A robust speech watermarking based on Quantization Index Modulation and Double Discrete Cosine Transform

Author(s):  
Sheng-Bei Wang ◽  
Xu-Yang Liu ◽  
Xin Dang ◽  
Jian-Ming Wang
2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Xiangning Chen ◽  
Weitao Yuan ◽  
Shengbei Wang ◽  
Chao Wang ◽  
Lin Wang

There have been serious issues concerning the protection of speech signals from malicious tampering. Digital watermarking has been paid much attention in solving this problem. This paper proposes a tampering detection approach based on speech watermarking by modifying the line spectral frequencies (LSFs). Watermarks are embedded into LSFs that derived from linear prediction (LP) analysis with dither modulation-quantization index modulation (DM-QIM). Minor modifications to LSFs introduced by quantization not only enable the watermarks to be inaudible to human auditory system but also provide the possibility of robustness against meaningful processing and fragility against tampering. We evaluated the proposed approach with objective evaluations with respect to inaudibility, robustness, and fragility. The results indicated that the proposed approach for tampering detection not only satisfied inaudibility but also provided good robustness against meaningful processing and fragility against malicious tampering.


2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Mohammad Ali Nematollahi ◽  
Chalee Vorakulpipat ◽  
Hamurabi Gamboa Rosales

This paper presents a gain invariant speech watermarking technique based on quantization of the Lp-norm. In this scheme, first, the original speech signal is divided into different frames. Second, each frame is divided into two vectors based on odd and even indices. Third, quantization index modulation (QIM) is used to embed the watermark bits into the ratio of the Lp-norm between the odd and even indices. Finally, the Lagrange optimization technique is applied to minimize the embedding distortion. By applying a statistical analytical approach, the embedding distortion and error probability are estimated. Experimental results not only confirm the accuracy of the driven statistical analytical approach but also prove the robustness of the proposed technique against common signal processing attacks.


Author(s):  
IRMA SAFITRI ◽  
NUR IBRAHIM ◽  
HERLAMBANG YOGASWARA

ABSTRAKPenelitian ini mengembangkan teknik Compressive Sensing (CS) untuk audio watermarking dengan metode Lifting Wavelet Transform (LWT) dan Quantization Index Modulation (QIM). LWT adalah salah satu teknik mendekomposisi sinyal menjadi 2 sub-band, yaitu sub-band low dan high. QIM adalah suatu metode yang efisien secara komputasi atau perhitungan watermarking dengan menggunakan informasi tambahan. Audio watermarking dilakukan menggunakan file audio dengan format *.wav berdurasi 10 detik dan menggunakan 4 genre musik, yaitu pop, classic, rock, dan metal. Watermark yang disisipkan berupa citra hitam putih dengan format *.bmp yang masing-masing berukuran 32x32 dan 64x64 pixel. Pengujian dilakukan dengan mengukur nilai SNR, ODG, BER, dan PSNR. Audio yang telah disisipkan watermark, diuji ketahanannya dengan diberikan 7 macam serangan berupa LPF, BPF, HPF, MP3 compression, noise, dan echo. Penelitian ini memiliki hasil optimal dengan nilai SNR 85,32 dB, ODG -8,34x10-11, BER 0, dan PSNR ∞.Kata kunci: Audio watermarking, QIM, LWT, Compressive Sensing. ABSTRACTThis research developed Compressive Sensing (CS) technique for audio watermarking using Wavelet Transform (LWT) and Quantization Index Modulation (QIM) methods. LWT is one technique to decompose the signal into 2 sub-bands, namely sub-band low and high. QIM is a computationally efficient method or watermarking calculation using additional information. Audio watermarking was done using audio files with *.wav format duration of 10 seconds and used 4 genres of music, namely pop, classic, rock, and metal. Watermark was inserted in the form of black and white image with *.bmp format each measuring 32x32 and 64x64 pixels. The test was done by measuring the value of SNR, ODG, BER, and PSNR. Audio that had been inserted watermark was tested its durability with given 7 kinds of attacks such as LPF, BPF, HPF, MP3 Compression, Noise, and Echo. This research had optimal result with SNR value of 85.32 dB, ODG value of -8.34x10-11, BER value of 0, and PSNR value of ∞.Keywords: Audio watermarking, QIM, LWT, Compressive Sensing.


Author(s):  
Rahul Dixit ◽  
Amita Nandal ◽  
Arvind Dhaka ◽  
Vardan Agarwal ◽  
Yohan Varghese

Background: Nowadays information security is one of the biggest issues of social networks. The multimedia data can be tampered with, and the attackers can then claim its ownership. Image watermarking is a technique that is used for copyright protection and authentication of multimedia. Objective: We aim to create a new and more robust image watermarking technique to prevent illegal copying, editing and distribution of media. Method : The watermarking technique proposed in this paper is non-blind and employs Lifting Wavelet Transform on the cover image to decompose the image into four coefficient matrices. Then Discrete Cosine Transform is applied which separates a selected coefficient matrix into different frequencies and later Singular Value Decomposition is applied. Singular Value Decomposition is also applied to the watermarking image and it is added to the singular matrix of the cover image which is then normalized followed by the inverse Singular Value Decomposition, inverse Discrete Cosine Transform and inverse Lifting Wavelet Transform respectively to obtain an embedded image. Normalization is proposed as an alternative to the traditional scaling factor. Results: Our technique is tested against attacks like rotation, resizing, cropping, noise addition and filtering. The performance comparison is evaluated based on Peak Signal to Noise Ratio, Structural Similarity Index Measure, and Normalized Cross-Correlation. Conclusion: The experimental results prove that the proposed method performs better than other state-of-the-art techniques and can be used to protect multimedia ownership.


1990 ◽  
Vol 26 (8) ◽  
pp. 503
Author(s):  
S.C. Chan ◽  
K.L. Ho

Sign in / Sign up

Export Citation Format

Share Document