Oscal T.-C. Chen and Chia-Hsiung Liu

25
Content-Dependent Watermarking Scheme in Compressed Speech With Identifying Manner and Location of Attacks scal T.-C. Chen and Chia-Hsiung Liu Date 2009/12/01 Speaker Jhang Hon-Bin 1

description

Content-Dependent Watermarking Scheme in Compressed Speech With Identifying Manner and Location of Attacks. Oscal T.-C. Chen and Chia-Hsiung Liu. Date : 2009/12/01 Speaker : Jhang Hon-Bin. Outline. Introduction Proposed Scheme Computer Simulations Conclusions. Oscal T.-C. Chen. - PowerPoint PPT Presentation

Transcript of Oscal T.-C. Chen and Chia-Hsiung Liu

Page 1: Oscal T.-C. Chen and Chia-Hsiung Liu

Content-Dependent Watermarking Scheme in Compressed Speech With Identifying Manner and Location of Attacks

Oscal T.-C. Chen and Chia-Hsiung Liu

Date : 2009/12/01Speaker : Jhang Hon-Bin

1

Page 2: Oscal T.-C. Chen and Chia-Hsiung Liu

۞ Introduction

۞ Proposed Scheme

۞ Computer Simulations

۞ Conclusions

Outline

2

Page 3: Oscal T.-C. Chen and Chia-Hsiung Liu

Oscal T.-C. Chen

Chia-Hsiung Liu

美國南加州大學電機工程博士國立中正大學電機工程學系專任教授

國立中正大學電機工程研究所博士

Received May 31, 2006Revised January 15, 2007This work was supported in part by the National Science Council(NSC), Taiwan, R.O.C.

3

Page 4: Oscal T.-C. Chen and Chia-Hsiung Liu

Hacker

無 浮水印加入 浮水印

發現攻擊 !!

4

Introduction (1/5)

Page 5: Oscal T.-C. Chen and Chia-Hsiung Liu

5

Introduction (2/5)

Watermarking Scheme

• Robust 、 Fragile 、 Semi-Fragile

Theoretical Foundation of Conventional Watermarks

固定值 : Image ID

變異值 : block index

目前區塊 : Image feature

Page 6: Oscal T.-C. Chen and Chia-Hsiung Liu

6

Introduction (3/5)

Theoretical Foundation of Conventional Watermarks(Cont.)

鄰近區塊 : Image feature

鄰近區塊 : Image Watermark

識別標誌訊息

Page 7: Oscal T.-C. Chen and Chia-Hsiung Liu

7

Introduction (4/5)

Design Concept (Problem)

• A speech watermarking scheme must reliably determine where and how attacks take place.

• A deletion and insertion attacks that influence speech length.

• When a watermarking scheme applies (4) to verify speech integrity. Cannot localize attacks due to an inconsistency between

Page 8: Oscal T.-C. Chen and Chia-Hsiung Liu

8

Introduction (5/5)

Objective

• 準確地檢測攻擊的 位置 和攻擊的 型態

• 語音壓縮技術使用 G.723.1

• 嵌入浮水印後能保持 語音品質 最小下降

Page 9: Oscal T.-C. Chen and Chia-Hsiung Liu

9

Proposed Scheme (1/8)

Design Concept (Solve)

• When a watermarking scheme applies (4) to verify speech integrity. Cannot localize attacks due to an inconsistency between

• The first scheme is to constrain the value using the following equation:

限制 的範圍

Page 10: Oscal T.-C. Chen and Chia-Hsiung Liu

10

Design Concept (Solve)(Count.)

• The second scheme,the generating process does not use data, such as frame index, to generate the watermark

• The second approach is a watermarking scheme expressed as.

特點The first scheme 可確定在何處以及如何發生攻擊。The second scheme

只能找攻擊位置,但不能確定攻擊方式。

Proposed Scheme (2/8)

Page 11: Oscal T.-C. Chen and Chia-Hsiung Liu

11

Design Concept (Solve)(Count.)

• The two schemes can be integrated into one scheme to help achieve our goal.

• Determine attack type and localize attacked segments.

Frame Frame Frame Frame Frame Frame‧ ‧ ‧ ‧ ‧ ‧ ‧ ‧ ‧

Group Group Group

Then (8) is used to generate watermarks.

