A Study on Detection and Recovery of Speech Signal Tampering

In this paper, a watermark scheme for detecting and recovering the tampering of speech signal is proposed. We embed an approximate version of the origin information into the less significant bits (LSBs). When the watermarked signal is tampered, we can localize the tampered area and exclude from the area, recovery the original one from the approximate version. Based the embedded information, we estimate the origin signal by solving a liner equation with Least Square QR-factorization (LSQR) method. The result of an informal listening test shows that 83.7% listening material is intelligible after recovery with 20% part tampered.

[1]  Shih-Fu Chang,et al.  SARI: self-authentication-and-recovery image watermarking system , 2001, MULTIMEDIA '01.

[2]  Xinpeng Zhang,et al.  Fragile Watermarking Scheme with Extensive Content Restoration Capability , 2009, IWDW.

[3]  Indranil Sengupta,et al.  An adaptive audio watermarking based on the singular value decomposition in the wavelet domain , 2010, Digit. Signal Process..

[4]  Zhenxing Qian,et al.  Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Zhang Jia-shu,et al.  Chaos-based scramble self-embedding watermarking algorithm , 2006 .

[6]  Fan Chen,et al.  A Fragile Watermarking Scheme for Audio Detection and Recovery , 2008, 2008 Congress on Image and Signal Processing.

[7]  G. Kubin,et al.  Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication , 2003, Digital Avionics Systems Conference, 2003. DASC '03. The 22nd.

[8]  Fathi E. Abd El-Samie,et al.  An efficient singular value decomposition algorithm for digital audio watermarking , 2009, Int. J. Speech Technol..

[9]  Yang Yu,et al.  steel-rail product line's logistics simulation system based on component technology , 2007 .

[10]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[11]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[12]  Ming-Shi Wang,et al.  A majority-voting based watermarking scheme for color image tamper detection and recovery , 2007, Comput. Stand. Interfaces.

[13]  Nasir D. Memon,et al.  An SVD based audio watermarking technique , 2005, Proceedings of the IEEE 13th Signal Processing and Communications Applications Conference, 2005..

[14]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[15]  Tan Qi-xiang Technique of characteristic-based self-embedded watermark using in audio , 2007 .

[16]  Emin Anarim,et al.  Image Error Concealment Using Watermarking with Subbands for Wireless Channels , 2007, IEEE Communications Letters.

[17]  Ayhan Yılmaz,et al.  Error detection and concealment for video transmission using information hiding , 2008, Signal Process. Image Commun..

[18]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).