Speech watermarking based tamper detection and recovery scheme with high tolerable tamper rate

被引:3
|
作者
Wang, Shengbei [1 ]
Yuan, Weitao [1 ]
Zhang, Zhen [1 ]
Wang, Lin [2 ]
机构
[1] Tiangong Univ, Tianjin Key Lab Autonomous Intelligence Technol &, Tianjin 300387, Peoples R China
[2] Techfantasy Co Ltd, Tianjin 300387, Peoples R China
基金
中国国家自然科学基金;
关键词
Speech watermarking; Tamper detection; Tamper recovery; Speech authentication; FRAGILE IMAGE WATERMARKING; AUDIO WATERMARKING; AUTHENTICATION; ALGORITHM;
D O I
10.1007/s11042-023-15580-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Speech watermarking has been widely used for tamper detection and recovery. In this paper, we propose a speech watermarking based tamper detection and recovery method after analyzing the characteristics of continuous and discontinuous tamper. The authentication watermarks and recovery watermarks are embedded into the original speech using align embedding and misalign embedding strategies, respectively. In particular, the misalign embedding strategy which distributes the recovery watermarks repeatedly and widely can effectively prevent the speech segment and its recovery watermarks from being tampered simultaneously, which significantly increases the tolerable tamper rate (TTR) of the proposed method. Several experiments concerning inaudibility, recovery rate, sound quality of recovered speech, and recovery percentage were carried out to evaluate the proposed method. The obtained results suggested that the proposed method had good inaudibility. Moreover, it could tolerate high tamper rate (around 50%) and provide satisfactory recovery rate (100%) and speech quality (PESQ & GE; 3.0 ODG and LSD & LE; 1.0 dB) under continuous tamper (for N & GE; 6). Similarly, it could recovery most of the speech after discontinuous tamper even under high tamper rate. These results verified the effectiveness of the proposed method.
引用
收藏
页码:6711 / 6729
页数:19
相关论文
共 50 条
  • [31] Stereo Matching Based Stereo Image Watermarking for Tamper Detection and Recovery
    Luo, Ting
    Jiang, Gangyi
    Yu, Mei
    Shao, Feng
    Peng, Zongju
    Ho, Yo-Sung
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2014, 7 (05) : 874 - 881
  • [32] SVD based fragile watermarking scheme for tamper localization and self-recovery
    Ansari, Irshad Ahmad
    Pant, Millie
    Ahn, Chang Wook
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) : 1225 - 1239
  • [33] SVD based fragile watermarking scheme for tamper localization and self-recovery
    Irshad Ahmad Ansari
    Millie Pant
    Chang Wook Ahn
    International Journal of Machine Learning and Cybernetics, 2016, 7 : 1225 - 1239
  • [34] Image watermarking for tamper detection
    Fridrich, J
    1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, 1998, : 404 - 408
  • [35] A Triple Self-Embedding Fragile Watermarking Scheme for Image Tamper Detection and Recovery
    Ozkaya, Huseyin
    Aslantas, Veysel
    IEEE ACCESS, 2024, 12 : 140082 - 140096
  • [36] A cross-embedding based medical image tamper detection and self-recovery watermarking scheme
    Hui Shi
    Kexun Yan
    Jianing Geng
    Yonggong Ren
    Multimedia Tools and Applications, 2024, 83 : 30319 - 30360
  • [37] A Modified Dual watermarking Scheme for digital images with Tamper Localization/detection and recovery Capabilities
    Tashk, Ashkan
    Danyali, Habibollah
    Alavianmehr, Mohammad Ali
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 60 - 65
  • [38] A cross-embedding based medical image tamper detection and self-recovery watermarking scheme
    Shi, Hui
    Yan, Kexun
    Geng, Jianing
    Ren, Yonggong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (10) : 30319 - 30360
  • [39] Robust watermarking scheme for tamper detection and authentication exploiting CA
    Pal, Pabitra
    Jana, Biswapati
    Bhaumik, Jaydeb
    IET IMAGE PROCESSING, 2019, 13 (12) : 2116 - 2129
  • [40] Crypto-watermarking scheme for tamper detection of medical images
    Borra, Surekha
    Thanki, Rohit
    COMPUTER METHODS IN BIOMECHANICS AND BIOMEDICAL ENGINEERING-IMAGING AND VISUALIZATION, 2020, 8 (04): : 345 - 355