Skip to main content
Log in

Speech authentication and content recovery scheme for security communication and storage

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

With the rapid development of Internet, it brings a lot of conveniences. However, the data transmission and storage are faced with some security issues that seem to be obstacles to overcome, such as privacy protection and integrity authentication. In this paper, an efficient speech watermarking algorithm is proposed for content authentication and recovery in encrypted domain. The proposed system consists of speech encryption, watermark generation and embedding, content authentication and recovery. In the encryption process, chaotic and block cipher are combined to eliminate the positional correlation and conceal the statistical feature. In the watermark embedding process, approximation coefficients of integer wavelet transform are used to generate watermark and the detail coefficients are reserved to carry watermark. Theoretical analysis and simulation results show that the proposed scheme has high security and excellent inaudibility. Compared with previous works, the proposed scheme has strong ability to detect de-synchronization attacks and locate the corresponding tampered area without using synchronization codes. Meanwhile, the selective encryption will not influence the selective watermarking operation. Similarly, the operation of watermarking will not affect the decryption of the encrypted speech. Additionally, the tampered samples can be recovered without any auxiliary watermark information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, 16(1), 69–73.

    Article  Google Scholar 

  2. Wang, H. X., Zhou, L. N., Zhang, W., & Liu, S. (2013). Watermarking-based perceptual hashing search over encrypted speech. In Y. Q. Shi, H.-J. Kim, & F. Pérez-González (Eds.), IWDW. LNCS (vol. 8389, pp. 423–434). New Zealand: Springer.

  3. Juels, A., & Kaliski Jr, B.S. (2007). Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security (pp. 584–597), ACM.

  4. Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 90–107), Springer.

  5. Erway, C., Küpçü, A., Papamanthou, C., & Tamassia, R. (2009). Dynamic provable data possession. In Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 213–222), ACM.

  6. Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. (2009). Enabling public verifiability and data dynamics for storage security in cloud computing. In European Symposium on Research in Computer Security (pp. 355–370), Springer.

  7. Benabbas, S., Rosario, G., & Yevgeniy, V. (2011). Verifiable delegation of computation over large datasets. In Annual Cryptology Conference 2011 (pp. 111–131), Springer.

  8. Chen, X., Li, J., Huang, X., Ma, J., & Lou, W. (2015). New publicly verifiable databases with efficient updates. IEEE Transactions on Dependable and Secure Computing, 12(5), 546–556.

    Article  Google Scholar 

  9. Gupta, S., Cho, S., & Kuo, C. C. J. (2012). Current developments and future trends in audio authentication. IEEE MultiMedia, 19(1), 50–59.

    Article  Google Scholar 

  10. Ribaric, S., Ariyaeeinia, A., & Pavesic, N. (2016). De-identification for privacy protection in multimedia content: A survey. Signal Processing: Image Communication, 47, 131–151.

    Google Scholar 

  11. Hua, G., Huang, J. W., Shi, Y. Q., Goh, J., & Thing, V. L. (2016). Twenty years of digital audio watermarkinga comprehensive review. Signal Processing, 128, 222–242.

    Article  Google Scholar 

  12. Chen, O. T. C., & Liu, C. H. (2007). Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Transactions on Audio, Speech, and Language Processing, 15(5), 1605–1616.

    Article  Google Scholar 

  13. Fan, M. Q., Liu, P. P., Wang, H. X., & Li, H. J. (2013). A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform. International Journal of Computer Mathematics, 90(12), 2588–2602.

    Article  Google Scholar 

  14. Gao, T. G., & Chen, Z. Q. (2008). A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(4), 394–400.

    Article  Google Scholar 

  15. Li, Gl, Wang, Yl, & Ma, H. B. (2016). Audio packet encryption of flow control base on stop-and-wait protocol. Journal of Information Hiding and Multimedia, 7(1), 127–134.

    Google Scholar 

  16. Xia, Z., Wang, X., et al. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–2608.

    Article  Google Scholar 

  17. Fu, Z., Wu, X., Guan, C., et al. (2016). Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 11(12), 2706–2716.

    Article  Google Scholar 

  18. Sun, W. H., Lou, W. J., Hou, Y. T., & Li, H. (2014). Privacy-preserving keyword search over encrypted data in cloud computing. In S. Jajodia, K. Kant, P. Samarati, A. Singhal, V. Swarup, & C. Wang (Eds.), Secure cloud computing (pp. 189–212). New York: Springer.

