Speech Watermarking using a Hybrid Strategy of both Empirical Mode Decomposition and Singular Value Decomposition | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 5, Volume 29, Issue 1, January 2020, Page 39-49 PDF (1.89 MB) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2020.69016 | ||||
View on SCiNiTO | ||||
Authors | ||||
Safaa el-Gazar1; Sami El-Dolil2; Alaa M. Abbas2; Moawad I. Dessouky2; El-Sayed M. El-Rabaie2; Ibrahim M. El-Dokany2; Fathi E. Abd El-Samie2 | ||||
1Dept. of Electrical and Communication Eng., Faculty of Electronic Engineering, Menoufia University, Egypt | ||||
2Dept. of Electrical and Communication Eng., Faculty of Electronic Engineering, Menoufia University, Egypt. | ||||
Abstract | ||||
This paper presents a proposed robust speech watermarking approach. This approach aims to increase the speech watermarking robustness against different attacks. The method is based on Empirical Mode Decomposition (EMD) and Singular Value Decomposition (SVD). The speech signal is decomposed by EMD into its Intrinsic Mode Functions (IMFs), the first IMF transform to a 2-D format. The watermark image embedded into the singular values (SVs) of the first IMF. After watermark embedding, the speech signal transformed back into a1-D format. The first IMF preserves the speech signal perceptual quality, which leads to preserving the watermarked signal imperceptibility. The singular values matrix is stable against any small perturbation happens to the original signal which provide more secure and robustness against attacks. The proposed approach can be implemented on the speech signal as a whole or as a blocks. Block-based SVD implementation allows embedding more than one watermark in the speech signal which increase the opportunities and efficiency of watermark extraction in the presence of attacks. Simulation results show that using of EMD with SVD enhance the watermark extraction especially in the presence of attacks. A block-based implementation of the proposed speech watermarking also realize a higher correlation coefficient in the presence of attacks. | ||||
Keywords | ||||
Speech watermarking; EMD; SVD and IMF | ||||
References | ||||
[1] Mohammad Ali Nematollahi, ChaleeVorakulpipat andHamurabiGamboaRosale, “Speech Watermaking,”Springer Topics in Signal Processing, pp. 39-53, August 2016.
[2] Mohammad Ali Nematollahi and S. A. R. Al-Haddad, “Distant Speaker Recognition: An Overview,” International Journal of Humanoid Robotics, vol. 13, pp. 1-45, issue. 02, June2016.
[3] Dong Hu and Ping Lee, “Security Research on VoIP with Watermarking,” AIP conference proceedings, vol. 1060,pp. 98-101, issue. 1, November 2008.
[4] WojciechMazurczyk and ZbigniewKotulski, “New VoIP Traffic Security Schema with Digital Watermarking,” International Conference of Computer Safety, Reliability and Security, pp. 170 – 181, 2006.
[5] Faundez – Zanuy M, Lucena – Molina JJ and Hagmuller M, “Speech Watermarking: An Approach for the Forensic Analysis of Digital Telephonic Recordings,” Journal of Forensic Sciences, vol.55, pp. 1080-1087, July 2010.
[6] Shervin Shoki, Mohamod Ismail, NasharuddinZainal, “Voice Quality in Speech Watermarking using Spread Spectrum Technique,” International Journal on Computer and Communication Engineering, pp. 169-173, July 2012.
[7] Mohammad Ali Nematollahi, Mohammad Ali Akhaee, S.A.R. Al-Haddad and HamurabiGamboa – Rosales, “ Semi-fragile Digital Speech Watermarking for online Speaker Recognition,” EURASIP Journal on Audio, Speech and Music Processing, pp. 1-15, December 2015.
[8] Doh.Suk Kim, “Perceptual phase Quantization of Speech,” IEEE Transaction on Speech and Audio Processing, vol. 11, pp. 355-364, issue. 4, July 2003.
