A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries

被引:9
|
作者
Shi, Canghong [1 ]
Li, Xiaojie [2 ]
Wang, Hongxia [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Chengdu Univ Informat Technol, Coll Comp Sci, Chengdu 610225, Peoples R China
[3] Sichuan Univ, Coll Cybersecur, Chengdu 610041, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Learned dictionaries; perceptual speech hash; speech integrity authentication; tamper localization; DISCRETE-WAVELET-TRANSFORM; DE-SYNCHRONIZATION; AUDIO; ROBUST; WATERMARKING; SCHEME;
D O I
10.1109/ACCESS.2020.2970093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perceptual speech hash and robust watermarking have been widely investigated to solve the problems of authenticating speech integrity. The former generates a watermark and the latter embeds the watermark into the speech signal to implement speech integrity authentication. In this paper, we propose a perceptual speech hash algorithm and a robust watermarking algorithm for speech integrity authentication. To obtain perceptual speech hash values, we propose a gammatone filter model of the speech signal to extract sensitive auditory features (denoted by gammatone features). A random Gaussian matrix is used to reduce the dimensionality of the features of the gammatone to generate perceptual speech hash values. For the watermarking algorithm, we construct learned dictionaries to obtain the robust sparse feature of coefficients of the stationary wavelet transforms, and embed a watermark (perceptual speech hash values) into the sparse feature by patchwork and quantization index modulation. We illustrate the good imperceptibility of the authentication scheme in terms of the signal-to-noise ratio, objective difference grade, and subjective difference grade, and verify its robustness against common signal processing operations while maintaining imperceptibility. Moreover, our proposed method is sensitive to the malicious modification of the watermarked speech. Compared with state-of-the-art algorithms, the proposed algorithm can obtain better comprehensive performance in the detection and localization of tampering with the content of speech.
引用
收藏
页码:22249 / 22265
页数:17
相关论文
共 50 条
  • [21] A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images
    Ding, Kaimeng
    Liu, Yueming
    Xu, Qin
    Lu, Fuqiang
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2020, 9 (08)
  • [22] A Novel Hash based Technique for Thermal Image Authentication
    Sengupta, Madhumita
    Mandal, Pragati
    Das, Tanmoy
    Dey, Abhijit
    FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 : 147 - 156
  • [23] An Improved Perceptual Hash Algorithm Based on U-Net for the Authentication of High-Resolution Remote Sensing Image
    Ding, Kaimeng
    Yang, Zedong
    Wang, Yingying
    Liu, Yueming
    APPLIED SCIENCES-BASEL, 2019, 9 (15):
  • [24] Learned dictionaries for sparse representation based unit selection speech synthesis
    Sharma, Pulkit
    Abrol, Vinayak
    Sao, Anil Kumar
    2016 TWENTY SECOND NATIONAL CONFERENCE ON COMMUNICATION (NCC), 2016,
  • [25] A Lightweight NFC Authentication Algorithm Based on Modified Hash Function
    Cao, Fang-Ming
    Liu, Dao-Wei
    International Journal of Network Security, 2022, 24 (03): : 436 - 443
  • [26] Perceptual Hash Image Classification Algorithm based on SIFT Feature
    Li, Xi
    Tian, Bin
    Xu, Nan
    2017 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS AND INFORMATION TECHNOLOGY (ICMIT 2017), 2017, : 411 - 415
  • [27] Perceptual hashing based on correlation coefficient of MFCC for speech authentication
    Li, Jin-Feng
    Wu, Tao
    Wang, Hong-Xia
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (02): : 89 - 93
  • [28] A Long Sequence Speech Perceptual Hashing Authentication Algorithm Based on Constant Q Transform and Tensor Decomposition
    Huang, Yibo
    Hou, Hexiang
    Wang, Yong
    Zhang, Yuan
    Fan, Manhong
    IEEE ACCESS, 2020, 8 : 34140 - 34152
  • [29] An efficient speech perceptual hashing authentication algorithm based on the linear prediction minimum mean squared error
    Zhang Q.
    Hu W.
    Qiao S.
    Zhang T.
    1600, Huazhong University of Science and Technology (44): : 127 - 132
  • [30] A novel speech content authentication algorithm based on Bessel-Fourier moments
    Liu, Zhenghui
    Wang, Hongxia
    DIGITAL SIGNAL PROCESSING, 2014, 24 : 197 - 208