scispace - formally typeset
Open AccessJournal Article

A Content-Based Authentication Using Digital Speech Data

Hana'a M. Salman
- 01 Jan 2007 - 
- Vol. 25, Iss: 10, pp 1162-1170
Reads0
Chats0
TLDR
A watermarking technique for speech content and speaker authentication scheme, which is based on using abstracts of speech features relevant to semantic meaning and combined with an ID for the speaker, shows that the suggested scheme is successful for combining speech and speaker watermark authentication.
Abstract
A watermarking technique for speech content and speaker authentication scheme, which is based on using abstracts of speech features relevant to semantic meaning and combined with an ID for the speaker is proposed in this paper. The ID which, represents the watermark for the speaker, is embedded using spread spectrum technique. While the extracted abstracts of speech features are used to represents the watermark for the speech, is embedded in the original speech file using secret key. The abstracts speech feature is implemented using B-spline curve interpolation. The paper provides a background knowledge for the concept of speaker watermarking and content-fragile watermarking based on digital speech data. Then, the suggested feature based authentication scheme is develop and the results from the evaluation are presented. It shows that the suggested scheme is successful for combining speech and speaker watermark authentication.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

Secure Transmission of Password Using Speech Watermarking

TL;DR: A blind speech watermarking algorithm that embeds the watermark signal data in the musical (sequence) host signal by using frequency masking is used and a different logarithmic approach is proposed.

Designing New Coefficients for the Discrete Wavelet Transform Depending on a Mathematical Method and Applied in the Hiding Process of the Speech and the Image

TL;DR: In this article, the authors used the discrete wavelet transform as a comparative study through the hiding methods, which is applied in the time domain, and the statistical term MSE is applied which is always used for comparative, and another term MAPE is added as a supporting term and then calculated the PSNR to measure the quality of the images and speeches after reconstruction.
References
More filters
Journal ArticleDOI

Watermarking-based digital audio data authentication

TL;DR: The invertible audio scheme is combined with digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original, protected with a secret key.
Book ChapterDOI

Multimedia Authentication and Watermarking

TL;DR: This chapter presents a comprehensive review of current technologies for multimedia data authentication and tamper detection and introduces the problem issues and general requirements for a multimedia authentication system.
Proceedings ArticleDOI

Speech content authentication integrated with CELP speech decoders

TL;DR: A speech content authentication scheme, which is integrated with CELP speech coders to minimize the total computational cost and is not only much faster than traditional cryptographic bitstream integrity algorithms, but also more compatible for a variety of applications.
Related Papers (5)