Skip to main content

Speech Authentication and Recovery Scheme in Encrypted Domain

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10082))

Included in the following conference series:

Abstract

This paper proposes a self-embedding fragile watermarking scheme in encrypted speech based on hyper-chaotic system and reference sharing mechanism. Hyper-chaotic system is introduced to hide the feature and improve the confidentiality of original speech. Reference sharing mechanism is used to generate watermark for recovering tampered speech area. Combining the encryption and watermarking technologies, the confidentiality and integrity of original speech can be achieved simultaneously. Analysis and experimental results demonstrate that the proposed algorithm can detect and locate the tampered area. Meanwhile, the self-embedding watermark can be extracted to recover the content of tampered speech with high quality. Additionally, the key space is big enough to resist brute-force attack, while the secure keys are sensitive to slight change.

The original version of this chapter was revised. The name of the third author – Sani M. Abdullahi – has been corrected. The erratum to this chapter is available at DOI: 10.1007/978-3-319-53465-7_46

An erratum to this chapter can be found at http://dx.doi.org/10.1007/978-3-319-53465-7_46

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14992-4_13

    Chapter  Google Scholar 

  2. Wu, J., Ping, L., Ge, X., Wang, Y., Fu, J.: Cloud storage as the infrastructure of cloud computing. In: International Conference on Intelligent Computing and Cognitive Informatics, pp. 380–383. IEEE Press, Kuala Lumpur (2010)

    Google Scholar 

  3. Qian, Q., Wang, H.X., Hu, Y., Zhou, L.N., Li, J.F.: A dual fragile watermarking scheme for speech authentication. Multimedia Tools Appl. 75(21), 1–20 (2015)

    Google Scholar 

  4. Wang, H., Zhou, L., Zhang, W., Liu, S.: Watermarking-based perceptual hashing search over encrypted speech. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 423–434. Springer, Heidelberg (2014). doi:10.1007/978-3-662-43886-2_30

    Google Scholar 

  5. Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)

    Article  Google Scholar 

  6. Mostafa, A., Soliman, N.F., Abdalluh, M., El-samie, F.E.A.: Speech encryption using two dimensional chaotic maps. In: 11th International Computer Engineering Conference, pp. 235–240. IEEE Press, Cairo (2015)

    Google Scholar 

  7. Wu, X.: A color image encryption algorithm using the fractional-order hyperchaotic systems. In: 2012 Fifth International Workshop on Chaos-Fractals Theories and Applications (IWCFTA), pp. 196–201. IEEE Press, Dalian (2012)

    Google Scholar 

  8. Wang, H., Hempel, M., Peng, D., Wang, W., Sharif, H., Chen, H.H.: Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Trans. Multimedia 12(3), 215–223 (2010)

    Article  Google Scholar 

  9. Liu, Z., Wang, H.: A novel speech content authentication algorithm based on Bessel-CFourier moments. Digit. Signal Proc. 24, 197–208 (2014)

    Article  Google Scholar 

  10. Chen, O.T., Liu, C.H.: Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Trans. Audio Speech Lang. Process. 15(5), 1605–1616 (2007)

    Article  Google Scholar 

  11. Yan, B., Guo, Y.J.: Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization. Multimedia Tools Appl. 67(2), 383–405 (2013)

    Article  Google Scholar 

  12. Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sig. Process. 94, 118–127 (2014)

    Article  Google Scholar 

  13. Qian, Z., Zhang, X., Wang, S.: Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimedia 16(5), 1486–1491 (2014)

    Article  Google Scholar 

  14. Karim, M.S.A., Wong, K.: Universal data embedding in encrypted domain. Sig. Process. 94, 174–182 (2014)

    Article  Google Scholar 

  15. Dixit, S., Gaikwad, A., Gaikwad, S., Shanwad, S.A., Scholar, U.G.: Public key cryptography based lossless and reversible data hiding in encrypted images. Int. J. Eng. Sci. 6, 3550–3557 (2016)

    Google Scholar 

  16. Ma, K.L., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553–562 (2013)

    Article  Google Scholar 

  17. Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826–832 (2012)

    Article  Google Scholar 

  18. Cao, X., Du, L., Wei, X., Meng, D., Guo, X.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132–1243 (2016)

    Article  Google Scholar 

  19. Shen, C., Yu, S., Lu, J., Chen, G.: A systematic methodology for constructing hyperchaotic systems with multiple positive Lyapunov exponents and circuit implementation. IEEE Trans. Circuits Syst. I Regul. Pap. 61(3), 854–864 (2014)

    Article  Google Scholar 

  20. Zhang, X., Wang, S., Qian, Z., Feng, G.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485–495 (2011)

    Article  MathSciNet  Google Scholar 

  21. Kahan, W.: IEEE standard 754 for binary floating-point arithmetic. In: Lecture Notes on the Status of IEEE 754, 94720–1776, 11 (1996)

    Google Scholar 

  22. Cowlishaw, M.F.: Decimal floating-point: algorism for computers. In: Proceedings of 16th IEEE Symposium on Computer Arithmetic, pp. 104–111. IEEE Press (2003)

    Google Scholar 

  23. EBU, SQAM - Sound Quality Assessment Material. http://sound.media.mit.edu/resources/mpeg4/audio/sqam/

  24. Thiede, T., Treurniet, W.C., Bitto, R., Schmidmer, C., Sporer, T., Beerends, J.G., Colomes, C.: PEAQ-The ITU standard for objective measurement of perceived audio quality. J. Audio Eng. Soc. 48(1/2), 3–29 (2000)

    Google Scholar 

  25. Liu, Z., Zhang, F., Wang, J., Wang, H., Huang, J.: Authentication and recovery algorithm for speech signal based on digital watermarking. Sig. Process. 123(C), 157–166 (2016)

    Article  Google Scholar 

  26. Chen, F., He, H., Wang, H.: A fragile watermarking scheme for audio detection and recovery. In: Proceeding of International Congress on Image and Signal Processing, pp. 135–138. IEEE Press, Sanya (2008)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the National Natural Science Foundation of China (NSFC) under the grant No. U1536110.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongxia Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Qian, Q., Wang, H., Abdullahi, S.M., Wang, H., Shi, C. (2017). Speech Authentication and Recovery Scheme in Encrypted Domain. In: Shi, Y., Kim, H., Perez-Gonzalez, F., Liu, F. (eds) Digital Forensics and Watermarking. IWDW 2016. Lecture Notes in Computer Science(), vol 10082. Springer, Cham. https://doi.org/10.1007/978-3-319-53465-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53465-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53464-0

  • Online ISBN: 978-3-319-53465-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics