Advertisement

International Journal of Speech Technology

, Volume 21, Issue 4, pp 953–965 | Cite as

Efficient SVD speech watermarking with encrypted images

  • Safaa El-Gazar
  • Alaa M. Abbas
  • Sami El-Dolil
  • Ibrahim M. El-Dokany
  • Moawad I. Dessouky
  • El-Sayed M. El-Rabaie
  • Fathi E. Abd El-Samie
Article
  • 29 Downloads

Abstract

This paper presents a new approach for speech signal watermarking using encrypted watermarks. The objective of this approach is to increase the degree of security of speech watermarking. In the proposed framework, watermark embedding is implemented with singular value decomposition due to its robustness to attacks. Moreover, two encryption schemes are tested for watermark image encryption; chaotic encryption due to its permutation nature and data encryption standard (DES) due to its diffusion nature. Overall and block-by-block watermarking scenarios are tested and compared for speech signal watermarking. Different modes of operation of the DES are investigated for watermark image encryption. These modes are the electronic code book, cipher block chaining, cipher feedback, and output feedback (OFB) modes. Simulation results reveal that the DES with OFB mode and the chaotic Baker map encryption make the system less sensitive to attacks with good quality of extracted watermarks.

Keywords

Speech watermarking Speech encryption Modes of operation 

References

  1. Abd El-Samie, F. E. (2009). An efficient singular value decomposition algorithm for digital speech watermarking. International Journal of Speech Technology, 12(1), 27–45.  https://doi.org/10.1186/s13636-014-0037-2.CrossRefGoogle Scholar
  2. Abd El-Samie, F. E., Shafik, A., El-sayed, H. S., Elhalafawy, S. M., Diab, S. M., Sallam, B. M., & Faragallah, O. S. (2015). Sensitivity of automatic speaker identification to SVD digital audio watermarking. International Journal of Speech Technology, 18(4), 565–581.CrossRefGoogle Scholar
  3. Arnold, M. (2000). Audio watermarking: Features, applications and algorithms. In Proceeding of the IEEE international conference on multimedia and expo.Google Scholar
  4. Bhat, V., Sengupta, I., & Das, A. (2010). An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digital Signal Processing, 20(6), 1547–1558.CrossRefGoogle Scholar
  5. Chang, C.-C., Hu, Y.-S., & Lin, C.-C. (2007). A digital watermarking scheme based on singular value decomposition. Berlin: Springer.CrossRefzbMATHGoogle Scholar
  6. Cheng, Q., Sorenson, J. (2001). Spread spectrum signaling for speech watermarking. In Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP) (Vol. 3, pp. 1337–1340).Google Scholar
  7. Chouinard, J.-Y. (2002). Design of secure computer system CSI4138/CEG4394. Notes on the data encryption standard (DES), uottawa.ca.Google Scholar
  8. Cvejic, N., & Seppanen, T. (Eds.). (2007). Digital audio watermarking techniques and technologies. Applications and benchmarks. Hershey: IGI Global.  https://doi.org/10.4018/978-1-59904-513-9.Google Scholar
  9. Dhar, P. K., & Shimamura, T. (2013). Audio watermarking in transform domain based on singular value decomposition and Cartesian-polar transformation. International Journal of Speech Technology, 17(2), 133–144.CrossRefGoogle Scholar
  10. Dhar, P. K., & Shimamura, T. (2015). Blind SVD-based audio watermarking using entropy and log-polar transformation. Journal of Information Security and Applications, 20, 74–83.CrossRefGoogle Scholar
  11. Driedger, J. (2011). Time-scale modication algorithms for music audio signals. Master’s thesis, Saarland University.Google Scholar
  12. Fridrich, J. (1997). Image encryption based on chaotic maps. In Proceedings of the IEEE international conference on systems, man, and cybernetics (Vol. 2, pp. 1105–1110).Google Scholar
