Skip to main content
Log in

REPAIR: fragile watermarking for encrypted speech authentication with recovery ability

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Confidentiality and integrity are fundamental requirements when transmitting and storing data. In order to guarantee the confidentiality and integrity of speech signal, we present a novel wateRmarking scheme for Encrypted sPeech AuthenticatIon with Recovery (REPAIR) scheme. In REPAIR, an encryption algorithm is first designed based on a hyper-chaotic method to improve the confidentiality of the original speech by encryption. Subsequently, a watermark generation and embedding algorithm is proposed to generate and embed the check bits and compression bits. Afterwards, a content authentication and tampering recovery algorithm is introduced to locate and recover the tampered speech frames. Meanwhile, a speech decryption algorithm is also presented to decrypt the encrypted speech. Analysis and experimental results demonstrate that REPAIR can detect and locate synchronization attacks and de-synchronization attacks without using the auxiliary synchronous code. Additionally, REPAIR can also recover the tampered content with high quality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Jiang, D., Wang, Y., Lv, Z., et al. (2019). Big data analysis-based network behavior insight of cellular networks for industry 4.0 applications. IEEE Transactions on Industrial Informatics,. https://doi.org/10.1109/TII.2019.2930226.

    Article  Google Scholar 

  2. Kamara, S., & Lauter, K. (2010). Cryptographic cloud storage. In Sion, R. et al. (eds) Financial Cryptography and Data Security. FC 2010, pp. 136–149.

  3. Wang, F., Jiang, D., Wen, H., et al. (2019). Adaboost-based security level classification of mobile intelligent terminals. The Journal of Supercomputing,. https://doi.org/10.1007/s11227-019-02954-y.

    Article  Google Scholar 

  4. Li, P., & Lo, K. (2018). A content-adaptive joint image compression and encryption scheme. IEEE Transactions on Multimedia, 20(8), 1960–1972.

    Article  Google Scholar 

  5. Zamani, M., & Manaf, A. B. A. (2015). Genetic algorithm for fragile audio watermarking. Telecommunication Systems, 59(3), 291–304.

    Article  Google Scholar 

  6. Saadi, S., Merrad, A., & Benziane, A. (2019). Novel secured scheme for blind audio/speech norm-space watermarking by Arnold algorithm. Signal Processing, 154, 74–86.

    Article  Google Scholar 

  7. Xiong, L., Xu, Z., & Shi, Y. Q. (2018). An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimensional Systems and Signal Processing, 29(3), 1191–1202.

    Article  Google Scholar 

  8. Qian, Q., Wang, H., Sun, X., et al. (2018). Speech authentication and content recovery scheme for security communication and storage. Telecommun Systems, 67(4), 635–649.

    Article  Google Scholar 

  9. Qian, Q., Wang, H. X., Hu, Y., Zhou, L. N., & Li, J. F. (2016). A dual fragile watermarking scheme for speech authentication. Multimedia Tools and Applications, 75(21), 13431–13450.

    Article  Google Scholar 

  10. Farsana, F. J., & Gopakumar, K. (2018). Private key encryption of speech signal based on three dimensional chaotic map. In 2017 International Conference on Communication and Signal Processing (ICCSP), pp. 2197–2201. IEEE Press, Chennai, 2018.

  11. Wang, H., Hempel, M., Peng, D., Wang, W., Sharif, H., & Chen, H. H. (2010). Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Transactions on Multimedia, 12(3), 215–223.

    Article  Google Scholar 

  12. Li, G., Pu, Y., Yang, B., & Zhao, J. (2018). Synchronization between different hyper chaotic systems and dimensions of cellular neural network and its design in audio encryption. Cluster Computing,. https://doi.org/10.1007/s10586-018-1700-7.

    Article  Google Scholar 

  13. Lima, J. B., & da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75(15), 8403–8418.

    Article  Google Scholar 

  14. Lin, Q. H., Yin, F. L., Mei, T. M., & Liang, H. L. (2006). A blind source separation based method for speech encryption. IEEE Transactions on Circuits and Systems I: Regular Papers, 53(6), 1320–1328.

    Article  Google Scholar 

  15. Liu, Z., & Wang, H. (2014). A novel speech content authentication algorithm based on Bessel–Fourier moments. Digital Signal Processing, 24, 197–208.

