ABSTRACT
Data integrity and source origin authentication are essential topics for real-time multimedia systems. But traditional method, such as MAC, is not very applicable to overcome the distortion introduced in real-time multimedia communication. In this paper a new integrity mechanics deploying speech watermarking is presented. The advocated approach adopts public key encryption to efficiently generate non-repudiate speech. In the last part of the article, a speech watermarking algorithm incorporating with GSM 610 full-rate coder is proposed.
- J. Howard. An Analysis of Security Incidents on the Internet. PhD thesis, Carnegie Mellon University, 1997.]] Google ScholarDigital Library
- http://www.tmcnet.com/articles/itmag/0199/0199roundt.htm]]Google Scholar
- M. Baugher et al. The Secure Real Time Transport Protocol, IETF Draft, 2002.]]Google Scholar
- Z. Li, R. Xu, Energy Impact of Secure Computation on a Handheld Device, IEEE International Workshop on Workload Characterization, pp.109--117, 2002.]]Google Scholar
- C. Wu and C. Kuo. Speech Content Integrity Verification Integrated with ITU g.723.1 Speech Coding. IEEE International Conference on Information Technology: Coding and Computing, pp. 680--684, 2001.]] Google ScholarDigital Library
- J. Haitsma, M. Veen, T. Kalker and F. Bruekers, Audio Watermarking for Monitoring and Copy Protection, Proceedings of the 2000 ACM workshops on Multimedia, pp.119--122, 2000.]] Google ScholarDigital Library
- D. Gruhl, W. Bender, and A. Lu, Echo-hiding, Information Hiding: 1st International Workshop, pp.295--315, 1996.]] Google ScholarDigital Library
- D. Lou and J. Liu. Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics, pp.31--39, 2000.]] Google ScholarDigital Library
- C. Rey and J. Dugelay. Blind detection of malicious alterations on still images using robust watermarks. IEE Seminar on Secure Images and Image Authentication, pp.7/1--7/6, April 2000.]]Google ScholarCross Ref
- M. Schneider and S. F. Chang. A robust content based digital signature for image authentication. Proceedings of IEEE International Conference on Image Processing (ICIP'96), pp. 227--230, 1996.]]Google ScholarCross Ref
- M. Wu and B. Liu. Watermarking for image authentication. Proceedings of International Conference on Image Processing, pp.437--441, October 1998.]]Google Scholar
- J. Dittmann, A. Steinmetz, and R. Steinmetz. Content based digital signature for motion pictures authentication and content-fragile watermarking. IEEE International Conference on Multimedia Computing and Systems, pp. 209--213, June 1999.]] Google ScholarDigital Library
- GSM Vocoder Specification, ITU, 1996.]]Google Scholar
- Speakfreely, Brian C. Wiles & John Walker, http://www.speakfreely.org]]Google Scholar
- http://www.openssl.org]]Google Scholar
- J. Campbell, Speaker Recognition, Proceedings of IEEE, Vol. 85, No.9, pp.1437--1462, 1997.]]Google Scholar
Index Terms
- Audio watermarking algorithm for real-time speech integrity and authentication
Recommendations
Digital speech watermarking to enhance the security using speech as a biometric for person authentication
This work presents the modules for enhancing the security of speaker authentication by embedding the watermark in a speech signal. Speaker is authenticated by speech as well as the extracted watermark from the watermarked speech. Firstly, the speech ...
Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition
In this paper, a Multi-Factor Authentication (MFA) method is developed by a combination of Personal Identification Number (PIN), One Time Password (OTP), and speaker biometric through the speech watermarks. For this reason, a multipurpose digital speech ...
Hybrid Speech Watermarking Based on Formant Enhancement and Cochlear Delay
IIH-MSP '14: Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingIllegal use of digital technologies has brought a series of problems in speech protection and authorization. Digital watermarking can effectively solve these problems by embedding watermarks into the host signals. This paper proposes a hybrid ...
Comments