오디오 딥페이크 탐지를 위한 안전한 워터마킹

Vol. 34, No. 6, pp. 1527-1535, 12월. 2024
10.13089/JKIISC.2024.34.6.1527, Full Text:
Keywords: Audio Deepfake, Watermarking
Abstract

With the advancement of digital technology, deepfake techniques have increasingly posed serious threats to the integrity of digital communication by generating manipulated voices. To address this issue, we propose a cryptographically secure digital audio watermarking technique that directly embeds a watermark into audio files. Our approach utilizes cryptographic hash functions to create a unique watermark that is highly sensitive to unauthorized modifications. This watermark is destroyed immediately when a deepfake manipulation occurs, providing a clear indication of tampering. We evaluate the performance of the watermarking system using signal-to-noise ratio and cross-correlation metrics to measure the similarity between the original and watermarked audio. The results show that our watermarking method ensures a high level of audio integrity. Furthermore, tests against real-world deepfake attacks, such as StarGAN voice conversion and PPG voice conversion demonstrate that the watermarked audio is immediately destroyed after deepfake manipulation. We expect that the proposed watermarking scheme is applicable across various fields requiring strong audio integrity and resistance to deepfake tampering, including media, legal sectors, and secure communications.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
김준모 and 한창희, "Secure Watermarking for Audio Deepfake Detection," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 6, pp. 1527-1535, 2024. DOI: 10.13089/JKIISC.2024.34.6.1527.

[ACM Style]
김준모 and 한창희. 2024. Secure Watermarking for Audio Deepfake Detection. Journal of The Korea Institute of Information Security and Cryptology, 34, 6, (2024), 1527-1535. DOI: 10.13089/JKIISC.2024.34.6.1527.