Skip to main content
Log in

Secured Speech Watermarking with DCT Compression and Chaotic Embedding Using DWT and SVD

  • Research Article-Computer Engineering and Computer Science
  • Published:
Arabian Journal for Science and Engineering Aims and scope Submit manuscript

Abstract

In this paper, a secured watermarking algorithm based on chaotic embedding of speech signal in discrete wavelet transform (DWT) domain of cover audio is proposed. The speech signal to be embedded is compressed using discrete cosine transform (DCT) by finding the suitable number of DCT coefficients such that the perceptual quality of decompressed signal is preserved. The chaotic map is used to select the cover audio frames randomly instead of performing sequential embedding. The cover audio is decomposed using DWT followed by singular value decomposition (SVD), and the DCT coefficients of the speech signal are embedded in the singular matrix of the cover audio. The proposed watermarking algorithm achieves good imperceptibility with an average SNR and ODG of 46 dB and \(-1.07\), respectively. The proposed algorithm can resist to various signal processing attacks such as noise addition, low-pass filtering, requantization, resampling, amplitude scaling, and MP3 compression. Experimental results show that the secret speech is reconstructed with an average perceptual evaluation of speech quality (PESQ) score of 4.26 under no attack condition, and above 3.0 under various signal processing attacks. Further, the correlation between original and reconstructed secret speech signal is close to unity. In addition, the loss in the generality of the information of the reconstructed speech signal is tested and is found minimum even the watermarked audio is subjected to various signal processing attacks. The proposed algorithm is also tested for false positive test to ensure the security of watermarking algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Sathiyamurthi, P.; Ramakrishnan, S.: Speech encryption using chaotic shift keying for secured speech communication. EURASIP J. Audio Speech Music Process. 1, 20 (2017). https://doi.org/10.1186/s13636-017-0118-0

    Article  Google Scholar 

  2. Lakshmi, C.; Ravi, V.M.; Thenmozhi, K.; Rayappan, J.B.B.; Amirtharajan, R.: Con (dif) fused voice to convey secret: a dual-domain approach. Multimed. Syst. 26, 1–11 (2020)

    Article  Google Scholar 

  3. Ehdaie, M.; Eghlidos, T.; Aref, M.R.: A novel secret sharing scheme from audio perspective. In: 2008 International Symposium on Telecommunications, IEEE, pp. 13–18 (2008)

  4. Wang, J.Z.; Wu, T.X.; Sun, T.Y.: An audio secret sharing system based on fractal encoding. In: 2015 International Carnahan Conference on Security Technology (ICCST), IEEE, pp. 211–216 (2015)

  5. Bharti, S.S.; Gupta, M.; Agarwal, S.: A novel approach for verifiable \((n, n)\) audio secret sharing scheme. Multimed. Tools Appl. 77(19), 25629–25657 (2018). https://doi.org/10.1007/s11042-018-5810-2

    Article  Google Scholar 

  6. Djebbar, F.; Ayad, B.; Meraim, K.A.; Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 1, 25 (2012)

    Article  Google Scholar 

  7. Hua, G.; Huang, J.; Shi, Y.Q.; Goh, J.; Thing, V.L.: Twenty years of digital audio watermarking—a comprehensive review. Signal Process. 128, 222–242 (2016)

    Article  Google Scholar 

  8. Mishra, S.; Yadav, V.K.; Trivedi, M.C.; Shrimali, T.: Audio steganography techniques: a survey. In: Advances in Computer and Computational Sciences, pp. 581–589. Springer, Berlin (2018)

  9. Xu, T.; Yang, Z.; Shao, X.: Novel speech secure communication system based on information hiding and compressed sensing. In: 2009 Fourth International Conference on Systems and Networks Communications, IEEE, pp. 201–206 (2009). https://doi.org/10.1109/ICSNC.2009.71

  10. Shahadi, H.I.; Jidin, R.; Way, W.H.: Lossless audio steganography based on lifting wavelet transform and dynamic stego key. Indian J. Sci. Technol. 7(3), 323 (2014)

    Article  Google Scholar 

  11. Ballesteros, L.D.M.; Moreno, A.J.M.: Highly transparent steganography model of speech signals using efficient wavelet masking. Expert Syst. Appl. 39(10), 9141–9149 (2012). https://doi.org/10.1016/j.eswa.2012.02.066

    Article  Google Scholar 

  12. Ali, A.H.; George, L.E.; Zaidan, A.; Mokhtar, M.R.: High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed. Tools Appl. 77(23), 31487–31516 (2018). https://doi.org/10.1007/s11042-018-6213-0

    Article  Google Scholar 

  13. Ballesteros, D.M.; Renza, D.: Secure speech content based on scrambling and adaptive hiding. Symmetry 10(12), 694 (2018). https://doi.org/10.3390/sym10120694

    Article  Google Scholar 

  14. Bharti, S.S.; Gupta, M.; Agarwal, S.: A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately. Multimed. Tools Appl. 78(16), 23179–23201 (2019). https://doi.org/10.1007/s11042-019-7630-4

