{"title":"增强生物声纹/语音识别系统安全性的新型自适应水印嵌入方法","authors":"Slami Saadi, Ahmed Merrad","doi":"10.1007/s11235-024-01133-6","DOIUrl":null,"url":null,"abstract":"<p>In this paper, we propose a novel watermarking method in order to enhance the security in biometric voice/speech transmission systems basing on sub-sampling, discrete cosine transform (DCT) and adaptive watermark embedding. To improve imperceptibility, we use sub-sampling and adaptive embedding in DCT high energy coefficients. We employ a significant watermark represented in a biometric unique fingerprint. Introducing bits, only in high energy fraction, provides us with further agreeing element depicted by decreasing running time, both in embedding and extraction processes, which can help minimizing hardware consumption. Achieved results reveal the stability and flexibility of our proposed scheme and confirm its robustness against additive noise. In addition, we enhanced our previous published approaches and the expected limitations of our proposed model will appear in the hardware implementation where the attacks will be more considered. Another limitation will be the number of quantization bits used for high energy DCT coefficients. All these may affect the speaker secured identification and verification system.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"6 1","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A novel adaptive watermark embedding approach for enhancing security of biometric voice/speech systems\",\"authors\":\"Slami Saadi, Ahmed Merrad\",\"doi\":\"10.1007/s11235-024-01133-6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>In this paper, we propose a novel watermarking method in order to enhance the security in biometric voice/speech transmission systems basing on sub-sampling, discrete cosine transform (DCT) and adaptive watermark embedding. To improve imperceptibility, we use sub-sampling and adaptive embedding in DCT high energy coefficients. We employ a significant watermark represented in a biometric unique fingerprint. Introducing bits, only in high energy fraction, provides us with further agreeing element depicted by decreasing running time, both in embedding and extraction processes, which can help minimizing hardware consumption. Achieved results reveal the stability and flexibility of our proposed scheme and confirm its robustness against additive noise. In addition, we enhanced our previous published approaches and the expected limitations of our proposed model will appear in the hardware implementation where the attacks will be more considered. Another limitation will be the number of quantization bits used for high energy DCT coefficients. All these may affect the speaker secured identification and verification system.</p>\",\"PeriodicalId\":51194,\"journal\":{\"name\":\"Telecommunication Systems\",\"volume\":\"6 1\",\"pages\":\"\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2024-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Telecommunication Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11235-024-01133-6\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Telecommunication Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11235-024-01133-6","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
A novel adaptive watermark embedding approach for enhancing security of biometric voice/speech systems
In this paper, we propose a novel watermarking method in order to enhance the security in biometric voice/speech transmission systems basing on sub-sampling, discrete cosine transform (DCT) and adaptive watermark embedding. To improve imperceptibility, we use sub-sampling and adaptive embedding in DCT high energy coefficients. We employ a significant watermark represented in a biometric unique fingerprint. Introducing bits, only in high energy fraction, provides us with further agreeing element depicted by decreasing running time, both in embedding and extraction processes, which can help minimizing hardware consumption. Achieved results reveal the stability and flexibility of our proposed scheme and confirm its robustness against additive noise. In addition, we enhanced our previous published approaches and the expected limitations of our proposed model will appear in the hardware implementation where the attacks will be more considered. Another limitation will be the number of quantization bits used for high energy DCT coefficients. All these may affect the speaker secured identification and verification system.
期刊介绍:
Telecommunication Systems is a journal covering all aspects of modeling, analysis, design and management of telecommunication systems. The journal publishes high quality articles dealing with the use of analytic and quantitative tools for the modeling, analysis, design and management of telecommunication systems covering:
Performance Evaluation of Wide Area and Local Networks;
Network Interconnection;
Wire, wireless, Adhoc, mobile networks;
Impact of New Services (economic and organizational impact);
Fiberoptics and photonic switching;
DSL, ADSL, cable TV and their impact;
Design and Analysis Issues in Metropolitan Area Networks;
Networking Protocols;
Dynamics and Capacity Expansion of Telecommunication Systems;
Multimedia Based Systems, Their Design Configuration and Impact;
Configuration of Distributed Systems;
Pricing for Networking and Telecommunication Services;
Performance Analysis of Local Area Networks;
Distributed Group Decision Support Systems;
Configuring Telecommunication Systems with Reliability and Availability;
Cost Benefit Analysis and Economic Impact of Telecommunication Systems;
Standardization and Regulatory Issues;
Security, Privacy and Encryption in Telecommunication Systems;
Cellular, Mobile and Satellite Based Systems.