Skip to main content

An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT

  • Conference paper
  • First Online:
Book cover Digital-Forensics and Watermarking (IWDW 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9569))

Included in the following conference series:

  • 1191 Accesses

Abstract

A tamper recovery scheme for speech signal based on digital watermark is proposed. In this paper, a compression method based on discrete wavelet transform is discussed, and one block-based embedding method for speech signal is explored. Firstly, speech signal is framed, scrambled and segmented. Secondly, frame number is embedded into the first two segments. The compressed signal of each frame after being scrambled is embedded into other two segments by using the block-based method. Attacked frames can be located by frame number. If watermarked speech is attacked, compressed signals are extracted to perform tamper recovery. Performance analyses indicate that the scheme proposed not only improves the accuracy of tamper localization and the security, but also has the ability of tamper recovery.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pun, C.M., Yuan, X.C.: Robust segments detector for de-synchronization resilient audio watermarking. IEEE Trans. Audio Speech Lang. Process. 21(11), 2412–2424 (2013)

    Article  Google Scholar 

  2. Peng, H., Li, B., Luo, X.H.: A learning-based audio watermarking scheme using kernel Fisher discriminant analysis. Digit. Sig. Proc. 23(1), 382–389 (2013)

    Article  MathSciNet  Google Scholar 

  3. Lei, B., Soon, I.Y., Tan, E.L.: Robust SVD-based audio watermarking scheme with differential evolution optimization. IEEE Trans. Audio Speech Lang. Process. 21(11), 2368–2378 (2013)

    Article  Google Scholar 

  4. Akhaee, M.A., Kalantari, N.K., Marvasti, F.: Robust audio and speech satermarking using Gaussian and Laplacian modeling. Sig. Process. 90(8), 2487–2497 (2010)

    Article  MATH  Google Scholar 

  5. Herbig, T., Gerl, F., Minker, W.: Self-learning speaker identification for enhanced speech recognition. Comput. Speech Lang. 26(3), 210–227 (2012)

    Article  Google Scholar 

  6. Khan, L.A., Baig, M.S., Youssef, A.M.: Speaker recognition from encrypted VoIP communications. Digital Invest. 7(1–2), 65–73 (2010)

    Article  Google Scholar 

  7. Navarathna, R., Dean, D., Sridharan, S.: Multiple cameras for audio-visual speech recognition in an automotive environment. Comput. Speech Lang. 27(4), 911–927 (2013)

    Article  Google Scholar 

  8. Sahidullah, M., Saha, G.: Design, analysis and experimental evaluation of block based transformation in MFCC computation for speaker recognition. Speech Commun. 54(4), 543–565 (2012)

    Article  Google Scholar 

  9. Park, C., Thapa, M.D., Wang, G.N.: Speech authentication system using digital watermarking and pattern recovery. Pattern Recogn. Lett. 28(8), 931–938 (2007)

    Article  Google Scholar 

  10. Chen, O.T.C., Liu, C.H.: Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Trans. Audio Speech Lang. Process. 15(5), 1605–1616 (2007)

    Article  Google Scholar 

  11. Yuan, S., Huss, S.A.: Audio watermarking algorithm for real-time speech integrity and authentication. In: Proceedings of the 2004 Workshop on Multimedia and Security, pp. 220–226 (2004)

    Google Scholar 

  12. Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578–584 (2010)

    Article  MATH  Google Scholar 

  13. Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)

    Article  MATH  Google Scholar 

  14. Li, C.L., Wang, Y.H., Ma, B., Zhang, Z.X.: Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stan. Interfaces 34(4), 367–379 (2012)

    Article  Google Scholar 

  15. Roldan, L.R., Hernandez, M.C., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Watermarking-based image authentication with recovery capability using halftoning technique. Sig. Process. Image Commun. 28(1), 69–83 (2013)

    Article  Google Scholar 

  16. Fakhr, M.W.: Sparse watermark embedding and recovery using compressed sensing framework for audio signals. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, pp. 535–539 (2012)

    Google Scholar 

  17. Vivekananda, B.K., Indranil, S., Abhijit, D.: A new audio watermarking scheme based on singular value decomposition and quantization. Circuits Syst. Sig. Process. 30(5), 915–927 (2011)

    Article  Google Scholar 

  18. Lei, B.Y., Soon, I.Y., Li, Z.: Blind and robust audio watermarking scheme based on SVD-DCT. Sig. Process. 91(8), 1973–1984 (2011)

    Article  MATH  Google Scholar 

  19. Wang, X.Y., Ma, T.X., Niu, P.P.: A pseudo-Zernike moments based audio watermarking scheme robust against desynchronization attacks. Comput. Electr. Eng. 37(4), 425–443 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  20. Liu, Z.H., Wang, H.X.: A novel speech content authentication algorithm based on Bessel-Fourier moments. Digital Sig. Process. 24, 197–208 (2014)

    Article  MathSciNet  Google Scholar 

  21. Wang, Y., Wu, S.Q., Huang, J.W.: Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform. J. Adv. Sig. Process. 2010(13), 1–17 (2010)

    MATH  Google Scholar 

Download references

Acknowledgments

This paper is supported by the National Natural Science Foundation of China (Grant No. 61272465, 61502409). We would like to thank the anonymous reviewers for their constructive suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenghui Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, J., Liu, Z., He, J., Qi, C. (2016). An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31960-5_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31959-9

  • Online ISBN: 978-3-319-31960-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics