A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries

被引:9
|
作者
Shi, Canghong [1 ]
Li, Xiaojie [2 ]
Wang, Hongxia [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Chengdu Univ Informat Technol, Coll Comp Sci, Chengdu 610225, Peoples R China
[3] Sichuan Univ, Coll Cybersecur, Chengdu 610041, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Learned dictionaries; perceptual speech hash; speech integrity authentication; tamper localization; DISCRETE-WAVELET-TRANSFORM; DE-SYNCHRONIZATION; AUDIO; ROBUST; WATERMARKING; SCHEME;
D O I
10.1109/ACCESS.2020.2970093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perceptual speech hash and robust watermarking have been widely investigated to solve the problems of authenticating speech integrity. The former generates a watermark and the latter embeds the watermark into the speech signal to implement speech integrity authentication. In this paper, we propose a perceptual speech hash algorithm and a robust watermarking algorithm for speech integrity authentication. To obtain perceptual speech hash values, we propose a gammatone filter model of the speech signal to extract sensitive auditory features (denoted by gammatone features). A random Gaussian matrix is used to reduce the dimensionality of the features of the gammatone to generate perceptual speech hash values. For the watermarking algorithm, we construct learned dictionaries to obtain the robust sparse feature of coefficients of the stationary wavelet transforms, and embed a watermark (perceptual speech hash values) into the sparse feature by patchwork and quantization index modulation. We illustrate the good imperceptibility of the authentication scheme in terms of the signal-to-noise ratio, objective difference grade, and subjective difference grade, and verify its robustness against common signal processing operations while maintaining imperceptibility. Moreover, our proposed method is sensitive to the malicious modification of the watermarked speech. Compared with state-of-the-art algorithms, the proposed algorithm can obtain better comprehensive performance in the detection and localization of tampering with the content of speech.
引用
收藏
页码:22249 / 22265
页数:17
相关论文
共 50 条
  • [31] A NOVEL PERCEPTUAL DISTORTION MINIMIZATION SPEECH ENHANCEMENT ALGORITHM
    Zhang, Yong
    Liu, Yi
    2014 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2014,
  • [32] Data integrity algorithm based on additive generators and hash function
    Vladimir Fomichev
    Dmitry Bobrovskiy
    Alisa Koreneva
    Timur Nabiev
    Dmitry Zadorozhny
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 31 - 41
  • [33] Data integrity algorithm based on additive generators and hash function
    Fomichev, Vladimir
    Bobrovskiy, Dmitry
    Koreneva, Alisa
    Nabiev, Timur
    Zadorozhny, Dmitry
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (01) : 31 - 41
  • [34] Detecting similarity in color images based on perceptual image hash algorithm
    Ali, Nada Hussein M.
    Mahdi, Marwa Emad
    4TH INTERNATIONAL CONFERENCE ON BUILDINGS, CONSTRUCTION AND ENVIRONMENTAL ENGINEERING, 2020, 737
  • [35] An Image Perceptual Hash Algorithm Based on Bidirectional Generative Adversarial Network
    Ma B.
    Wang Y.-L.
    Xu J.
    Wang C.-P.
    Li J.
    Zhou L.-N.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (05): : 1405 - 1412
  • [36] Accurate facial expression recognition method based on perceptual hash algorithm
    Yang, Yang
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2024, 16 (3-4) : 364 - 380
  • [37] A Study and analysis on a perceptual image hash algorithm based on invariant moments
    Hu, Bin
    Sensors and Transducers, 2013, 159 (11): : 337 - 344
  • [38] Analysis and Optimization to an NFC Security Authentication Algorithm Based on Hash Functions
    Zhuang, Zai-Jiao
    Zhang, Jin
    Geng, Wei-Dong
    2014 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORK (WCSN), 2014, : 240 - 245
  • [39] A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix
    Qiu-yu Zhang
    Si-bin Qiao
    Yi-bo Huang
    Tao Zhang
    Multimedia Tools and Applications, 2018, 77 : 21653 - 21669
  • [40] A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix
    Zhang, Qiu-yu
    Qiao, Si-bin
    Huang, Yi-bo
    Zhang, Tao
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (16) : 21653 - 21669