    Article  Google Scholar 

  16. Chen, O. T., & Liu, C. H. (2007). Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Transactions on Audio, Speech, and Language Processing., 15(5), 1605–1616.

    Article  Google Scholar 

  17. Yan, B., & Guo, Y. J. (2013). Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization. Multimedia Tools and Applications, 67(2), 383–405.

    Article  Google Scholar 

  18. Xia, Z., Wang, X., et al. (2016). A privacy-preserving and copydeterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–2608.

    Article  Google Scholar 

  19. Fu, Z., Wu, X., Guan, C., et al. (2016). Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 11(12), 2706–2716.

    Article  Google Scholar 

  20. Wu, T. Y., Chen, C. M., Wang, K. H., Meng, C. C., & Wang, E. K. (2019). A provably secure certificateless public key encryption with keyword searchA provably secure certificateless public key encryption with keyword search. Journal of the Chinese Institute of Engineers, 42(1), 20–28.

    Article  Google Scholar 

  21. Zhang, W., Ma, K., & Yu, N. (2014). Reversibility improved data hiding in encrypted images. Signal Processing, 94, 118–127.

    Article  Google Scholar 

  22. Qian, Z., Zhang, X., & Wang, S. (2014). Reversible data hiding in encrypted JPEG bitstream. IEEE Transactions on Multimedia, 16(5), 1486–1491.

    Article  Google Scholar 

  23. Karim, M. S. A., & Wong, K. (2014). Universal data embedding in encrypted domain. Signal Processing, 94, 174–182.

    Article  Google Scholar 

  24. Zhang, X., Wang, S., Qian, Z., & Feng, G. (2011). Reference sharing mechanism for watermark self-embedding. IEEE Transactions on Image Processing, 20(2), 485–495.

    Article  Google Scholar 

  25. Shen, C., Yu, S., Lu, J., & Chen, G. (2014). A systematic methodology for constructing hyperchaotic systems with multiple positive Lyapunov exponents and circuit implementation. IEEE Transactions on Circuits and Systems I: Regular Papers, 61(3), 854–864.

    Article  Google Scholar 

  26. Rodriguez, A., & Laio, A. (2014). Clustering by fast search and find of density peaks. Science, 344(6191), 1492–1496.

    Article  Google Scholar 

  27. Kahan, W. (1985). IEEE standard 754 for binary floating-point arithmetic. ANSI/IEEE Std, 754–1985, 94720–1776.

    Google Scholar 

  28. Cowlishaw, M. F. (2003). Decimal floating-point: algorism for computers. In Proceedings of 16th IEEE Symposium on Computer Arithmetic. IEEE Press, pp. 104–111.

  29. ITU-T Test Signals for Telecommunication Systems (2015). Test Vectors Associated to Rec. ITU-T P.501. http://www.itu.int/net/itu-t/sigdb/genaudio/AudioForm-g.aspx?val=10000501. (2015).

  30. Chen, F., He, H., & Wang, H. (2008). A fragile watermarking scheme for audio detection and recovery. In Proceeding of international congress on image and signal processing, IEEE Press, pp. 135–138.

  31. Wang, J., & He, J. (2017). A speech content authentication algorithm based on a novel watermarking method. Multimedia Tools and Applications, 76(13), 14799–14814.

    Article  Google Scholar 

  32. Liu, Z., Zhang, F., Wang, J., Wang, H., & Huang, J. (2016). Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Processing, 123, 157–166.

    Article  Google Scholar 

  33. Thiede, T., Treurniet, W. C., Bitto, R., Schmidmer, C., Sporer, T., Beerends, J. G., et al. (2000). PEAQ-The ITU standard for objective measurement of perceived audio quality. Journal of the Audio Engineering Society, 48(1/2), 3–29.

    Google Scholar 

  34. Ballesteros, M., & CamiloLemus, L. (2018). Authenticity verification of audio signals based on fragile watermarking for audio forensics. Expert Systems with Applications, 91, 211–222.

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (NSFC) under the Grant No. 61902085 and the Guizhou Provincial Science and Technology Plan ([2020]1Y267, [2017]1051).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Qing Qian or Yunhe Cui.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qian, Q., Cui, Y., Wang, H. et al. REPAIR: fragile watermarking for encrypted speech authentication with recovery ability. Telecommun Syst 75, 273–289 (2020). https://doi.org/10.1007/s11235-020-00684-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-020-00684-8

Keywords

Navigation