Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 5454768, 13 pages
https://doi.org/10.1155/2017/5454768
Research Article

Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling

1Department of Computer Engineering, Islamic Azad University, Safadasht Branch, Tehran, Iran
2Cybersecurity Laboratory, National Electronics and Computer Technology Center, 112 Phahonyothin Road, Klong 1, Klong Luang, Pathumthani 12120, Thailand
3Department of Electronics Engineering, Universidad Autónoma de Zacatecas, 98000 Zacatecas, DF, Mexico

Correspondence should be addressed to Chalee Vorakulpipat; ht.ro.cetcen@tapiplukarov.eelahc

Received 31 August 2016; Revised 26 November 2016; Accepted 18 December 2016; Published 20 February 2017

Academic Editor: Emanuele Maiorana

Copyright © 2017 Mohammad Ali Nematollahi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. A. Nematollahi, C. Vorakulpipat, and H. G. Rosales, Digital Watermarking: Techniques and Trends, vol. 11, Springer, 2016.
  2. M. A. Nematollahi and S. A. R. Al-Haddad, “An overview of digital speech watermarking,” International Journal of Speech Technology, vol. 16, no. 4, pp. 471–488, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. H.-T. Hu and L.-Y. Hsu, “A DWT-based rational dither modulation scheme for effective blind audio watermarking,” Circuits, Systems, and Signal Processing, vol. 35, no. 2, pp. 553–572, 2016. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” Institute of Electrical and Electronics Engineers. Transactions on Information Theory, vol. 47, no. 4, pp. 1423–1443, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. M. A. Nematollahi, M. A. Akhaee, S. A. R. Al-Haddad, and H. Gamboa-Rosales, “Semi-fragile digital speech watermarking for online speaker recognition,” Eurasip Journal on Audio, Speech, and Music Processing, vol. 2015, no. 1, article no. 31, 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. P. Guccione and M. Scagliola, “Hyperbolic RDM for nonlinear valumetric distortions,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 25–35, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. N. Cai, N. Zhu, S. Weng, and B. Wing-Kuen Ling, “Difference angle quantization index modulation scheme for image watermarking,” Signal Processing: Image Communication, vol. 34, pp. 52–60, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. X. Zhu and S. Peng, “A novel quantization watermarking scheme by modulating the normalized correlation,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '12), pp. 1765–1768, IEEE, Kyoto, Japan, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. M. A. Akhaee, S. M. E. Sahraeian, and C. Jin, “Blind image watermarking using a sample projection approach,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 883–893, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. N. K. Kalantari and S. M. Ahadi, “A logarithmic quantization index modulation for perceptually better data hiding,” IEEE Transactions on Image Processing, vol. 19, no. 6, pp. 1504–1517, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. M. Zareian and H. R. Tohidypour, “A novel gain invariant quantization-based watermarking approach,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1804–1813, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. M. Faundez-Zanuy, M. Hagmüller, and G. Kubin, “Speaker verification security improvement by means of speech watermarking,” Speech Communication, vol. 48, no. 12, pp. 1608–1619, 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Faundez-Zanuy, M. Hagmüller, and G. Kubin, “Speaker identification security improvement by means of speech watermarking,” Pattern Recognition, vol. 40, no. 11, pp. 3027–3034, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  14. M. A. Nematollahi, H. Gamboa-Rosales, M. A. Akhaee, and S. A. R. Al-Haddad, “Robust digital speech watermarking for online speaker recognition,” Mathematical Problems in Engineering, vol. 2015, Article ID 372398, 12 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. M. A. Nematollahi, H. Gamboa-Rosales, F. J. Martinez-Ruiz, J. I. de la Rosa-Vargas, S. A. R. Al-Haddad, and M. Esmaeilpour, “Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition,” Multimedia Tools and Applications, pp. 1–31, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. M. A. Nematollahi, S. A. R. Al-Haddad, S. Doraisamy, and H. Gamboa-Rosales, “Speaker frame selection for digital speech watermarking,” National Academy Science Letters, vol. 39, no. 3, pp. 197–201, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Gazor and W. Zhang, “Speech probability distribution,” IEEE Signal Processing Letters, vol. 10, no. 7, pp. 204–207, 2003. View at Publisher · View at Google Scholar · View at Scopus
  18. M. A. Akhaee, N. Khademi Kalantari, and F. Marvasti, “Robust audio and speech watermarking using Gaussian and Laplacian modeling,” Signal Processing, vol. 90, no. 8, pp. 2487–2497, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  19. J. S. Garofolo and L. D. Consortium, TIMIT: Acoustic-Phonetic Continuous Speech Corpus, Linguistic Data Consortium, 1993.
  20. S. Verdú and T. S. Han, “A general formula for channel capacity,” IEEE Transactions on Information Theory, vol. 40, no. 4, pp. 1147–1157, 1994. View at Publisher · View at Google Scholar · View at Scopus
  21. S. Wang and M. Unoki, “Speech watermarking method based on formant tuning,” IEICE Transactions on Information and Systems, vol. 98, no. 1, pp. 29–37, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. B. Yan and Y.-J. Guo, “Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization,” Multimedia Tools and Applications, vol. 67, no. 2, pp. 383–405, 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. I. Rec, P. 800: Methods for Subjective Determination of Transmission Quality, International Telecommunication Union, Geneva, Switzerland, 1996.
  24. M. Steinebach, F. A. P. Petitcolas, F. Raynal et al., “StirMark benchmark: audio watermarking attacks,” in Proceedings of the International Conference on Information Technology: Coding and Computing, IEEE, 2001.
  25. K. Vivekananda Bhat, I. Sengupta, and A. Das, “An audio watermarking scheme using singular value decomposition and dither-modulation quantization,” Multimedia Tools and Applications, vol. 52, no. 2-3, pp. 369–383, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. R. C. Elandt-Johnson and N. L. Johnson, Survival Models and Data Analysis, Wiley Classics Library, John Wiley & Sons, New York, NY, USA, 1999. View at Publisher · View at Google Scholar · View at MathSciNet