Abstract
Confidentiality and integrity are fundamental requirements when transmitting and storing data. In order to guarantee the confidentiality and integrity of speech signal, we present a novel wateRmarking scheme for Encrypted sPeech AuthenticatIon with Recovery (REPAIR) scheme. In REPAIR, an encryption algorithm is first designed based on a hyper-chaotic method to improve the confidentiality of the original speech by encryption. Subsequently, a watermark generation and embedding algorithm is proposed to generate and embed the check bits and compression bits. Afterwards, a content authentication and tampering recovery algorithm is introduced to locate and recover the tampered speech frames. Meanwhile, a speech decryption algorithm is also presented to decrypt the encrypted speech. Analysis and experimental results demonstrate that REPAIR can detect and locate synchronization attacks and de-synchronization attacks without using the auxiliary synchronous code. Additionally, REPAIR can also recover the tampered content with high quality.
Similar content being viewed by others
References
Jiang, D., Wang, Y., Lv, Z., et al. (2019). Big data analysis-based network behavior insight of cellular networks for industry 4.0 applications. IEEE Transactions on Industrial Informatics,. https://doi.org/10.1109/TII.2019.2930226.
Kamara, S., & Lauter, K. (2010). Cryptographic cloud storage. In Sion, R. et al. (eds) Financial Cryptography and Data Security. FC 2010, pp. 136–149.
Wang, F., Jiang, D., Wen, H., et al. (2019). Adaboost-based security level classification of mobile intelligent terminals. The Journal of Supercomputing,. https://doi.org/10.1007/s11227-019-02954-y.
Li, P., & Lo, K. (2018). A content-adaptive joint image compression and encryption scheme. IEEE Transactions on Multimedia, 20(8), 1960–1972.
Zamani, M., & Manaf, A. B. A. (2015). Genetic algorithm for fragile audio watermarking. Telecommunication Systems, 59(3), 291–304.
Saadi, S., Merrad, A., & Benziane, A. (2019). Novel secured scheme for blind audio/speech norm-space watermarking by Arnold algorithm. Signal Processing, 154, 74–86.
Xiong, L., Xu, Z., & Shi, Y. Q. (2018). An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimensional Systems and Signal Processing, 29(3), 1191–1202.
Qian, Q., Wang, H., Sun, X., et al. (2018). Speech authentication and content recovery scheme for security communication and storage. Telecommun Systems, 67(4), 635–649.
Qian, Q., Wang, H. X., Hu, Y., Zhou, L. N., & Li, J. F. (2016). A dual fragile watermarking scheme for speech authentication. Multimedia Tools and Applications, 75(21), 13431–13450.
Farsana, F. J., & Gopakumar, K. (2018). Private key encryption of speech signal based on three dimensional chaotic map. In 2017 International Conference on Communication and Signal Processing (ICCSP), pp. 2197–2201. IEEE Press, Chennai, 2018.
Wang, H., Hempel, M., Peng, D., Wang, W., Sharif, H., & Chen, H. H. (2010). Index-based selective audio encryption for wireless multimedia sensor networks. IEEE Transactions on Multimedia, 12(3), 215–223.
Li, G., Pu, Y., Yang, B., & Zhao, J. (2018). Synchronization between different hyper chaotic systems and dimensions of cellular neural network and its design in audio encryption. Cluster Computing,. https://doi.org/10.1007/s10586-018-1700-7.
Lima, J. B., & da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75(15), 8403–8418.
Lin, Q. H., Yin, F. L., Mei, T. M., & Liang, H. L. (2006). A blind source separation based method for speech encryption. IEEE Transactions on Circuits and Systems I: Regular Papers, 53(6), 1320–1328.
Liu, Z., & Wang, H. (2014). A novel speech content authentication algorithm based on Bessel–Fourier moments. Digital Signal Processing, 24, 197–208.
Chen, O. T., & Liu, C. H. (2007). Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Transactions on Audio, Speech, and Language Processing., 15(5), 1605–1616.
Yan, B., & Guo, Y. J. (2013). Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization. Multimedia Tools and Applications, 67(2), 383–405.
Xia, Z., Wang, X., et al. (2016). A privacy-preserving and copydeterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–2608.
Fu, Z., Wu, X., Guan, C., et al. (2016). Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 11(12), 2706–2716.
Wu, T. Y., Chen, C. M., Wang, K. H., Meng, C. C., & Wang, E. K. (2019). A provably secure certificateless public key encryption with keyword searchA provably secure certificateless public key encryption with keyword search. Journal of the Chinese Institute of Engineers, 42(1), 20–28.
Zhang, W., Ma, K., & Yu, N. (2014). Reversibility improved data hiding in encrypted images. Signal Processing, 94, 118–127.
Qian, Z., Zhang, X., & Wang, S. (2014). Reversible data hiding in encrypted JPEG bitstream. IEEE Transactions on Multimedia, 16(5), 1486–1491.
Karim, M. S. A., & Wong, K. (2014). Universal data embedding in encrypted domain. Signal Processing, 94, 174–182.
Zhang, X., Wang, S., Qian, Z., & Feng, G. (2011). Reference sharing mechanism for watermark self-embedding. IEEE Transactions on Image Processing, 20(2), 485–495.
Shen, C., Yu, S., Lu, J., & Chen, G. (2014). A systematic methodology for constructing hyperchaotic systems with multiple positive Lyapunov exponents and circuit implementation. IEEE Transactions on Circuits and Systems I: Regular Papers, 61(3), 854–864.
Rodriguez, A., & Laio, A. (2014). Clustering by fast search and find of density peaks. Science, 344(6191), 1492–1496.
Kahan, W. (1985). IEEE standard 754 for binary floating-point arithmetic. ANSI/IEEE Std, 754–1985, 94720–1776.
Cowlishaw, M. F. (2003). Decimal floating-point: algorism for computers. In Proceedings of 16th IEEE Symposium on Computer Arithmetic. IEEE Press, pp. 104–111.
ITU-T Test Signals for Telecommunication Systems (2015). Test Vectors Associated to Rec. ITU-T P.501. http://www.itu.int/net/itu-t/sigdb/genaudio/AudioForm-g.aspx?val=10000501. (2015).
Chen, F., He, H., & Wang, H. (2008). A fragile watermarking scheme for audio detection and recovery. In Proceeding of international congress on image and signal processing, IEEE Press, pp. 135–138.
Wang, J., & He, J. (2017). A speech content authentication algorithm based on a novel watermarking method. Multimedia Tools and Applications, 76(13), 14799–14814.
Liu, Z., Zhang, F., Wang, J., Wang, H., & Huang, J. (2016). Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Processing, 123, 157–166.
Thiede, T., Treurniet, W. C., Bitto, R., Schmidmer, C., Sporer, T., Beerends, J. G., et al. (2000). PEAQ-The ITU standard for objective measurement of perceived audio quality. Journal of the Audio Engineering Society, 48(1/2), 3–29.
Ballesteros, M., & CamiloLemus, L. (2018). Authenticity verification of audio signals based on fragile watermarking for audio forensics. Expert Systems with Applications, 91, 211–222.
Acknowledgements
This work is supported by the National Natural Science Foundation of China (NSFC) under the Grant No. 61902085 and the Guizhou Provincial Science and Technology Plan ([2020]1Y267, [2017]1051).
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
On behalf of all authors, the corresponding author states that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Qian, Q., Cui, Y., Wang, H. et al. REPAIR: fragile watermarking for encrypted speech authentication with recovery ability. Telecommun Syst 75, 273–289 (2020). https://doi.org/10.1007/s11235-020-00684-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-020-00684-8