IDEAS home Printed from https://ideas.repec.org/a/spr/telsys/v67y2018i4d10.1007_s11235-017-0360-x.html
   My bibliography  Save this article

Speech authentication and content recovery scheme for security communication and storage

Author

Listed:
  • Qing Qian

    (Southwest Jiaotong University)

  • Hongxia Wang

    (Southwest Jiaotong University)

  • Xingming Sun

    (Nanjing University of Information Science and Technology)

  • Yunhe Cui

    (Southwest Jiaotong University)

  • Huan Wang

    (Southwest Jiaotong University)

  • Canghong Shi

    (Southwest Jiaotong University)

Abstract

With the rapid development of Internet, it brings a lot of conveniences. However, the data transmission and storage are faced with some security issues that seem to be obstacles to overcome, such as privacy protection and integrity authentication. In this paper, an efficient speech watermarking algorithm is proposed for content authentication and recovery in encrypted domain. The proposed system consists of speech encryption, watermark generation and embedding, content authentication and recovery. In the encryption process, chaotic and block cipher are combined to eliminate the positional correlation and conceal the statistical feature. In the watermark embedding process, approximation coefficients of integer wavelet transform are used to generate watermark and the detail coefficients are reserved to carry watermark. Theoretical analysis and simulation results show that the proposed scheme has high security and excellent inaudibility. Compared with previous works, the proposed scheme has strong ability to detect de-synchronization attacks and locate the corresponding tampered area without using synchronization codes. Meanwhile, the selective encryption will not influence the selective watermarking operation. Similarly, the operation of watermarking will not affect the decryption of the encrypted speech. Additionally, the tampered samples can be recovered without any auxiliary watermark information.

Suggested Citation

  • Qing Qian & Hongxia Wang & Xingming Sun & Yunhe Cui & Huan Wang & Canghong Shi, 2018. "Speech authentication and content recovery scheme for security communication and storage," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 67(4), pages 635-649, April.
  • Handle: RePEc:spr:telsys:v:67:y:2018:i:4:d:10.1007_s11235-017-0360-x
    DOI: 10.1007/s11235-017-0360-x
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11235-017-0360-x
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s11235-017-0360-x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Qiu-yu Zhang & Fu-jiu Xu, 2023. "Encrypted speech authentication and recovery scheme based on fragile watermarking," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 82(1), pages 125-140, January.
    2. Slami Saadi & Ahmed Merrad, 2024. "A novel adaptive watermark embedding approach for enhancing security of biometric voice/speech systems," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 86(4), pages 627-643, August.
    3. Qing Qian & Yunhe Cui & Hongxia Wang & Mingsen Deng, 2020. "REPAIR: fragile watermarking for encrypted speech authentication with recovery ability," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 75(3), pages 273-289, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:telsys:v:67:y:2018:i:4:d:10.1007_s11235-017-0360-x. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.