Skip to main content
Log in

A source coding scheme for authenticating audio signal with capability of self-recovery and anti-synchronization counterfeiting attack

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Authenticating the veracity and integrity of digital media content is the most important application of fragile watermarking technique. Recently, fragile watermarking schemes for digital audio signals are developed to not only detect the malicious falsification, but also recover the tampered audio content. However, they are fragile against synchronization counterfeiting attack, which greatly narrows the applicability of audio watermarking schemes. In this paper, a novel source coding scheme for authenticating audio signal based on set partitioning in hierarchical trees (SPIHT) encoding and chaotic dynamical system with capability of self-recovery and anti-synchronization counterfeiting attack is proposed. For self-recovery feature, the compressed version of audio signal generated by SPIHT source coding and protected against maliciously tampering by repeated coding is embedded into the original audio signal. Besides, for robustness against synchronization counterfeiting attack feature, based on the position and content of audio section, check bits are generated by Hash algorithm and chaotic sequence, and taken as part of fragile watermark. Simulation results show the self-embedding audio authentication scheme is recoverable with proper audio quality, and it has capability against synchronization counterfeiting attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Alireza G, Boroujerdizadeh A, Yaribakht AH (2013) Blind Audio Watermarking for Tamper Detection based on LSB. IEEE 15th International Conference on Advanced Communications Technology (ICACT), pp.1077-1082

  2. Diego R, Dora MBL, Camilo L (2018) Authenticity Verification of Audio Signals Based on Fragile Watermarking for Audio Forensics. Expert Syst Appl 91:211–222

    Article  Google Scholar 

  3. Fan MQ, Liu PP, Wang HX (2013) A Semi-fragile Watermarking Scheme for Authenticating Audio Signal Based on Dual-tree Complex Wavelet Transform and Discrete Cosine Transform. Int J Comput Math 90:2588–2602

    Article  Google Scholar 

  4. Fan MQ, Wang HX (2018) An Enhanced Fragile Watermarking Scheme to Digital Image Protection and Self-recovery. Signal Process Image Commun 66:19–29

    Article  Google Scholar 

  5. Fan MQ, Wang HX, Li HJ (2012) A Fingerprint-based Audio Authentication Scheme Using Frequency Domain Statistical Characteristic. Multimed Tools Appl 51:2255–2270

    Google Scholar 

  6. Hwang M, Lee JS, Lee MS (2018) SVD-based Adaptive QIM Watermarking on Stereo Audio Signals. IEEE Transactions on Multimedia 20:45–54

    Article  Google Scholar 

  7. ITU-T Recommendation G. (1996) Dual Rate Speech Coder for Multimedia Communications Transmitting at 5.3 and 6.3 kbits, 723.1

  8. Korus P, Dziech A (2014) Adaptive Self-embedding Scheme with Controlled Reconstruction Performance. IEEE Transactions on Information Forensics Security 9:169–181

    Article  Google Scholar 

  9. Liu JX, Lu ZM (2009) A Multipurpose Audio Watermarking Algorithm Based on Vector Quantization in DCT Domain. IEEE Trans Signal Process 31:395–400

    Google Scholar 

  10. Liu ZH, Luo D, Huang JW (2017) Tamper Recovery Algorithm for Digital Speech Signal Based on DWT and DCT. Multimed Tools Appl 76:12481–12504

    Article  Google Scholar 

  11. Liu ZH, Wang HX (2014) A Novel Speech Content Authentication Algorithm Based on Bessel-Fourier Moments. Digital Signal Processing 24:197–208

    Article  MathSciNet  Google Scholar 

  12. Massachusetts Institute of Technology (MIT) Audio Database. Available: http://sound.media.mit.edu

  13. Park CM, Thapa D, Wang GN (2007) Speech Authentication System Using Digital Watermarking and Pattern Recovery. Pattern Recogn Lett 28:931–938

    Article  Google Scholar 

  14. Qian Q, Wang HX, Hu Y (2016) A Dual Fragile Watermarking Scheme for Speech Authentication. Multimed Tools Appl 75:13431–13450

    Article  Google Scholar 

  15. Ronaldo R, Pedro GF, Mylène CQF (2016) Detecting Tampering in Audio-visual Content Using QIM Watermarking. Inf Sci 328:127–143

    Article  Google Scholar 

  16. Saeed S, Mohammad AA, Aliazam A (2015) A Watermarking Method for Digital Speech Self-recovery. IEEE Trans Audio Speech Lang Process 23:1917–1925

    Google Scholar 

  17. Su ZP, Chang LJ, Zhang GF (2017) Window Switching Strategy Based Semi-fragile Watermarking for MP3 Tamper Detection. Multimed Tools Appl 76:9363–9386

    Article  Google Scholar 

  18. Tang X, Ma ZF, Niu XX (2015) Compressive Sensing-based Audio Semi-fragile Zero-watermarking Algorithm. Chin J Electron 24:492–497

    Article  Google Scholar 

  19. Wang HX, Fan MQ (2010) Centroid-based Semi-fragile Audio Watermarking in Hybrid Domain. SCIENCE CHINA Inf Sci 53:619–633

    Article  Google Scholar 

  20. Xu DW, Wang RD, Wang JC (2011) A Novel Watermarking Scheme for H.264/AVC Video Authentication. Signal Process Image Commun 26:267–279

    Article  Google Scholar 

  21. Yasunari Y, Taro A, Yohei K (2011) An Authentication Method for Digital Audio Using a Discrete Wavelet Transform. J Inf Secur 2:59–68

    Google Scholar 

  22. Yong X, Iynkaran N, Peng DZ (2018) Spread Spectrum Audio Watermarking Using Multiple Orthogonal PN Sequences and Variable Embedding Strengths and Polarities. IEEE/ACM Transactions on Audio, Speech, and Language Processing 26:529–539

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to MingQuan Fan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fan, M. A source coding scheme for authenticating audio signal with capability of self-recovery and anti-synchronization counterfeiting attack. Multimed Tools Appl 79, 1037–1055 (2020). https://doi.org/10.1007/s11042-019-08095-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08095-x

Keywords

Navigation