Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017, Article ID 3597695, 9 pages
https://doi.org/10.1155/2017/3597695
Research Article

Semifragile Speech Watermarking Based on Least Significant Bit Replacement of Line Spectral Frequencies

1Department of Computer Engineering, Islamic Azad University, Safadasht Branch, Tehran, Iran
2Cybersecurity Laboratory, Wireless Innovation and Security Research Unit, National Electronics and Computer Technology Center (NECTEC), 112 Phahonyothin Road, Khlong Nueng, Khlong Luang District, Pathumthani 12120, Thailand
3Department of Electronics Engineering, Universidad Autónoma de Zacatecas, 98000 Zacatecas, ZAC, Mexico

Correspondence should be addressed to Mohammad Ali Nematollahi; moc.liamg@eaugnitupmocneerg

Received 19 July 2016; Revised 24 November 2016; Accepted 19 December 2016; Published 10 January 2017

Academic Editor: Xinkai Chen

Copyright © 2017 Mohammad Ali Nematollahi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Faundez-Zanuy, J. J. Lucena-Molina, and M. Hagmüller, “Speech watermarking: an approach for the forensic analysis of digital telephonic recordings,” Journal of Forensic Sciences, vol. 55, no. 4, pp. 1080–1087, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. S. Saraswathi, “Speech authentication based on audio watermarking,” International Journal of Information Technology, vol. 16, no. 1, 2010. View at Google Scholar
  3. B. Yan and Y.-J. Guo, “Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization,” Multimedia Tools and Applications, vol. 67, no. 2, pp. 383–405, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Yan, Z. Lu, S. Sun, and J. Pan, “Speech authentication by semi-fragile watermarking,” in Knowledge-Based Intelligent Information and Engineering Systems, vol. 3683 of Lecture Notes in Computer Science, pp. 497–504, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  5. S. Wang and M. Unoki, “Watermarking method for speech signals based on modifications to LSFS,” in Proceedings of the 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP '13), pp. 283–286, IEEE, Beijing, China, October 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Wang and M. Unoki, “Watermarking of speech signals based on formant enhancement,” in Proceedings of the 22nd European Signal Processing Conference (EUSIPCO '14), IEEE, September 2014.
  7. S. Wang, M. Unoki, and N. S. Kim, “Formant enhancement based speech watermarking for tampering detection,” in Proceedings of the 15th Annual Conference of the International Speech Communication Association, Singapore, 2014.
  8. J. R. Deller, J. G. Proakis, and J. H. Hansen, Discrete-Time Processing of Speech Signals, IEEE, New York, NY, USA, 2000.
  9. M. A. Nematollahi, M. A. Akhaee, S. A. R. Al-Haddad, and H. Gamboa-Rosales, “Semi-fragile digital speech watermarking for online speaker recognition,” Eurasip Journal on Audio, Speech, and Music Processing, vol. 2015, no. 1, article 31, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Wang and M. Unoki, “Speech watermarking method based on formant tuning,” IEICE Transactions on Information and Systems, vol. 98, no. 1, pp. 29–37, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. M.-Q. Fan, P.-P. Liu, H.-X. Wang, and H.-J. Li, “A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform,” International Journal of Computer Mathematics, vol. 90, no. 12, pp. 2588–2602, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Zamani and A. B. A. Manaf, “Genetic algorithm for fragile audio watermarking,” Telecommunication Systems, vol. 59, no. 3, pp. 291–304, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. F. Djebbar, K. Abed-Meraim, D. Guerchi, and H. Hamam, “Energy based text-in speech spectrum hiding using speech mask properties,” in Proceedings of the 2nd International Conference on Signal Processing, Robotics and Automation (ICSRA '10), Wuhan, China, May 2010.
  14. S. Van De Par, A. Kohlrausch, R. Heusdens, J. Jensen, and S. H. Jensen, “A perceptual model for sinusoidal audio coding based on spectral integration,” Eurasip Journal on Applied Signal Processing, vol. 2005, no. 9, pp. 1292–1304, 2005. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  15. S. Arora and S. Emmanuel, “Adaptive spread spectrum based watermarking of speech,” 2013.
  16. Q. Cheng and J. S. Sorensen, “Spread spectrum signaling for speech watermarking,” Google Patents, 2005.
  17. M. A. Nematollahi and S. A. R. Al-Haddad, “An overview of digital speech watermarking,” International Journal of Speech Technology, vol. 16, no. 4, pp. 471–488, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. K. Gopalan, “A unified audio and image steganography by spectrum modification,” in Proceedings of the IEEE International Conference on Industrial Technology (ICIT '09), February 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Djebbar, B. Ayad, K. Abed-Meraim, and H. Hamam, “Unified phase and magnitude speech spectra data hiding algorithm,” Security and Communication Networks, vol. 6, no. 8, pp. 961–971, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Gurijala, “Speech watermarking through parametric modeling,” ProQuest, 2007.
  21. J. Singh, P. Garg, and A. Nath De, “A combined watermarking and encryption algorithm for secure VoIP,” Information Security Journal: A Global Perspective, vol. 18, no. 2, pp. 99–105, 2009. View at Publisher · View at Google Scholar
  22. B. Geiser and P. Vary, “High rate data hiding in ACELP speech codecs,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '08), pp. 4005–4008, Las Vegas, Nev, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  23. N. Aoki, “A technique of lossless steganography for G.711 telephony speech,” in Proceedings of the 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing (IIH-MSP '08), August 2008. View at Publisher · View at Google Scholar · View at Scopus
  24. Y. F. Huang, S. Tang, and J. Yuan, “Steganography in inactive frames of VoIP streams encoded by source codec,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 296–306, 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. I.-K. Yeo and H. J. Kim, “Modified patchwork algorithm: a novel audio watermarking scheme,” IEEE Transactions on Speech and Audio Processing, vol. 11, no. 4, pp. 381–386, 2003. View at Publisher · View at Google Scholar · View at Scopus
  26. G. K. Vallabha and B. Tuller, “Systematic errors in the formant analysis of steady-state vowels,” Speech Communication, vol. 38, no. 1-2, pp. 141–160, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus