Speech authentication and content recovery scheme for security communication and storage
Qing Qian,
Hongxia Wang (),
Xingming Sun,
Yunhe Cui,
Huan Wang and
Canghong Shi
Additional contact information
Qing Qian: Southwest Jiaotong University
Hongxia Wang: Southwest Jiaotong University
Xingming Sun: Nanjing University of Information Science and Technology
Yunhe Cui: Southwest Jiaotong University
Huan Wang: Southwest Jiaotong University
Canghong Shi: Southwest Jiaotong University
Telecommunication Systems: Modelling, Analysis, Design and Management, 2018, vol. 67, issue 4, No 7, 635-649
Abstract:
Abstract With the rapid development of Internet, it brings a lot of conveniences. However, the data transmission and storage are faced with some security issues that seem to be obstacles to overcome, such as privacy protection and integrity authentication. In this paper, an efficient speech watermarking algorithm is proposed for content authentication and recovery in encrypted domain. The proposed system consists of speech encryption, watermark generation and embedding, content authentication and recovery. In the encryption process, chaotic and block cipher are combined to eliminate the positional correlation and conceal the statistical feature. In the watermark embedding process, approximation coefficients of integer wavelet transform are used to generate watermark and the detail coefficients are reserved to carry watermark. Theoretical analysis and simulation results show that the proposed scheme has high security and excellent inaudibility. Compared with previous works, the proposed scheme has strong ability to detect de-synchronization attacks and locate the corresponding tampered area without using synchronization codes. Meanwhile, the selective encryption will not influence the selective watermarking operation. Similarly, the operation of watermarking will not affect the decryption of the encrypted speech. Additionally, the tampered samples can be recovered without any auxiliary watermark information.
Keywords: Digital watermarking; Encryption; Privacy protection; Tamper detection; Recovery (search for similar items in EconPapers)
Date: 2018
References: View complete reference list from CitEc
Citations: View citations in EconPapers (3)
Downloads: (external link)
http://link.springer.com/10.1007/s11235-017-0360-x Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:67:y:2018:i:4:d:10.1007_s11235-017-0360-x
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-017-0360-x
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().