    Article  Google Scholar 

  15. Alsabhany, A.A.; Ridzuan, F.; Azni, A.H.: The adaptive multi-level phase coding method in audio steganography. IEEE Access 7, 129291–129306 (2019)

    Article  Google Scholar 

  16. Ali, A.H.; George, L.E.; Mokhtar, M.R.: An adaptive high capacity model for secure audio communication based on fractal coding and uniform coefficient modulation. Circuits Syst. Signal Process. 39, 1–28 (2020). https://doi.org/10.1007/s00034-020-01409-7

    Article  Google Scholar 

  17. Kasetty, P.K.; Kanhe, A.: Covert speech communication through audio steganography using DWT and SVD. In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, pp. 1–5 (2020). https://doi.org/10.1109/ICCCNT49239.2020.9225399

  18. Hassan, T.A.; Al-Hashemy, R.H.; Ajel, R.I.: Speech signal compression algorithm based on the JPEG technique. J. Intell. Syst. 29(1), 554–564 (2020). https://doi.org/10.1515/jisys-2018-0127

    Article  Google Scholar 

  19. ITU-T R: Perceptual evaluation of speech quality (PESQ): an objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs. Rec ITU-T P 862 (2001)

  20. Al-Azawi, M.K.M.; Gaze, A.M.: Combined speech compression and encryption using chaotic compressive sensing with large key size. IET Signal Process. 12(2), 214–218 (2017). https://doi.org/10.1049/iet-spr.2016.0708

    Article  Google Scholar 

  21. Weisstein, E.W.: Logistic Map from MathWorld—A Wolfram Web Resource. https://mathworld.wolfram.com/LogisticMap.html. Accessed Feb 2021 (2021)

  22. Peng, J.; Jiang, Y.; Tang, S.; Meziane, F.: Security of streaming media communications with logistic map and self-adaptive detection-based steganography. IEEE Trans. Depend. Secure Comput. (2019). https://doi.org/10.1109/tdsc.2019.2946138

  23. Burrus, C.; Gopinath, R.; Guo, H.: Introduction to Wavelets and Wavelet Transforms—A Primer. Prentice-Hall, New Jersey (1998)

    Google Scholar 

  24. Chen, S.T.; Huang, H.N.: Optimization-based audio watermarking with integrated quantization embedding. Multimed. Tools Appl. 75, 4735–4751 (2016). https://doi.org/10.1016/0003-4916(63)90068-X

    Article  Google Scholar 

  25. Kaur, A.; Dutta, M.K.: An optimized high payload audio watermarking algorithm based on LU-factorization. Multimed. Syst. 24(3), 341–353 (2018). https://doi.org/10.1007/s00530-017-0545-x

    Article  Google Scholar 

  26. Kanhe, A.; Gnanasekaran, A.: A QIM-based energy modulation scheme for audio watermarking robust to synchronization attack. Arab. J. Sci. Eng. 44(4), 3415–3423 (2019). https://doi.org/10.1007/s13369-018-3540-4

    Article  Google Scholar 

  27. Hwang, M.; Lee, J.; Lee, M.; Kang, H.: SVD-based adaptive QIM watermarking on stereo audio signals. IEEE Trans. Multimed. 20(1), 45–54 (2018). https://doi.org/10.1109/TMM.2017.2721642

    Article  Google Scholar 

  28. VoiceAge: Unified speech and audio database (USAC). http://www.voiceage.com/Audio-Samples-AMR-WB.html. Accessed Apr 2020 (2020)

  29. Hu, Y.; Loizou, P.C.: Subjective comparison and evaluation of speech enhancement algorithms. Speech Commun. 49(7), 588–601 (2007). https://doi.org/10.1016/j.specom.2006.12.006

    Article  Google Scholar 

  30. Azure, M.: Microsoft\(^{\text{TM}}\) Azure Speech Services API. https://azure.microsoft.com/en-in/services/cognitive-services/speech-to-text. Accessed Feb 2021 (2021)

  31. Katzenbeisser, S.; Petitcolas, F.A.: Information Hiding Techniques for Steganography and Digital Watermarking, 1st edn Artech House, Inc., Norwood (2000)

    Google Scholar 

  32. Kabal, P., et al.: An examination and interpretation of ITU-R BS. 1387: perceptual evaluation of audio quality. TSP Lab Technical Report, Department Electrical & Computer Engineering, McGill University, pp. 1–89 (2002)

  33. ITU-R R: Methods for objective measurements of perceived audio quality. ITU-R BS 13871 (2001)

Download references

Author information

Authors and Affiliations

Authors

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, K.P., Kanhe, A. Secured Speech Watermarking with DCT Compression and Chaotic Embedding Using DWT and SVD. Arab J Sci Eng 47, 10003–10024 (2022). https://doi.org/10.1007/s13369-021-06431-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13369-021-06431-8

Keywords

Navigation