Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 8/2022

27.01.2022 | Research Article-Computer Engineering and Computer Science

Secured Speech Watermarking with DCT Compression and Chaotic Embedding Using DWT and SVD

verfasst von: Kasetty Praveen Kumar, Aniruddha Kanhe

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 8/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, a secured watermarking algorithm based on chaotic embedding of speech signal in discrete wavelet transform (DWT) domain of cover audio is proposed. The speech signal to be embedded is compressed using discrete cosine transform (DCT) by finding the suitable number of DCT coefficients such that the perceptual quality of decompressed signal is preserved. The chaotic map is used to select the cover audio frames randomly instead of performing sequential embedding. The cover audio is decomposed using DWT followed by singular value decomposition (SVD), and the DCT coefficients of the speech signal are embedded in the singular matrix of the cover audio. The proposed watermarking algorithm achieves good imperceptibility with an average SNR and ODG of 46 dB and \(-1.07\), respectively. The proposed algorithm can resist to various signal processing attacks such as noise addition, low-pass filtering, requantization, resampling, amplitude scaling, and MP3 compression. Experimental results show that the secret speech is reconstructed with an average perceptual evaluation of speech quality (PESQ) score of 4.26 under no attack condition, and above 3.0 under various signal processing attacks. Further, the correlation between original and reconstructed secret speech signal is close to unity. In addition, the loss in the generality of the information of the reconstructed speech signal is tested and is found minimum even the watermarked audio is subjected to various signal processing attacks. The proposed algorithm is also tested for false positive test to ensure the security of watermarking algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Lakshmi, C.; Ravi, V.M.; Thenmozhi, K.; Rayappan, J.B.B.; Amirtharajan, R.: Con (dif) fused voice to convey secret: a dual-domain approach. Multimed. Syst. 26, 1–11 (2020)CrossRef Lakshmi, C.; Ravi, V.M.; Thenmozhi, K.; Rayappan, J.B.B.; Amirtharajan, R.: Con (dif) fused voice to convey secret: a dual-domain approach. Multimed. Syst. 26, 1–11 (2020)CrossRef
3.
Zurück zum Zitat Ehdaie, M.; Eghlidos, T.; Aref, M.R.: A novel secret sharing scheme from audio perspective. In: 2008 International Symposium on Telecommunications, IEEE, pp. 13–18 (2008) Ehdaie, M.; Eghlidos, T.; Aref, M.R.: A novel secret sharing scheme from audio perspective. In: 2008 International Symposium on Telecommunications, IEEE, pp. 13–18 (2008)
4.
Zurück zum Zitat Wang, J.Z.; Wu, T.X.; Sun, T.Y.: An audio secret sharing system based on fractal encoding. In: 2015 International Carnahan Conference on Security Technology (ICCST), IEEE, pp. 211–216 (2015) Wang, J.Z.; Wu, T.X.; Sun, T.Y.: An audio secret sharing system based on fractal encoding. In: 2015 International Carnahan Conference on Security Technology (ICCST), IEEE, pp. 211–216 (2015)
6.
Zurück zum Zitat Djebbar, F.; Ayad, B.; Meraim, K.A.; Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 1, 25 (2012)CrossRef Djebbar, F.; Ayad, B.; Meraim, K.A.; Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 1, 25 (2012)CrossRef
7.
Zurück zum Zitat Hua, G.; Huang, J.; Shi, Y.Q.; Goh, J.; Thing, V.L.: Twenty years of digital audio watermarking—a comprehensive review. Signal Process. 128, 222–242 (2016)CrossRef Hua, G.; Huang, J.; Shi, Y.Q.; Goh, J.; Thing, V.L.: Twenty years of digital audio watermarking—a comprehensive review. Signal Process. 128, 222–242 (2016)CrossRef
8.
