[go: up one dir, main page]

Reference Hub2
A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform

A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform

Fan Zhang, Zhenghui Liu, Hongxia Wang
Copyright: © 2015 |Volume: 7 |Issue: 3 |Pages: 18
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781466676954|DOI: 10.4018/IJDCF.2015070102
Cite Article Cite Article

MLA

Zhang, Fan, et al. "A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform." IJDCF vol.7, no.3 2015: pp.19-36. http://doi.org/10.4018/IJDCF.2015070102

APA

Zhang, F., Liu, Z., & Wang, H. (2015). A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform. International Journal of Digital Crime and Forensics (IJDCF), 7(3), 19-36. http://doi.org/10.4018/IJDCF.2015070102

Chicago

Zhang, Fan, Zhenghui Liu, and Hongxia Wang. "A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform," International Journal of Digital Crime and Forensics (IJDCF) 7, no.3: 19-36. http://doi.org/10.4018/IJDCF.2015070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Watermark schemes content-based provide one way to solve the veracity and integrity of speech content. Some existed content-based schemes are vulnerable to feature-analysed substitution attack. Aiming to solve the problems, a secure speech content authentication algorithm is proposed, on the basic of the undeterminate angle of discrete fractional fourier transform. In the paper, the definition and calculation of discrete fractional fourier transform are given. And the watermark generation method based on discrete fractional fourier transform is analyzed. Frame number and watermark bits are embedded into hybrid domain of scrambled signals. Compared with the existed watermark schemes, the features for watermark generation and embedding are secret, which improves the security of watermark system. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks and has the excellent ability of tamper detection and tamper location.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.