Audio watermarking algorithm for real-time speech integrity and authentication

Data integrity and source origin authentication are essential topics for real-time multimedia systems. But traditional method, such as MAC, is not very applicable to overcome the distortion introduced in real-time multimedia communication. In this paper a new integrity mechanics deploying speech watermarking is presented. The advocated approach adopts public key encryption to efficiently generate non-repudiate speech. In the last part of the article, a speech watermarking algorithm incorporating with GSM 610 full-rate coder is proposed.

[1]  Sadaoki Furui,et al.  Speaker recognition , 1997, Scholarpedia.

[2]  Baugher,et al.  The Secure Real-Time Transport Protocol , 2003 .

[3]  Jean-Luc Dugelay,et al.  Blind detection of malicious alterations on still images using robust watermarks , 2000 .

[4]  Der-Chyuan Lou,et al.  Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..

[5]  Ton Kalker,et al.  Audio watermarking for monitoring and copy protection , 2000, MULTIMEDIA '00.

[6]  John D. Howard,et al.  An analysis of security incidents on the Internet 1989-1995 , 1998 .

[7]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[8]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[9]  C.-C. Jay Kuo,et al.  Speech content integrity verification integrated with ITU G.723.1 speech coding , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[10]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[11]  D. O'Shaughnessy,et al.  Speaker recognition , 1986, IEEE ASSP Magazine.

[12]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[13]  Zhiyuan Li,et al.  Energy impact of secure computation on a handheld device , 2002, 2002 IEEE International Workshop on Workload Characterization.