Abstract
With the rapid development of Internet, it brings a lot of conveniences. However, the data transmission and storage are faced with some security issues that seem to be obstacles to overcome, such as privacy protection and integrity authentication. In this paper, an efficient speech watermarking algorithm is proposed for content authentication and recovery in encrypted domain. The proposed system consists of speech encryption, watermark generation and embedding, content authentication and recovery. In the encryption process, chaotic and block cipher are combined to eliminate the positional correlation and conceal the statistical feature. In the watermark embedding process, approximation coefficients of integer wavelet transform are used to generate watermark and the detail coefficients are reserved to carry watermark. Theoretical analysis and simulation results show that the proposed scheme has high security and excellent inaudibility. Compared with previous works, the proposed scheme has strong ability to detect de-synchronization attacks and locate the corresponding tampered area without using synchronization codes. Meanwhile, the selective encryption will not influence the selective watermarking operation. Similarly, the operation of watermarking will not affect the decryption of the encrypted speech. Additionally, the tampered samples can be recovered without any auxiliary watermark information.














Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69–73.
Wang, H. X., Zhou, L. N., Zhang, W., & Liu, S. (2013). Watermarking-based perceptual hashing search over encrypted speech. In Y. Q. Shi, H.-J. Kim, & F. Pérez-González (Eds.), IWDW. LNCS (vol. 8389, pp. 423–434). New Zealand: Springer.
Juels, A., & Kaliski Jr, B.S. (2007). Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security (pp. 584–597), ACM.
Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 90–107), Springer.
Erway, C., Küpçü, A., Papamanthou, C., & Tamassia, R. (2009). Dynamic provable data possession. In Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 213–222), ACM.
Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. (2009). Enabling public verifiability and data dynamics for storage security in cloud computing. In European Symposium on Research in Computer Security (pp. 355–370), Springer.
Benabbas, S., Rosario, G., & Yevgeniy, V. (2011). Verifiable delegation of computation over large datasets. In Annual Cryptology Conference 2011 (pp. 111–131), Springer.
Chen, X., Li, J., Huang, X., Ma, J., & Lou, W. (2015). New publicly verifiable databases with efficient updates. IEEE Transactions on Dependable and Secure Computing, 12(5), 546–556.
Gupta, S., Cho, S., & Kuo, C. C. J. (2012). Current developments and future trends in audio authentication. IEEE MultiMedia, 19(1), 50–59.
Ribaric, S., Ariyaeeinia, A., & Pavesic, N. (2016). De-identification for privacy protection in multimedia content: A survey. Signal Processing: Image Communication, 47, 131–151.
Hua, G., Huang, J. W., Shi, Y. Q., Goh, J., & Thing, V. L. (2016). Twenty years of digital audio watermarkinga comprehensive review. Signal Processing, 128, 222–242.
Chen, O. T. C., & Liu, C. H. (2007). Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Transactions on Audio, Speech, and Language Processing, 15(5), 1605–1616.
Fan, M. Q., Liu, P. P., Wang, H. X., & Li, H. J. (2013). A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform. International Journal of Computer Mathematics, 90(12), 2588–2602.
Gao, T. G., & Chen, Z. Q. (2008). A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(4), 394–400.
Li, Gl, Wang, Yl, & Ma, H. B. (2016). Audio packet encryption of flow control base on stop-and-wait protocol. Journal of Information Hiding and Multimedia, 7(1), 127–134.
Xia, Z., Wang, X., et al. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–2608.
Fu, Z., Wu, X., Guan, C., et al. (2016). Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 11(12), 2706–2716.
Sun, W. H., Lou, W. J., Hou, Y. T., & Li, H. (2014). Privacy-preserving keyword search over encrypted data in cloud computing. In S. Jajodia, K. Kant, P. Samarati, A. Singhal, V. Swarup, & C. Wang (Eds.), Secure cloud computing (pp. 189–212). New York: Springer.