[9] Michael Arnold, Peter G.Baum and Walter VoeBing, “A phase Modulation Audio Watermarking Technique,” International Workshop on Information Hiding, pp. 102-116, 2009.
[10] I. D. Shterev, “Quantization-based Watermarking: Methods for Amplitude Scale Estimation Security and Linear Filtering Invariance,” Delft Univ. of Technology, pp.14-25, 2007.
[11] Akira Nishimura, “Reversible and Robust Audio Watermarking Based on Spread Spectrum and Amplitude Expansion,” International Workshop on Digital Watermarking, pp. 215-229, 2014.
[12] Qiang Cheng and J.SorenSen, “Spread Spectrum Signaling for Speech Watermarking,” IEEE International Conference on Acoustic, Speech and Signal Processing, vol. 6,pp.1337-1340, May 2001.
[13] Frank Hartung and Bernd Girod, “Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain,” Proceedings International Conference on Acoustics, Speech and Signal Processing, vol. 4, pp. 2621-2624, April 1997.
[14] Abd El-Samie FE,” Information Security for Automatic Speaker Identification”, 1st edition. Springer, pp. 66-92, 2011.
[15] Chin-Chen Chang, Yih-Shin Hu and Chia-Chen Lin, "A Digital Watermarking Scheme Based on Singular Value Decomposition," Digital Signal Process, vol. 21, pp. 522-527, 2011.
[16] Fathi E. Abd El-Samie, “An Efficient Singular Value Decomposition Algorithm for Digital Audio Watermarking,” International Journal of Speech Technology, vol. 12, pp. 27–45, 2009.
[17] Ahmad A. Mohammad, Ali Alhaj and Sameer Shaltaf, “An Improved SVD-based Watermarking Scheme for Protecting Rightful Ownership,” Signal Processing, vol. 88, issue. 9, pp. 2158-2180, September 2008.
[18] Vivekananda Bhat K, IndranilSengupta andAbhijit Das, “An Adaptive Audio Watermarking based on the Singular Value Decomposition in the Wavelet Domain,” Digital Signal Processing, vol. 20, issue 6, pp.1547-1558, December 2010.
[19] Bai Ying Lei, IngYann Soon and Zhen Li, “Blind and Robust Audio Watermarking Scheme based on SVD-DCT”, Signal Processing, vol. 91, issue 8, pp. 1973-1984, August 2011.
[20] Pranab Kumar Dhar and Tetsuya Shimamura, “Blind SVD-based Audio Watermarking using Entropy and log-polar Transformation,” Journal of Information Security and Applications, vol. 20, pp. 74-83, February 2015,
[21] Zeiler A and et al, “Empirical Mode Decomposition-an Introduction,” IEEE International Joint Conference on Neural Networks, pp.1-8, 2010.
[22] KaisKhaldi and Abdel-OuahabBoudraa, “Audio Watermarking Via EMD,” IEEE Transactions on Audio, Speech, and Language Processing, vol. 21, pp. 675-680, March 2013.
[23] Donghoh Kim andHee-Soek Oh, “EMD: A Package for Empirical Mode Decomposition and Hilbert Spectrum,”The R Journal, vol. 1/1, May 2009.
[24] Nawal El Hamdouni, AbdellahAdib, Sonia DjaziriLarbi andMoniaTurki, “Hybrid Embedding Strategy for a Blind Audio Watermarking System using EMD and ISA Techniques,” 4th International Symposium on Communications, Control and Signal Processing (ISCCSP), pp.1-4, March 2010.[25] S. Wang, A. Sekey and A. Gersho, “An Objective Measure for Predicting Subjective Quality of Speech Coders,” IEEE Journal on selected areas in communications, vol. 10, no. 5, pp. 819–829, 1992.[26] Volodya Grancharov and W. Bastiaan Kleijn, “Speech Quality Assessment,” Proceedings of the IEEE pacific Rim Conf. on Communications, Computers and Signal Processing, pp. 125-128. 1993. | ||||
Statistics Article View: 228 PDF Download: 170 |
||||