Abstract

Thispaper focuses on audio-watermarking authentication and integrity-protection within the context of the speech-data transmitted over the Internet in a real-time learning environment.The Arabic Quran recitation through distance learning is used as a case-study example that is characteristic of sensitive data requiring robust authentication and integrity measures. Thisworkproposes an approach for the purpose ofauthenticating and validatingaudio-data transmitted by a publisher or during communications between an instructor and students reciting via Internet communications.The watermarking approach proposed here is based on detection of the key patternswithin the audio signal as an input to the algorithm before the embedding phase is performed.The developed application could be easily used at both sides of the communication for ensuring authenticity and integrity of the transmitted speech signal and is proved effective for many distance-learning applications that require low-complexity processing in real-time

Highlights

  • Recent advancements in information and communication technologies combined with the widespread growth of the Internet have enabled the ease of digital content distribution, communication and reproduction

  • The results demonstrated the effectiveness of the frequency-hopping spread spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) schemes for VoIPapplications that require sourceauthentication

  • It should be noted that the audio watermarking approach based on transforms such as Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT),Singular Value Decomposition (SVD), etc., provide remarkable robustness, but are associated with high complexity which makes it difficult to adapt for real time applications

Read more

Summary

Introduction

Recent advancements in information and communication technologies combined with the widespread growth of the Internet have enabled the ease of digital content distribution, communication and reproduction. Millions of users from the digital community are able to benefit from the advantages of fast and simple digital information exchange. Such benefits come together in-hand with the problems and threats associated with ensuring digital copyright protection, preventing digital counterfeiting, proofof-authentication and content-originality verification. All such digital content in the Internet can be classified into images, text, audio and video, with the challenge being to ensure secure and reliable communications for each media type. Cryptographic techniquesare commonly combined with the watermarking schemes in order to improve the security of the data within the communications channel

Objectives
Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.