skip to main content
10.1145/1022431.1022470acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Audio watermarking algorithm for real-time speech integrity and authentication

Authors Info & Claims
Published:20 September 2004Publication History

ABSTRACT

Data integrity and source origin authentication are essential topics for real-time multimedia systems. But traditional method, such as MAC, is not very applicable to overcome the distortion introduced in real-time multimedia communication. In this paper a new integrity mechanics deploying speech watermarking is presented. The advocated approach adopts public key encryption to efficiently generate non-repudiate speech. In the last part of the article, a speech watermarking algorithm incorporating with GSM 610 full-rate coder is proposed.

References

  1. J. Howard. An Analysis of Security Incidents on the Internet. PhD thesis, Carnegie Mellon University, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. http://www.tmcnet.com/articles/itmag/0199/0199roundt.htm]]Google ScholarGoogle Scholar
  3. M. Baugher et al. The Secure Real Time Transport Protocol, IETF Draft, 2002.]]Google ScholarGoogle Scholar
  4. Z. Li, R. Xu, Energy Impact of Secure Computation on a Handheld Device, IEEE International Workshop on Workload Characterization, pp.109--117, 2002.]]Google ScholarGoogle Scholar
  5. C. Wu and C. Kuo. Speech Content Integrity Verification Integrated with ITU g.723.1 Speech Coding. IEEE International Conference on Information Technology: Coding and Computing, pp. 680--684, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Haitsma, M. Veen, T. Kalker and F. Bruekers, Audio Watermarking for Monitoring and Copy Protection, Proceedings of the 2000 ACM workshops on Multimedia, pp.119--122, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Gruhl, W. Bender, and A. Lu, Echo-hiding, Information Hiding: 1st International Workshop, pp.295--315, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Lou and J. Liu. Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics, pp.31--39, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Rey and J. Dugelay. Blind detection of malicious alterations on still images using robust watermarks. IEE Seminar on Secure Images and Image Authentication, pp.7/1--7/6, April 2000.]]Google ScholarGoogle ScholarCross RefCross Ref
  10. M. Schneider and S. F. Chang. A robust content based digital signature for image authentication. Proceedings of IEEE International Conference on Image Processing (ICIP'96), pp. 227--230, 1996.]]Google ScholarGoogle ScholarCross RefCross Ref
  11. M. Wu and B. Liu. Watermarking for image authentication. Proceedings of International Conference on Image Processing, pp.437--441, October 1998.]]Google ScholarGoogle Scholar
  12. J. Dittmann, A. Steinmetz, and R. Steinmetz. Content based digital signature for motion pictures authentication and content-fragile watermarking. IEEE International Conference on Multimedia Computing and Systems, pp. 209--213, June 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. GSM Vocoder Specification, ITU, 1996.]]Google ScholarGoogle Scholar
  14. Speakfreely, Brian C. Wiles & John Walker, http://www.speakfreely.org]]Google ScholarGoogle Scholar
  15. http://www.openssl.org]]Google ScholarGoogle Scholar
  16. J. Campbell, Speaker Recognition, Proceedings of IEEE, Vol. 85, No.9, pp.1437--1462, 1997.]]Google ScholarGoogle Scholar

Index Terms

  1. Audio watermarking algorithm for real-time speech integrity and authentication

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MM&Sec '04: Proceedings of the 2004 workshop on Multimedia and security
        September 2004
        236 pages
        ISBN:1581138547
        DOI:10.1145/1022431

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 September 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate128of318submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader