Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : fragile watermarking authentication


Content-Based Authentication Using Digital Speech Data

Hana; a M. Salman

Engineering and Technology Journal, 2008, Volume 26, Issue 2, Pages 228-239

A watermarking technique for speech content and speaker authentication
scheme, which is based on using abstracts of speech features relevant to semantic
meaning and combined with an ID for the speaker is proposed in this paper. The ID
which, represents the watermark for the speaker, is embedded using spread spectrum
technique. While the extracted abstracts of speech features are used to represents the
watermark for the speech, is embedded in the original speech file using secret key.
The abstracts speech feature is implemented using B-spline curve interpolation. The
paper provides a background knowledge for the concept of speaker watermarking
and content-fragile watermarking based on digital speech data. Then, the suggested
feature based authentication scheme is develop and the results from the evaluation
are presented. It shows that the suggested scheme is successful for combining
speech and speaker watermark authentication.

A Content-Based Authentication Using Digital Speech Data

Hana; a M. Salman

Engineering and Technology Journal, 2007, Volume 25, Issue 10, Pages 1162-1170

A watermarking technique for speech content and speaker authentication
scheme, which is based on using abstracts of speech features relevant to
semantic meaning and combined with an ID for the speaker is proposed in
this paper. The ID which represents the watermark for the speaker, is
embedded using spread spectrum technique while the extracted abstracts of
speech features are used to represent the watermark for the speech, embedded
in the original speech file using secret key. The abstracts speech feature is
implemented using B-spline curve interpolation. The paper provides a
background knowledge for the concept of speaker watermarking and contentfragile
watermarking based on digital speech data. Then, the suggested
feature based authentication scheme is developed and the results from the
evaluation are presented. Show that the suggested scheme is successful in
combining speech and speaker watermark authentication.