309
  • [28] A chaotic system based fragile watermarking scheme for image tamper detection
    Rawat, Sanjay
    Raman, Balasubramanian
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2011, 65 (10) : 840 - 847
  • [29] A Refining Localization Watermarking for Image Tamper detection and Recovery
    Cheng, Baotian
    Ni, Rongrong
    Zhao, Yao
    PROCEEDINGS OF 2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (ICSP) VOLS 1-3, 2012, : 984 - 988
  • [30] Stereo Matching Based Stereo Image Watermarking for Tamper Detection and Recovery
    Ting Luo
    Gangyi Jiang
    Mei Yu
    Feng Shao
    Zongju Peng
    Yo-Sung Ho
    International Journal of Computational Intelligence Systems, 2014, 7 : 874 - 881