  19. Xia, Z. H., Wang, X. H., Sun, X. M., & Wang, Q. (2016). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.

    Article  Google Scholar 

  20. Qian, Z. X., Zhang, X. P., & Wang, S. Z. (2014). Reversible data hiding in encrypted jpeg bitstream. IEEE Transactions on Multimedia, 16(5), 1486–1491.

    Article  Google Scholar 

  21. Zhang, X. P., Wang, J., Wang, Z. C., & Cheng, H. (2016). Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Transactions on Circuits and Systems for Video Technology, 26(9), 1622–1631.

    Article  Google Scholar 

  22. Lian, S. G., Liu, Z. X., Ren, Z., & Wang, H. L. (2007). Commutative encryption and watermarking in video compression. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774–778.

    Article  Google Scholar 

  23. Wu, X. T., & Sun, W. (2014). High-capacity reversible data hiding in encrypted images by prediction error. Signal Processing, 104, 387–400.

    Article  Google Scholar 

  24. Yao, Y. Z., Zhang, W. M., & Yu, N. H. (2016). Inter-frame distortion drift analysis for reversible data hiding in encrypted h.264/avc video bitstreams. Signal Processing, 128, 531–545.

    Article  Google Scholar 

  25. Calderbank, A. R., Daubechies, I., Sweldens, W., & Yeo, B. L. (1998). Wavelet transforms that map integers to integers. Applied and Computational Harmonic Analysis, 5(3), 332–369.

    Article  Google Scholar 

  26. Wang, X., Li, X. L., Yang, B., & Guo, Z. M. (2010). Efficient generalized integer transform for reversible watermarking. IEEE Signal Processing Letters, 17(6), 567–570.

    Article  Google Scholar 

  27. Lei, B. Y., Soon, Y., & Li, Z. (2011). Blind and robust audio watermarking scheme based on svd-dct. Signal Processing, 91(8), 1973–1984.

    Article  Google Scholar 

  28. Cohen, I., & Berdugo, B. (2002). Noise estimation by minima controlled recursive averaging for robust speech enhancement. IEEE Signal Processing Letters, 9(1), 12–15.

    Article  Google Scholar 

  29. Zhao, M., Shyang, P. J., & Tsung, C. S. (2015). Optimal snr of audio watermarking by wavelet and compact pso methods. Journal of Information Hiding and Multimedia Signal Processing, 6(5), 833–846.

    Google Scholar 

  30. Chen, C. M., Xu, Ll, Wu, T. Y., & Li, C. R. (2016). On the security of a chaotic maps-based three-party authenticated key agreement protocol. Journal of Network Intelligence, 1(2), 61–66.

    Google Scholar 

  31. Daemen, J., & Rijmen, V. (2001). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer.

    Google Scholar 

  32. EBU (2001). Sqam-sound quality assessment material. Website, http://sound.media.mit.edu/resources/mpeg4/audio/.

  33. Chen, G., & Hu, Q.P. (2010). An audio scrambling method based on combination strategy. In 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT) (Vol. 5, pp. 62–66), IEEE.

  34. Thiede, T., Treurniet, W. C., Bitto, R., Schmidmer, C., Sporer, T., Beerends, J. G., et al. (2000). Peaq-the itu standard for objective measurement of perceived audio quality. Journal of the Audio Engineering Society, 48(1/2), 3–29.

    Google Scholar 

  35. Chen, F., He, H.J., & Wang, H.X. (2008). A fragile watermarking scheme for audio detection and recovery. In Image and Signal Processing, 2008. CISP’08. Congress on (Vol. 5, pp. 135–138), IEEE.

  36. Luo, X. R., & Xiang, S. J. (2014). Fragile audio watermarking with perfect restoration capacity based on an adapted integer transform. Wuhan University Journal of Natural Sciences, 19(6), 497–504.

  37. Liu, Z. H., Zhang, F., Wang, J., Wang, H. X., & Huang, J. W. (2016). Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Processing, 123, 157–166.

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (NSFC) under the Grant No. U1536110. The Priority Academic Program Development of Jiangsu Higer Education Institutions, and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology. The Education Program for Innovation Entrepreneurship for Southwest Jiaotong University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongxia Wang.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qian, Q., Wang, H., Sun, X. et al. Speech authentication and content recovery scheme for security communication and storage. Telecommun Syst 67, 635–649 (2018). https://doi.org/10.1007/s11235-017-0360-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-017-0360-x

Keywords

Navigation