Zurück zum Zitat Mishra, S.; Yadav, V.K.; Trivedi, M.C.; Shrimali, T.: Audio steganography techniques: a survey. In: Advances in Computer and Computational Sciences, pp. 581–589. Springer, Berlin (2018) Mishra, S.; Yadav, V.K.; Trivedi, M.C.; Shrimali, T.: Audio steganography techniques: a survey. In: Advances in Computer and Computational Sciences, pp. 581–589. Springer, Berlin (2018)
9.
Zurück zum Zitat Xu, T.; Yang, Z.; Shao, X.: Novel speech secure communication system based on information hiding and compressed sensing. In: 2009 Fourth International Conference on Systems and Networks Communications, IEEE, pp. 201–206 (2009). https://doi.org/10.1109/ICSNC.2009.71 Xu, T.; Yang, Z.; Shao, X.: Novel speech secure communication system based on information hiding and compressed sensing. In: 2009 Fourth International Conference on Systems and Networks Communications, IEEE, pp. 201–206 (2009). https://​doi.​org/​10.​1109/​ICSNC.​2009.​71
10.
Zurück zum Zitat Shahadi, H.I.; Jidin, R.; Way, W.H.: Lossless audio steganography based on lifting wavelet transform and dynamic stego key. Indian J. Sci. Technol. 7(3), 323 (2014)CrossRef Shahadi, H.I.; Jidin, R.; Way, W.H.: Lossless audio steganography based on lifting wavelet transform and dynamic stego key. Indian J. Sci. Technol. 7(3), 323 (2014)CrossRef
15.
Zurück zum Zitat Alsabhany, A.A.; Ridzuan, F.; Azni, A.H.: The adaptive multi-level phase coding method in audio steganography. IEEE Access 7, 129291–129306 (2019)CrossRef Alsabhany, A.A.; Ridzuan, F.; Azni, A.H.: The adaptive multi-level phase coding method in audio steganography. IEEE Access 7, 129291–129306 (2019)CrossRef
19.
Zurück zum Zitat ITU-T R: Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. Rec ITU-T P 862 (2001) ITU-T R: Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. Rec ITU-T P 862 (2001)
23.
Zurück zum Zitat Burrus, C.; Gopinath, R.; Guo, H.: Introduction to Wavelets and Wavelet Transforms—A Primer. Prentice-Hall, New Jersey (1998) Burrus, C.; Gopinath, R.; Guo, H.: Introduction to Wavelets and Wavelet Transforms—A Primer. Prentice-Hall, New Jersey (1998)
31.
Zurück zum Zitat Katzenbeisser, S.; Petitcolas, F.A.: Information Hiding Techniques for Steganography and Digital Watermarking, 1st edn Artech House, Inc., Norwood (2000) Katzenbeisser, S.; Petitcolas, F.A.: Information Hiding Techniques for Steganography and Digital Watermarking, 1st edn Artech House, Inc., Norwood (2000)
32.
Zurück zum Zitat Kabal, P., et al.: An examination and interpretation of ITU-R BS. 1387: perceptual evaluation of audio quality. TSP Lab Technical Report, Department Electrical & Computer Engineering, McGill University, pp. 1–89 (2002) Kabal, P., et al.: An examination and interpretation of ITU-R BS. 1387: perceptual evaluation of audio quality. TSP Lab Technical Report, Department Electrical & Computer Engineering, McGill University, pp. 1–89 (2002)
33.
Zurück zum Zitat ITU-R R: Methods for objective measurements of perceived audio quality. ITU-R BS 13871 (2001) ITU-R R: Methods for objective measurements of perceived audio quality. ITU-R BS 13871 (2001)
Metadaten
Titel
Secured Speech Watermarking with DCT Compression and Chaotic Embedding Using DWT and SVD
verfasst von
Kasetty Praveen Kumar
Aniruddha Kanhe
Publikationsdatum
27.01.2022
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 8/2022
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-06431-8

Weitere Artikel der Ausgabe 8/2022

Arabian Journal for Science and Engineering 8/2022 Zur Ausgabe

Research Article-Computer Engineering and Computer Science

Application of Mathematical Modeling in Prediction of COVID-19 Transmission Dynamics

Research Article-Computer Engineering and Computer Science

Transformer-Based Word Embedding With CNN Model to Detect Sarcasm and Irony

Research Article-Computer Engineering and Computer Science

An Adaptive Gaussian Kernel for Support Vector Machine

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.