In most circumstances, (9) is employed to generate watermarks.

Proposed Scheme (3/8)

Page 12: Oscal T.-C. Chen and Chia-Hsiung Liu

12

Watermark Generation

三種浮水印產生方式1. The first frame in a group

2. The last frame of all speech data

3. The other frame in a group

Proposed Scheme (4/8)

Group g-1 Group g Last group

‧ ‧ ‧‧ ‧ ‧ ‧ ‧ ‧‧ ‧ ‧1 21 1

Page 13: Oscal T.-C. Chen and Chia-Hsiung Liu

13

Watermark Generation (Count.)

• The first frame in a group

前一個 group 的最後一個frame

目前 frame 的 LSF

下一個 frame 的pitch

由 所產生 是表示 group index 的位元數

Group g-1 Group g Last group

‧ ‧ ‧‧ ‧ ‧ ‧ ‧ ‧‧ ‧ ‧

Proposed Scheme (5/8)

Page 14: Oscal T.-C. Chen and Chia-Hsiung Liu

14

Watermark Generation (Count.)

• The last frame of all speech data

是最後一個 group 的 frame數 是表示 pitch feature 的位元數

目前 frame 的LSF

前一個frame

Group g-1 Group g Last group

‧ ‧ ‧‧ ‧ ‧ ‧ ‧ ‧‧ ‧ ‧

Proposed Scheme (6/8)

Page 15: Oscal T.-C. Chen and Chia-Hsiung Liu

15

Watermark Generation (Count.)

• The other frame in a group

目前 frame 的 LSF前一個frame

下一個 frame 的pitch

Group g-1 Group g Last group

‧ ‧ ‧‧ ‧ ‧ ‧ ‧ ‧‧ ‧ ‧

Proposed Scheme (7/8)

Page 16: Oscal T.-C. Chen and Chia-Hsiung Liu

產生浮水印 & 嵌入浮水印

取出浮水印

Comparator

原浮水印

取出的浮水印

CorrectOr

Incorrect1 2 31 frame = 240

60 60 60 60

MP-MLQ (6.3 k bit/s)

ITUT G.723.1

Proposed Scheme (8/8)

04 / 23 / 2009 P 16

Page 17: Oscal T.-C. Chen and Chia-Hsiung Liu

17

Evaluation of Speech Quality

• Eleven conversations of 60.6 ~125.6 s are encoded.

正常語音壓縮 加入浮水印PESQ 3.52 3.41

表 3.1 : 正常語音壓縮和加入浮水印後 PESQ 數值

Computer Simulations (1/8)

Page 18: Oscal T.-C. Chen and Chia-Hsiung Liu

18

Comparison Between Proposed and Conventional Schemes

• The schemes proposed by Yuan et al. and Steinebach et al. are rederived from (5)–(7) to (15)–(17), respectively

Computer Simulations (2/8)

Page 19: Oscal T.-C. Chen and Chia-Hsiung Liu

19

攻擊方式 影響 frame範圍 影響 frame個數

替代 343~680 338

插入 1129 239

刪除 1675~1694 19

表 3.2 : 三種浮水印攻擊對原 2019 frames 語音的影響

Computer Simulations (3/8)

Page 20: Oscal T.-C. Chen and Chia-Hsiung Liu

20

The Watermarking Scheme Based on (15)

Computer Simulations (4/8)

Page 21: Oscal T.-C. Chen and Chia-Hsiung Liu

21

The Watermarking Scheme Based on (16)

Computer Simulations (5/8)

Page 22: Oscal T.-C. Chen and Chia-Hsiung Liu

22

The Watermarking Scheme Based on (17)

Computer Simulations (6/8)

Page 23: Oscal T.-C. Chen and Chia-Hsiung Liu

23

The Proposed Scheme

Computer Simulations (7/8)

Page 24: Oscal T.-C. Chen and Chia-Hsiung Liu

24

表 3.3 : Performance Comparison of The Proposed and Conventional Schemes

Computer Simulations (8/8)

Page 25: Oscal T.-C. Chen and Chia-Hsiung Liu

25

Conclusions (1/1)

This scheme could locate counterfeit frames and identify the manner of counterfeiting the data.

Only decreases the PESQ by 0.11