EconPapers    
Economics at your fingertips  
 

Speech authentication and content recovery scheme for security communication and storage

Qing Qian, Hongxia Wang (), Xingming Sun, Yunhe Cui, Huan Wang and Canghong Shi
Additional contact information
Qing Qian: Southwest Jiaotong University
Hongxia Wang: Southwest Jiaotong University
Xingming Sun: Nanjing University of Information Science and Technology
Yunhe Cui: Southwest Jiaotong University
Huan Wang: Southwest Jiaotong University
Canghong Shi: Southwest Jiaotong University

Telecommunication Systems: Modelling, Analysis, Design and Management, 2018, vol. 67, issue 4, No 7, 635-649

Abstract: Abstract With the rapid development of Internet, it brings a lot of conveniences. However, the data transmission and storage are faced with some security issues that seem to be obstacles to overcome, such as privacy protection and integrity authentication. In this paper, an efficient speech watermarking algorithm is proposed for content authentication and recovery in encrypted domain. The proposed system consists of speech encryption, watermark generation and embedding, content authentication and recovery. In the encryption process, chaotic and block cipher are combined to eliminate the positional correlation and conceal the statistical feature. In the watermark embedding process, approximation coefficients of integer wavelet transform are used to generate watermark and the detail coefficients are reserved to carry watermark. Theoretical analysis and simulation results show that the proposed scheme has high security and excellent inaudibility. Compared with previous works, the proposed scheme has strong ability to detect de-synchronization attacks and locate the corresponding tampered area without using synchronization codes. Meanwhile, the selective encryption will not influence the selective watermarking operation. Similarly, the operation of watermarking will not affect the decryption of the encrypted speech. Additionally, the tampered samples can be recovered without any auxiliary watermark information.

Keywords: Digital watermarking; Encryption; Privacy protection; Tamper detection; Recovery (search for similar items in EconPapers)
Date: 2018
References: View complete reference list from CitEc
Citations: View citations in EconPapers (3)

Downloads: (external link)
http://link.springer.com/10.1007/s11235-017-0360-x Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:67:y:2018:i:4:d:10.1007_s11235-017-0360-x

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235

DOI: 10.1007/s11235-017-0360-x

Access Statistics for this article

Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan

More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:telsys:v:67:y:2018:i:4:d:10.1007_s11235-017-0360-x