Tamper Detection in Speech Based Access Control Systems Using Watermarking

B. Garlapati, S. Chalamala, K. Kakkirala
{"title":"Tamper Detection in Speech Based Access Control Systems Using Watermarking","authors":"B. Garlapati, S. Chalamala, K. Kakkirala","doi":"10.1109/AIMS.2015.59","DOIUrl":null,"url":null,"abstract":"General voice based access control systems are based on voice biometrics. This process enables an unauthorized access by recording the voice of the authorized person. So there is a requirement to prevent unauthorized access through recording speech. Other than voice biometrics, here we have two challenges. (i) To extract the authentication information. (ii) To find the unauthorized source. The speech goes through DA-AD-DA conversion, while it is recorded and used for access control. The watermarking method which will use for this purpose must be robust to DA-AD conversion attack, which is usually involved in recordings. In this work, we propose a method based on casting Log Co-ordinate Mapping (LCM), in which embedding two watermark segments in two different frequency regions, one for authentication information purpose and other for finding unauthorized source. The LCM method has approving performance against DA-AD conversion attacks [1]. The modifications made for this does not impact the perceptible auditory quality and the embedding capacity improved by selecting the appropriate frequency regions in the log scale. Our results show that our method robustly extracts the source identification information while detecting the malicious source if the audio is being recorded and played back by unauthorized source.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AIMS.2015.59","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

General voice based access control systems are based on voice biometrics. This process enables an unauthorized access by recording the voice of the authorized person. So there is a requirement to prevent unauthorized access through recording speech. Other than voice biometrics, here we have two challenges. (i) To extract the authentication information. (ii) To find the unauthorized source. The speech goes through DA-AD-DA conversion, while it is recorded and used for access control. The watermarking method which will use for this purpose must be robust to DA-AD conversion attack, which is usually involved in recordings. In this work, we propose a method based on casting Log Co-ordinate Mapping (LCM), in which embedding two watermark segments in two different frequency regions, one for authentication information purpose and other for finding unauthorized source. The LCM method has approving performance against DA-AD conversion attacks [1]. The modifications made for this does not impact the perceptible auditory quality and the embedding capacity improved by selecting the appropriate frequency regions in the log scale. Our results show that our method robustly extracts the source identification information while detecting the malicious source if the audio is being recorded and played back by unauthorized source.
基于水印的语音访问控制系统中的篡改检测
一般的基于语音的访问控制系统都是基于语音生物识别技术。此过程通过记录授权人员的声音来允许未经授权的访问。因此需要防止通过录音进行未经授权的访问。除了声音生物识别,我们还有两个挑战。(i)提取认证信息。(ii)查找未经授权的来源。语音经过DA-AD-DA转换,录音后用于访问控制。用于此目的的水印方法必须对录音中通常涉及的DA-AD转换攻击具有鲁棒性。在这项工作中,我们提出了一种基于投影对数坐标映射(LCM)的方法,该方法在两个不同的频率区域嵌入两个水印片段,一个用于身份验证信息,另一个用于查找未经授权的源。LCM方法对DA-AD转换攻击具有良好的性能[1]。为此所做的修改不影响可感知的听觉质量,并且通过在对数尺度中选择适当的频率区域提高了嵌入容量。结果表明,该方法在检测未经授权录制和播放音频的恶意源的同时,能够鲁棒地提取源识别信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信