PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Localization of Copy-Move Forgery in Speech Signals Through Watermarking Using DCT-QIM

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Digital speech copyright protection and forgery identification are the prevalent issues in our advancing digital world. In speech forgery, voiced part of the speech signal is copied and pasted to a specific location which alters the meaning of the speech signal. Watermarking can be used to safe guard the copyrights of the owner. To detect copy-move forgeries a transform domain watermarking method is proposed. In the proposed method, watermarking is achieved through Discrete Cosine Transform (DCT) and Quantization Index Modulation (QIM) rule. Hash bits are also inserted in watermarked voice segments to detect Copy-Move Forgery (CMF) in speech signals. Proposed method is evaluated on two databases and achieved good imperceptibility. It exhibits robustness in detecting the watermark and forgeries against signal processing attacks such as resample, low-pass filtering, jittering, compression and cropping. The proposed work contributes for forensics analysis in speech signals. This proposed work also compared with the some of the state-of-art methods.
Rocznik
Strony
527--532
Opis fizyczny
Bibliogr. 23 poz., rys., wykr., tab.
Twórcy
autor
  • Dept. of Electronics and Communication Engineering, GMR Institute of Technology, Rajam, A.P, India
  • Dept. of Electronics and Communication Engineering, JNTU-K University, Vizianagaram, A.P, India
  • Dept. of Electronics and Communication Engineering, GIT, GITAM University, Visakhapatnam, A.P, India
Bibliografia
  • [1] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673–1687, 1997.
  • [2] P. Taylor, V. S. Verma, and R. K. Jha, “An Overview of Robust Digital Image Watermarking,” IETE Tech. Rev., no. June, pp. 1–18, 2015.
  • [3] A. N. Lemma, J. Aprea, W. Oomen, and L. Van de Kerkhof, “A temporal domain audio watermarking technique,” IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1088–1097, 2003.
  • [4] M. Unoki and R. Miyauchi, “Robust, blindly-detectable, and semi-reversible technique of audio watermarking based on cochlear delay characteristics,” IEICE Trans. Inf. Syst., vol. E98–D, no. 1, pp. 38–48, 2015.
  • [5] G. Hua, J. Goh, and V. L. L. Thing, “Time-spread echo-based audio watermarking with optimized imperceptibility and robustness,” IEEE/ACM Trans. Speech Lang. Process., vol. 23, no. 2, pp. 227–239, 2015.
  • [6] A. Merrad, A. Benziane, S. Saadi, and A. Hafaifa, “Robust Blind Approach for Digital Speech Watermarking,” in 2nd International Conference on Natural Language and Speech Processing (ICNLSP), 2018.
  • [7] A. Al-haj and A. Mohammad, “Digital Audio Watermarking Based on the Discrete Wavelets Transform and Singular Value Decomposition,” Eur. J. Sci. Res., vol. 39, no. 1, pp. 6–21, 2010.
  • [8] X.-Y. Wang and H. Zhao, “A novel synchronization invariant audio watermarking scheme based on DWT and DCT,” IEEE Trans. Signal Process., vol. 54, no. 12, pp. 4835–4840, 2006.
  • [9] M. A. Nematollahi, H. Gamboa-Rosales, M. A. Akhaee, and S. A. R. Al-Haddad, “Semi-fragile digital speech watermarking for online speaker recognition,” EURASIP J. Audio, Speech, Music Process., vol. 2015, no. 31, pp. 1–15, 2015.
  • [10] M. A. Nematollahi, H. Gamboa-rosales, M. A. Akhaee, and S. A. . Al-Haddad, “Robust Digital SpeechWatermarking For Online Speaker Recognition,” Math. Probl. Eng., vol. 2015, pp. 1–12, 2015.
  • [11] S. Wang, X. Liu, X. Dang, and J. Wang, “A Robust Speech Watermarking Based On Quantization Index Modulation And Double Discrete Cosine Transform,” in 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI 2017), 2017.
  • [12] M. A. Nematollahi, S. A. R. Al-Haddad, and F. Zarafshan, “Blind digital speech watermarking based on Eigen-value quantization in DWT,” J. King Saud Univ. - Comput. Inf. Sci., vol. 27, no. 1, pp. 58–67, 2015.
  • [13] H. T. Hu, S. J. Lin, and L. Y. Hsu, “Effective blind speech watermarking via adaptive mean modulation and package synchronization in DWT domain,” Eurasip J. Audio, Speech, Music Process., vol. 2017, no. 1, pp. 1–14, 2017.
  • [14] Subir and A. M. Joshi, “DWT-DCT based blind audio watermarking using Arnold scrambling and Cyclic codes,” in 3rd International Conference on Signal Processing and Integrated Networks, SPIN 2016, 2016, pp. 79–84.
  • [15] B. Chen and G. W. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423–1443, 2001.
  • [16] P. K. Dhar and T. Shimamura, “Audio Watermarking in Transform Domain Based on Singular Value Decomposition and Cartesian-polar transformation,” Int. J. Speech Technol., vol. 17, pp. 133–144, 2014.
  • [17] S. Self-recovery, S. Sarreshtedari, S. Member, and M. A. Akhaee, “A Watermarking Method for Digital Speech Self-Recovery,” IEEE/Acm Trans. Audio, Speech, Lang. Process., vol. 23, no. 11, pp. 1917–1925, 2015.
  • [18] VoxForge speech database “http://www.repository.voxforge1.org/ downloads/SpeechCorpus/Trunk/Audio/Original/44.1kHz_16bit/tle.” .
  • [19] D. Avci, T. Tuncer, and E. Avci, “A New Information Hiding Method for Audio Signals,” in 6th International Symposium on Digital Forensic and Security (ISDFS), 2018, pp. 3–6.
  • [20] P. K. Dhar and T. Shimamura, “Blind Audio Watermarking in Transform Domain Based on Singular Value Decomposition and Exponential-Log Operations,” Radio Eng., vol. 26, no. 2, pp. 552–561, 2017.
  • [21] H. Hu and J. Chang, “Efficient and robust frame-synchronized blind audio watermarking by featuring multilevel DWT and DCT,” Cluster Comput., vol. 20, no. 1, pp. 805–816, 2017.
  • [22] B. Y. Lei, I. Y. Soon, and Z. Li, “Blind and robust audio watermarking scheme based on SVD-DCT,” Signal Processing, vol. 91, no. 8, pp. 1973–1984, 2011.
  • [23] Z. Liu and H. Wang, “A novel speech content authentication algorithm based on Bessel–Fourier moments,” Digit. Signal Process. A Rev. J., vol. 24, pp. 197–208, 2014.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2019).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-82dc412b-fb45-4d33-a716-4f265814283b
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.