Xia, Z. H., Wang, X. H., Sun, X. M., & Wang, Q. (2016). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.
Qian, Z. X., Zhang, X. P., & Wang, S. Z. (2014). Reversible data hiding in encrypted jpeg bitstream. IEEE Transactions on Multimedia, 16(5), 1486–1491.
Zhang, X. P., Wang, J., Wang, Z. C., & Cheng, H. (2016). Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Transactions on Circuits and Systems for Video Technology, 26(9), 1622–1631.
Lian, S. G., Liu, Z. X., Ren, Z., & Wang, H. L. (2007). Commutative encryption and watermarking in video compression. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774–778.
Wu, X. T., & Sun, W. (2014). High-capacity reversible data hiding in encrypted images by prediction error. Signal Processing, 104, 387–400.
Yao, Y. Z., Zhang, W. M., & Yu, N. H. (2016). Inter-frame distortion drift analysis for reversible data hiding in encrypted h.264/avc video bitstreams. Signal Processing, 128, 531–545.
Calderbank, A. R., Daubechies, I., Sweldens, W., & Yeo, B. L. (1998). Wavelet transforms that map integers to integers. Applied and Computational Harmonic Analysis, 5(3), 332–369.
Wang, X., Li, X. L., Yang, B., & Guo, Z. M. (2010). Efficient generalized integer transform for reversible watermarking. IEEE Signal Processing Letters, 17(6), 567–570.
Lei, B. Y., Soon, Y., & Li, Z. (2011). Blind and robust audio watermarking scheme based on svd-dct. Signal Processing, 91(8), 1973–1984.
Cohen, I., & Berdugo, B. (2002). Noise estimation by minima controlled recursive averaging for robust speech enhancement. IEEE Signal Processing Letters, 9(1), 12–15.
Zhao, M., Shyang, P. J., & Tsung, C. S. (2015). Optimal snr of audio watermarking by wavelet and compact pso methods. Journal of Information Hiding and Multimedia Signal Processing, 6(5), 833–846.
Chen, C. M., Xu, Ll, Wu, T. Y., & Li, C. R. (2016). On the security of a chaotic maps-based three-party authenticated key agreement protocol. Journal of Network Intelligence, 1(2), 61–66.
Daemen, J., & Rijmen, V. (2001). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer.
EBU (2001). Sqam-sound quality assessment material. Website, http://sound.media.mit.edu/resources/mpeg4/audio/.
Chen, G., & Hu, Q.P. (2010). An audio scrambling method based on combination strategy. In 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT) (Vol. 5, pp. 62–66), IEEE.
Thiede, T., Treurniet, W. C., Bitto, R., Schmidmer, C., Sporer, T., Beerends, J. G., et al. (2000). Peaq-the itu standard for objective measurement of perceived audio quality. Journal of the Audio Engineering Society, 48(1/2), 3–29.
Chen, F., He, H.J., & Wang, H.X. (2008). A fragile watermarking scheme for audio detection and recovery. In Image and Signal Processing, 2008. CISP’08. Congress on (Vol. 5, pp. 135–138), IEEE.
Luo, X. R., & Xiang, S. J. (2014). Fragile audio watermarking with perfect restoration capacity based on an adapted integer transform. Wuhan University Journal of Natural Sciences, 19(6), 497–504.
Liu, Z. H., Zhang, F., Wang, J., Wang, H. X., & Huang, J. W. (2016). Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Processing, 123, 157–166.
Acknowledgements
This work is supported by the National Natural Science Foundation of China (NSFC) under the Grant No. U1536110. The Priority Academic Program Development of Jiangsu Higer Education Institutions, and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology. The Education Program for Innovation Entrepreneurship for Southwest Jiaotong University.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Rights and permissions
About this article
Cite this article
Qian, Q., Wang, H., Sun, X. et al. Speech authentication and content recovery scheme for security communication and storage. Telecommun Syst 67, 635–649 (2018). https://doi.org/10.1007/s11235-017-0360-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-017-0360-x