{"title":"一种基于修改最小有效数字的语音认证脆弱水印算法","authors":"Qing Qian, Yunhe Cui","doi":"10.1109/ICCCS49078.2020.9118546","DOIUrl":null,"url":null,"abstract":"Speech content is often faced with malicious forgery and tampering in transit. Therefore, we introduce a novel fragile watermarking algorithm by modifying the least significant digits for speech content authentication and tampering recovery. In this letter, the proposed authentication scheme consists of two processes: the first one is watermark generation and embedding, the second one is content authentication and recovery. In the former process, the compressed speech signal, frame number and check information are generated based on speech content to form a watermark. Subsequently, the generated watermark is embedded into the least significant digits of speech sampling points using the proposed watermarking algorithm. In the latter process, the embedded watermark is utilized to locate the tampered area and recover that tampered content synchronously. Experimental results show that the proposed watermarking algorithm is fragile to common signal processing. Additionally, it has favorable inaudibility, accurate location ability and high recovery quality.","PeriodicalId":105556,"journal":{"name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits\",\"authors\":\"Qing Qian, Yunhe Cui\",\"doi\":\"10.1109/ICCCS49078.2020.9118546\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Speech content is often faced with malicious forgery and tampering in transit. Therefore, we introduce a novel fragile watermarking algorithm by modifying the least significant digits for speech content authentication and tampering recovery. In this letter, the proposed authentication scheme consists of two processes: the first one is watermark generation and embedding, the second one is content authentication and recovery. In the former process, the compressed speech signal, frame number and check information are generated based on speech content to form a watermark. Subsequently, the generated watermark is embedded into the least significant digits of speech sampling points using the proposed watermarking algorithm. In the latter process, the embedded watermark is utilized to locate the tampered area and recover that tampered content synchronously. Experimental results show that the proposed watermarking algorithm is fragile to common signal processing. Additionally, it has favorable inaudibility, accurate location ability and high recovery quality.\",\"PeriodicalId\":105556,\"journal\":{\"name\":\"2020 5th International Conference on Computer and Communication Systems (ICCCS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 5th International Conference on Computer and Communication Systems (ICCCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCS49078.2020.9118546\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCS49078.2020.9118546","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits
Speech content is often faced with malicious forgery and tampering in transit. Therefore, we introduce a novel fragile watermarking algorithm by modifying the least significant digits for speech content authentication and tampering recovery. In this letter, the proposed authentication scheme consists of two processes: the first one is watermark generation and embedding, the second one is content authentication and recovery. In the former process, the compressed speech signal, frame number and check information are generated based on speech content to form a watermark. Subsequently, the generated watermark is embedded into the least significant digits of speech sampling points using the proposed watermarking algorithm. In the latter process, the embedded watermark is utilized to locate the tampered area and recover that tampered content synchronously. Experimental results show that the proposed watermarking algorithm is fragile to common signal processing. Additionally, it has favorable inaudibility, accurate location ability and high recovery quality.