Abstract

There have been serious issues concerning the protection of speech signals from malicious tampering. Digital watermarking has been paid much attention in solving this problem. This paper proposes a tampering detection approach based on speech watermarking by modifying the line spectral frequencies (LSFs). Watermarks are embedded into LSFs that derived from linear prediction (LP) analysis with dither modulation-quantization index modulation (DM-QIM). Minor modifications to LSFs introduced by quantization not only enable the watermarks to be inaudible to human auditory system but also provide the possibility of robustness against meaningful processing and fragility against tampering. We evaluated the proposed approach with objective evaluations with respect to inaudibility, robustness, and fragility. The results indicated that the proposed approach for tampering detection not only satisfied inaudibility but also provided good robustness against meaningful processing and fragility against malicious tampering.

Highlights

  • Digital watermarking [7, 8] has drawn more and more attention in the past few years in speech protection

  • Speech signals usually need to be processed by speech codecs or other meaningful processing, and it seems unable for fragile watermarking to survive from these processing due to its fragility [12]

  • Wu and Jay Kuo [17] implemented a fragile speech watermarking based on odd/even modulation and exponential scale quantization. e pseudorandom noise was embedded as the watermarks in the discrete Fourier transform (DFT) magnitude domain by roughly approximating the MPEG audio psychoacoustic model

Read more

Summary

Mathematical Problems in Engineering

Digital watermarking for speech signals is more challenging compared with image watermarking, due to the extreme sensitivity of the human auditory system. Sarreshtedari et al [13] proposed to embed the compressed version of speech into original signal for tampering detection. Celik et al [14] proposed a robust speech watermarking method by introducing small changes to pitch (fundamental frequency). We previously proposed a speech watermarking approach based on LSFs [21] and DM-QIM [22]. We found that the proposed approach was very sensitive to processing that could change the shapes of waveform or the values of watermarked signal. Is characteristic inspired us to investigate if the proposed approach could be used as fragile watermarking for tampering detection. We developed the proposed approach for speech tampering detection. E main process can be divided into nonblind detection in Figure 1(b) involve five steps. Nonblind Detection. e detailed procedures for (i) of embedding process. e main process can be divided into nonblind detection in Figure 1(b) involve five steps. (i) First, the (a) Embedding process

Real part
Blind Nonblind
Nonblind Blind
Robustness tests Nonblind detection
Findings
Nonblind detection Blind detection

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.