Skip to main content
Log in

Tamper recovery algorithm for digital speech signal based on DWT and DCT

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

It is a challenging work to design tamper recovery schemes for digital speech signal. Briefly, there are two problems need to be solved. One is that the signals used to tamper recovery are difficult to generate and embed, and the second is that it’s hard to tamper location precisely for attacked speech signal. In this paper, compression and reconstruction method based on discrete wavelet transform (DWT) and discrete cosine transform (DCT) is given, to obtain the compressed signals used to tamper recovery. And then frame number and compressed signals are embedded based on block-based method. Attacked signal can be located by frame number, and compressed signals are extracted and used to reconstruct the attacked signal. Theory analysis and experimental results indicate that the scheme proposed not only improves the accuracy of tamper localization, but also can reconstruct the attacked signals.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31

Similar content being viewed by others

References

  1. Akhaee MA, Kalantari NK, Marvasti F (2010) Robust audio and speech satermarking using Gaussian and Laplacian modeling. Signal Process 90(8):2487–2497

    Article  MATH  Google Scholar 

  2. Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36(3):578–584

    Article  MATH  Google Scholar 

  3. Chen OTC, Liu CH (2007) Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Trans Audio, Speech, Language Process 15(5):1605–1616

    Article  Google Scholar 

  4. Fakhr MW (2012) Sparse watermark embedding and recovery using compressed sensing framework for audio signals. Int Conf Cyber-Enabled Distrib Comput Knowledge Discover 535–539

  5. Herbig T, Gerl F, Minker W (2012) Self-learning speaker identification for enhanced speech recognition. Comput Speech Language 26(3):210–227

    Article  Google Scholar 

  6. Khan LA, Baig MS, Youssef AM (2010) Speaker recognition from encrypted VoIP communications. Digit Investig 7(1–2):65–73

    Article  Google Scholar 

  7. Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506

    Article  MathSciNet  MATH  Google Scholar 

  8. Lei BY, Soon IY, Li Z (2011) Blind and robust audio watermarking scheme based on SVD-DCT. Signal Process 91(8):1973–1984

    Article  MATH  Google Scholar 

  9. Lei B, Soon IY, Tan EL (2013) Robust SVD-Based audio watermarking scheme with differential evolution optimization. IEEE Trans Audio, Speech, Language Process 21(11):2368–2378

    Article  Google Scholar 

  10. Li B, Wang M, Li XL, Tan SQ, Huang JW (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inform Foren Sec 10(9):1905–1917

    Article  Google Scholar 

  11. Li CL, Wang YH, Ma B, Zhang ZX (2012) Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput Standards Interf 34(4):367–379

    Article  Google Scholar 

  12. Liu ZH, Wang HX (2014) A novel speech content authentication algorithm based on Bessel-Fourier moments. Digit Sign Process 24(1):197–208

    Article  MathSciNet  Google Scholar 

  13. Liu ZH, Zhang F, Wang J, Wang HX, Huang JW (2016) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123(1):157–166

    Article  Google Scholar 

  14. Luo D, Sun MM, Huang JW (2016) Audio postprocessing detection based on amplitude cooccurrence vector feature. IEEE Sign Process Lett 23(5):688–692

    Article  Google Scholar 

  15. Navarathna R, Dean D, Sridharan S (2013) Multiple cameras for audio-visual speech recognition in an automotive environment. Comput Speech Language 27(4):911–927

    Article  Google Scholar 

  16. Park CM, Thapa D, Wang GN (2007) Speech authentication system using digital watermarking and pattern recovery. Pattern Recogn Lett 28(8):931–938

    Article  Google Scholar 

  17. Peng H, Li B, Luo XH (2013) A learning-based audio watermarking scheme using kernel Fisher discriminant analysis. Digit Sign Process 23(1):382–389

    Article  MathSciNet  Google Scholar 

  18. Pun CM, Yuan XC (2013) Robust segments detector for de-synchronization resilient audio watermarking. IEEE Trans Audio, Speech, Language Process 21(11):2412–2424

    Article  Google Scholar 

  19. Roldan LR, Hernandez MC, Miyatake MN, Meana HP, Kurkoski B (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process Image Commun 28(1):69–83

    Article  Google Scholar 

  20. Sahidullah M, Saha G (2012) Design, analysis and experimental evaluation of block based transformation in MFCC computation for speaker recognition. Speech Comm 54(4):543–565

    Article  Google Scholar 

  21. Vivekananda BK, Indranil S, Abhijit D (2011) A new audio watermarking scheme based on singular value decomposition and quantization. Circ, Syst, Sign Process 30(5):915–927

    Article  Google Scholar 

  22. Wang XY, Ma TX, Niu PP (2011) A pseudo-Zernike moments based audio watermarking scheme robust against desynchronization attacks. Comput Electr Eng 37(4):425–443

    Article  MATH  Google Scholar 

  23. Wang Y, Wu SQ, Huang JW (2010) Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform. J Adv Sign Process 2010(13):1–17

    MATH  Google Scholar 

  24. Yuan S, Huss SA (2004) Audio watermarking algorithm for real-time speech integrity and authentication. The 2004 workshop on Multimedia and Security, 220–226

Download references

Acknowledgments

This paper is supported by the National Natural Science Foundation of China (Grant No. 61332012, 61272465, 61502409), Shenzhen R&D Program (GJHZ20140418191518323), and Nanhu Scholars Program for Young Scholars of XYNU. We would like to thank the anonymous reviewers for their constructive suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. W. Huang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Z.H., Luo, D., Huang, J.W. et al. Tamper recovery algorithm for digital speech signal based on DWT and DCT. Multimed Tools Appl 76, 12481–12504 (2017). https://doi.org/10.1007/s11042-016-3664-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3664-z

Keywords

Navigation