A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries

被引:9
|
作者
Shi, Canghong [1 ]
Li, Xiaojie [2 ]
Wang, Hongxia [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Chengdu Univ Informat Technol, Coll Comp Sci, Chengdu 610225, Peoples R China
[3] Sichuan Univ, Coll Cybersecur, Chengdu 610041, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Learned dictionaries; perceptual speech hash; speech integrity authentication; tamper localization; DISCRETE-WAVELET-TRANSFORM; DE-SYNCHRONIZATION; AUDIO; ROBUST; WATERMARKING; SCHEME;
D O I
10.1109/ACCESS.2020.2970093
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perceptual speech hash and robust watermarking have been widely investigated to solve the problems of authenticating speech integrity. The former generates a watermark and the latter embeds the watermark into the speech signal to implement speech integrity authentication. In this paper, we propose a perceptual speech hash algorithm and a robust watermarking algorithm for speech integrity authentication. To obtain perceptual speech hash values, we propose a gammatone filter model of the speech signal to extract sensitive auditory features (denoted by gammatone features). A random Gaussian matrix is used to reduce the dimensionality of the features of the gammatone to generate perceptual speech hash values. For the watermarking algorithm, we construct learned dictionaries to obtain the robust sparse feature of coefficients of the stationary wavelet transforms, and embed a watermark (perceptual speech hash values) into the sparse feature by patchwork and quantization index modulation. We illustrate the good imperceptibility of the authentication scheme in terms of the signal-to-noise ratio, objective difference grade, and subjective difference grade, and verify its robustness against common signal processing operations while maintaining imperceptibility. Moreover, our proposed method is sensitive to the malicious modification of the watermarked speech. Compared with state-of-the-art algorithms, the proposed algorithm can obtain better comprehensive performance in the detection and localization of tampering with the content of speech.
引用
收藏
页码:22249 / 22265
页数:17
相关论文
共 50 条
  • [41] An Efficient Time-Frequency Domain Speech Perceptual Hashing Authentication Algorithm Based on Discrete Wavelet Transform
    Zhang Qiu-yu
    Xing Peng-fei
    Huang Yi-bo
    Dong Rui-hong
    Yang Zhong-ping
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 622 - 627
  • [42] An efficient perceptual hashing based on improved spectral entropy for speech authentication
    Qiu-yu Zhang
    Wen-jin Hu
    Yi-bo Huang
    Si-bin Qiao
    Multimedia Tools and Applications, 2018, 77 : 1555 - 1581
  • [43] An encrypted speech authentication and tampering recovery method based on perceptual hashing
    Zhang, Qiu-yu
    Zhang, Deng-hai
    Xu, Fu-jiu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) : 24925 - 24948
  • [44] An efficient perceptual hashing based on improved spectral entropy for speech authentication
    Zhang, Qiu-yu
    Hu, Wen-jin
    Huang, Yi-bo
    Qiao, Si-bin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 1555 - 1581
  • [45] An encrypted speech authentication and tampering recovery method based on perceptual hashing
    Qiu-yu Zhang
    Deng-hai Zhang
    Fu-jiu Xu
    Multimedia Tools and Applications, 2021, 80 : 24925 - 24948
  • [46] Auto-authentication watermarking scheme based on CNN and perceptual hash function in the wavelet domain
    Rhayma, Hanen
    Ejbali, Ridha
    Hamam, Habib
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (21) : 60079 - 60101
  • [47] Self-Authentication Scheme Based on Semi-Fragile Watermarking and Perceptual Hash Function
    Rhayma, Hanen
    Makhloufi, Achraf
    Ben Hmida, Ahmed
    2014 FIRST INTERNATIONAL IMAGE PROCESSING, APPLICATIONS AND SYSTEMS CONFERENCE (IPAS), 2014,
  • [48] Speech content authentication algorithm based on pitch period
    Qian, Qing
    Wang, Hong-Xia
    Liu, Zheng-Hui
    Tiedao Xuebao/Journal of the China Railway Society, 2014, 36 (09): : 60 - 67
  • [49] A novel RDO based on perceptual algorithm
    Wu, Yuching
    Xiang, Guoqing
    Li, Yuan
    Yan, Wei
    Xie, Xiaodong
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2020, : 645 - 648
  • [50] A Retrieval Algorithm for Encrypted Speech based on Perceptual Hashing
    Zhao, Huan
    He, Shaofang
    2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 1840 - 1845