REPAIR: fragile watermarking for encrypted speech authentication with recovery ability

  • PDF / 2,580,762 Bytes
  • 17 Pages / 595.276 x 790.866 pts Page_size
  • 77 Downloads / 163 Views

DOWNLOAD

REPORT


REPAIR: fragile watermarking for encrypted speech authentication with recovery ability Qing Qian1   · Yunhe Cui2 · Hongxia Wang3 · Mingsen Deng1

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Confidentiality and integrity are fundamental requirements when transmitting and storing data. In order to guarantee the confidentiality and integrity of speech signal, we present a novel wateRmarking scheme for Encrypted sPeech AuthenticatIon with Recovery (REPAIR) scheme. In REPAIR, an encryption algorithm is first designed based on a hyper-chaotic method to improve the confidentiality of the original speech by encryption. Subsequently, a watermark generation and embedding algorithm is proposed to generate and embed the check bits and compression bits. Afterwards, a content authentication and tampering recovery algorithm is introduced to locate and recover the tampered speech frames. Meanwhile, a speech decryption algorithm is also presented to decrypt the encrypted speech. Analysis and experimental results demonstrate that REPAIR can detect and locate synchronization attacks and de-synchronization attacks without using the auxiliary synchronous code. Additionally, REPAIR can also recover the tampered content with high quality. Keywords  Digital speech · Authentication · Confidentiality · Integrity · Recovery · Encryption · Watermarking

1 Introduction With the rapid development of network technology, the amount of data has been increased sharply [1]. Especially, enormous disks are needed for storing massive audio signals. Fortunately, the advent of cloud storage has provided a new storage method for digital data. However, the open * Qing Qian [email protected] * Yunhe Cui [email protected] Hongxia Wang [email protected] Mingsen Deng [email protected] 1



International Joint Research Center for Data Science and High‑Performance Computing, School of Information, Guizhou University of Finance and Economics, Guiyang 550025, China

2



School of Computer Science and Technology, Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China

3

College of Cybersecurity, Sichuan University, Chengdu 610064, China



and multi-tenancy storage providers are third parties which may not be completely trusted, making the number of illegal activities increased exponentially. In fact, the biggest hurdle of cloud storage is the concern about confidentiality and integrity in all areas [2, 3]. It is known that encryption technology is an effective method which can be employed to realize confidentiality by converting ordinary files into unintelligible data [4]. In addition, digital watermarking technology is a vital subdivision of steganography, which hides extra information into the cover object to authenticate integrity or protect copyright [5, 6]. Therefore, the encryption and watermarking technologies can be combined for guaranteeing the confidentiality and integrity of digital speech. Undoubtedly, the combination takes significant chances for protecting multimed