Full Length Article
DOI: https://doi.org/10.54216/JCIM.170202
MACSteg: Real-Time Voice Authentication and Deepfake Protection Using Device MAC Address Steganography
The invention of deepfake applications make it possible to produce highly natural and real voice recordings which creates critical concerns about the credibility of audio telecommunications. The confirmation of the speakers’ voices became essential especially for sensitive data such as financial, healthcare, and surveillance risk management services, authentication of speakers’ voices became significantly crucial. To improve solutions to this issue, this paper presents MACSteg strategy which is a real-time, lightweight voice authentication technique by discreetly encapsulate device’s MAC address within voice file using Quantization Index Modulation (QIM) stego-technique. Unlike many traditional strategies that degrade voice quality or produces noticed jitter, MACSteg technique preserve both clarity and efficiency. Implementations showed that the hidden MAC address stayed intact in spite of some typical voice processing such as compression, while interfered signals reformed by clatter or volume variations were consistently detected. The proposed system obtained a high signal-to-noise ratio (SNR) exceeding 70 dB, illustrating that the alterations were inaudible, and maintained well in real-time submissions, giving only a processing delay of 0.01 milliseconds per each audio segment. The results indicate MACSteg’s potential as a ascendable and effective approach for safeguarding voice authenticity, especially in circumstances where verification of speaker’s voice is vital.
Sanaa Ahmed Kadhim,
Zaid Ali Alsarray,
Saad Abdual Azize Abdual Rahman
et al.
visibility
1779
download
2135