  13. Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos, 8(6), 1259–1284.MathSciNetCrossRefzbMATHGoogle Scholar
  14. Gaur, G., & Meena, R. S. (2012). Secure transmission of biometric scan images using data encryption standards (DES) algorithm. Rosemead: Scientific & Academic Publishing.CrossRefGoogle Scholar
  15. Girin, L., Marchand, S. (2004). Watermarking of speech signals using the sinusoidal model and frequency modulation of the partials. In Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP) (Vol. 1, pp. 633–636).Google Scholar
  16. Khaldi, K., & Boudraa, A. O. (2013). Audio watermarking via EMD. IEEE Transaction on Audio, Speech and Language Processing, 21(3), 675–680.  https://doi.org/10.1109/TASL.2012.2227733.CrossRefGoogle Scholar
  17. Kwok, H. S., & Tang, W. K. S. (2007). A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons & Fractals, 32(4), 1518–1529.MathSciNetCrossRefzbMATHGoogle Scholar
  18. Lei, B. Y., Soon, I. Y., & Li, Z. (2011). Blind and robust audio watermarking scheme based on SVD–DCT. Signal Processing, 91(8), 1973–1984.CrossRefzbMATHGoogle Scholar
  19. Megías, D., Serra-ruiz, J., & Fallahpour, M. (2010). Efficient self synchronized blind audio watermarking system based on time domain and FF amplitude modification. Signal Processing, 90(12), 3078–3092.  https://doi.org/10.1016/j.sigpro.2010.05.012.CrossRefzbMATHGoogle Scholar
  20. Mohammad, A. A., Alhaj, A., & Shaltaf, S. (2008). An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Processing, 88(9), 2158–2180.CrossRefzbMATHGoogle Scholar
  21. Nematollahi, M. A., & Al-Haddad, S. A. R. (2013). An overview of digital speech watermarking. International Journal of Speech Technology, 78, 1–18.Google Scholar
  22. Ninness, B., & Henriksen, S. J. (2008). Time-scale modification of speech signals. IEEE Transactions on Signal Processing, 56(4), 1479–1488.MathSciNetCrossRefzbMATHGoogle Scholar
  23. Al-Nuaimy, W. A., EL-Bendary, M. A. M., Shafik, A., et al. (2011). An SVD audio watermarking approach using chaotic encrypted images. Digital Signal Processing, 21(6), 764–779.  https://doi.org/10.1016/j.dsp.2011.01.013.CrossRefGoogle Scholar
  24. Park, C.-M., Thapa, D., & Wang, G.-N. (2007). Speech authentication system using digital watermarking and pattern recovery. Pattern Recognition Letters, 28(8), 931–938.CrossRefGoogle Scholar
  25. Rangding, W., Dawen, X., Jiner, C., & Chengtou, D. (2004). Digital audio watermarking algorithm based on linear predictive coding in wavelet domain. In Proceedings of the 7th IEEE international conference on signal processing (ICSP’04) (Vol. 1, pp. 2393–2396).  https://doi.org/10.1109/ICOSP.2004.1442262.
  26. Shterev, I. D. (2007). Quantization-based watermarking: Methods for amplitude scale estimation security and linear filtering invariance. Delf: Delft University of Technology.Google Scholar
  27. Wang, B., Xie, Y., Zhou, C., Zhou, S., & Zheng, X. (2016). Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps. Optik-International Journal for Light and Electron Optics, 127(7), 3541–3545.CrossRefGoogle Scholar
  28. Zeng, G., Qiu, Z. (2008). Audio watermarking in DCT: Embedding strategy and algorithm. In Proceedings of the 11th IEEE international conference on signal processing (ICSP’08) (Vol. 1, pp. 2193–2196).  https://doi.org/10.1109/ICOSP.2008.4697583.

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Safaa El-Gazar
    • 1
  • Alaa M. Abbas
    • 1
    • 2
  • Sami El-Dolil
    • 1
  • Ibrahim M. El-Dokany
    • 1
  • Moawad I. Dessouky
    • 1
  • El-Sayed M. El-Rabaie
    • 1
  • Fathi E. Abd El-Samie
    • 1
  1. 1.Department of Electronics and Electrical Communications, Faculty of Electronic EngineeringMenoufia UniversityMenoufEgypt
  2. 2.Taif University, College of Engineering, Electrical Engineering DepartmentTaifKingdom of Saudi Arabia

Personalised recommendations