University of Bahrain
Scientific Journals

An Efficient Tamper Detection and Recovery Scheme for Attacked Speech Signal

Show simple item record

dc.contributor.author Jalil, Younis Mohammed
dc.contributor.author Shahadi, Haider Ismael
dc.contributor.author Farhan, Hameed Rasool
dc.date.accessioned 2023-07-22T04:28:52Z
dc.date.available 2023-07-22T04:28:52Z
dc.date.issued 2024-01-15
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5128
dc.description.abstract Data security is an essential communication issue, where the resistivity to data tampering, corruption and attacks forms a critical problem. This paper proposes a robust approach for tamper detection in a speech signal and recovering the destroyed parts of the attacked signal from the embedded spare parts using a specific strategy. A watermarking method is suggested to embed authentication codes, synchronization identifiers, and spare part data. The authentication codes are generated using the Singular Value Decomposition (SVD) method, while G.723.1 speech CODEC generates the spare part data. The proposed strategy considers attacks such as muting and replacement. According to the experiments, the quality of the watermarked and retrieved signals has improved. The average signal-to-noise ratio is above 70 dB for the watermarked signal, and the normalized correlation for the retrieved signal is close to attacked signals. Additionally, this approach achieves less distortion in the watermarked signal quality measured by log spectrum distortion, which is about 0.0072. The proposed approach is compared to the related methods, where it achieves the best results, including high robustness against different types of attacks en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Tampering Detection en_US
dc.subject Signal Recovery en_US
dc.subject Speech Watermarking en_US
dc.subject Singular Value Decomposition en_US
dc.subject Authentication Code en_US
dc.subject Speech Signal Attack en_US
dc.title An Efficient Tamper Detection and Recovery Scheme for Attacked Speech Signal en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/150123
dc.volume 15 en_US
dc.issue 1 en_US
dc.pagestart 293 en_US
dc.pageend 306 en_US
dc.contributor.authorcountry Iraq en_US
dc.contributor.authoraffiliation University of Kerbala en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account