A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries

被引:9
|
作者
Shi, Canghong [1 ]
Li, Xiaojie [2 ]
Wang, Hongxia [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Chengdu Univ Informat Technol, Coll Comp Sci, Chengdu 610225, Peoples R China
[3] Sichuan Univ, Coll Cybersecur, Chengdu 610041, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Learned dictionaries; perceptual speech hash; speech integrity authentication; tamper localization; DISCRETE-WAVELET-TRANSFORM; DE-SYNCHRONIZATION; AUDIO; ROBUST; WATERMARKING; SCHEME;
D O I
10.1109/ACCESS.2020.2970093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perceptual speech hash and robust watermarking have been widely investigated to solve the problems of authenticating speech integrity. The former generates a watermark and the latter embeds the watermark into the speech signal to implement speech integrity authentication. In this paper, we propose a perceptual speech hash algorithm and a robust watermarking algorithm for speech integrity authentication. To obtain perceptual speech hash values, we propose a gammatone filter model of the speech signal to extract sensitive auditory features (denoted by gammatone features). A random Gaussian matrix is used to reduce the dimensionality of the features of the gammatone to generate perceptual speech hash values. For the watermarking algorithm, we construct learned dictionaries to obtain the robust sparse feature of coefficients of the stationary wavelet transforms, and embed a watermark (perceptual speech hash values) into the sparse feature by patchwork and quantization index modulation. We illustrate the good imperceptibility of the authentication scheme in terms of the signal-to-noise ratio, objective difference grade, and subjective difference grade, and verify its robustness against common signal processing operations while maintaining imperceptibility. Moreover, our proposed method is sensitive to the malicious modification of the watermarked speech. Compared with state-of-the-art algorithms, the proposed algorithm can obtain better comprehensive performance in the detection and localization of tampering with the content of speech.
引用
收藏
页码:22249 / 22265
页数:17
相关论文
共 50 条
  • [1] Perceptual hash algorithm for integrity authentication of remote sensing image
    Ding, Kaimeng
    Zhu, Changqing
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2014, 44 (04): : 723 - 727
  • [2] A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
    Ding, Kaimeng
    Chen, Shiping
    Meng, Fan
    ALGORITHMS, 2018, 11 (01)
  • [3] Perceptual hash algorithm for integrity authentication of multispectral remote sensing images
    Ding, Kai-Meng
    Zhu, Chang-Qing
    Su, Shou-Bao
    Wang, Shao-Ping
    Guangxue Jingmi Gongcheng/Optics and Precision Engineering, 2015, 23 : 677 - 684
  • [4] A novel evaluation method for perceptual hash algorithm in authentication mode
    Liu, Zhaoqing
    Li, Qiong
    Liu, Jingrui
    Niu, Xiamu
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [5] Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery
    Xu, Dingjie
    Ren, Na
    Zhu, Changqing
    REMOTE SENSING, 2023, 15 (19)
  • [6] A Secure Perceptual Hash Algorithm for Image Content Authentication
    Weng, Li
    Preneel, Bart
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 108 - 121
  • [7] Novel perceptual image Hash algorithm
    Zhao, Yu-Xin
    Liu, Guang-Jie
    Dai, Yue-Wei
    Wang, Zhi-Quan
    Guangxue Jingmi Gongcheng/Optics and Precision Engineering, 2008, 16 (03): : 551 - 557
  • [8] Perceptual Hash Secure Speech Authentication System Based on an Improved Chained DES in the Cloud Environment
    Huang, Yi-Bo
    Pu, Xiang-Rong
    Zhang, Qiu-Yu
    International Journal of Network Security, 2022, 24 (05) : 933 - 946
  • [9] The Speech multi features fusion perceptual hash algorithm based on tensor decomposition
    Huang, Y. B.
    Fan, M. H.
    Zhang, Q. Y.
    2017 5TH INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING, MATERIALS SCIENCE AND CIVIL ENGINEERING, 2018, 324
  • [10] Security Analysis of Speech Perceptual Hashing Authentication Algorithm
    Zhang Qiu-yu
    Ren Zhan-wei
    Xing Peng-fei
    Huang Yi-bo
    Yu Shuang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 103 - 118