Efficient audio integrity verification algorithm using discrete cosine transform

Thumbnail Image

Date

2016-03

Journal Title

Journal ISSN

Volume Title

Type

Article

Publisher

SPRINGER

Series Info

INTERNATIONAL JOURNAL OF SPEECH TECHNOLOGY;Volume: 19 Issue: 1 Pages: 1-8

Scientific Journal Rankings

Abstract

Audio recordings have been used as evidence for long times. Multimedia processing advancement makes it difficult to be completely sure about what is heard is the truth. This paper presents a promising approach for integrity verification of recorded audio signals using discrete cosine transform. This approach is based on self embedding concept which embeds block-based marks extracted from the same audio signal after being transformed into 2-D format into other blocks according to a specific algorithm. After the self-embedding process, the data is converted back into 1-D style which represents a marked audio signal. The 1-D audio signal is converted into a 2-D format and then converted back into a 1-D format using the popular lexicographic ordering scheme utilized in image processing. Reverse processes are executed to extract the verification marks from the audio signal throughout the integrity verification process. Based on the extracted audio signal properties, the integrity of the marked audio signal is evaluated. Different audio processing tasks and attacks are implemented to examine the suitability of the proposed algorithm for verifying the integrity of high-confidentiality recorded audio data. The results show that the efficient ability of the proposed approach to verify integrity and detect attacks.

Description

Accession Number: WOS:000377290700001

Keywords

University for QUALITY, WATERMARKING, DCT, Digital Watermarking, Integrity

Citation

DISCRETE COSINE TRANSFORM By: AHMED, N; NATARAJAN, T; RAO, KR IEEE TRANSACTIONS ON COMPUTERS Volume: C 23 Issue: 1 Pages: 90-93 Published: 1974 Times Cited: 1,796 2. Title: [not available] By: ALHAJ A P 1 INT C NETW DIG T Pages: 398 Published: 2009 Times Cited: 1 3. Robust audio watermarking in the time domain By: Bassia, P; Pitas, I; Nikolaidis, N IEEE TRANSACTIONS ON MULTIMEDIA Volume: 3 Issue: 2 Pages: 232-241 Published: JUN 2001 Times Cited: 260 4. A novel spread spectrum digital audio watermarking technique By: Can, Y.S.; Alagoz, F.; Burus, M.E. Journal of Advances in Computer Networks Volume: 2 Issue: 1 Pages: 6-9 Published: March 2014 Times Cited: 4 5. Semi-fragile watermarking for image authentication, localization, and recovery using Tchebi-chef moments By: Chang, W. H.; Chang, L. W. INT S IEEE COMM INF Published: 2010 Times Cited: 1 6. Content-fragile watermarking for image authentication By: Dittmann, J. P SPIE Volume: 4314 Published: 2001 Times Cited: 1 7. Content-based digital signature for motion pictures authentication and content-fragile watermarking By: Dittmann, J.; Steinmetz, A.; Steinmetz, R. INT C MULT COMP SYST Published: 1999 Times Cited: 1 8. Title: [not available] By: GOMEZ E INT TEL S ITS2002 NA Published: 2002 Times Cited: 7 9. Title: [not available] By: Khayam, S. A. The discrete cosine transform (DCT): theory and application Published: 2003 Publisher: Michigan State University Times Cited: 83 10. Title: [not available] By: KUBICHEK R P IEEE PAC RIM C COM Pages: 125 Published: 1993 Times Cited: 8 11. One-dimensional neighborhood forming strategy for fragile watermarking By: Li, CT; Yang, FM JOURNAL OF ELECTRONIC IMAGING Volume: 12 Issue: 2 Pages: 284-291 Published: APR 2003 Times Cited: 24 12. Fragile speech watermarking scheme with recovering speech contents By: Liu, C.; Chen, O. 2004 47 MIDW S CIRC Volume: 2 Pages: II-165-II-168 Published: 2004 Times Cited: 1 13. Multipurpose audio watermarking By: Lu, C.; Liao, H.; Chen, L. P 15 INT C PATT REC Volume: 3 Pages: 282-285 Published: 2000 Times Cited: 1 14. Image contents verification algorithm using transform domain techniques By: Nassar, S. S.; Ayad, N. M.; Kollash, H. M.; et al. International Journal of Computer Applications Volume: 97 Issue: 9 Published: 2014 M. 0975-8887 [Show additional data] Times Cited: 1 15. Title: [not available] By: Petrovic, R. Digital watermarks for audio integrity verification Published: 2005 Times Cited: 1 16. A Study on Watermarking Schemes for Image Authentication By: Radharani, S.; Valarmathi, M. L. International Journal of Computer Applications Volume: 2 Issue: 4 Pages: 24-32 Published: 2010 2010 URL: https://doi.org/10.5120/658-925 Times Cited: 17 17. Digital document integrity By: Shaw, G. 8 ACM MULT C LOS ANG Published: 2000 Times Cited: 1 18. Title: [not available] By: Shiva Kumar, K. B.; Raja, K. B.; Chhotaray, R. K.; et al. Coherent Steganography using Segmentation and DCT Published: 2010 Publisher: IEEE [Show additional data] Times Cited: 1 19. Title: [not available] By: SHOEMAKER C HIDDEN BITS SURVEY T Published: 2002 Times Cited: 15 20. Digital watermarking By: Tewfik, A. H. San Mercury News Published: 2000 Times Cited: 1 21. AN OBJECTIVE-MEASURE FOR PREDICTING SUBJECTIVE QUALITY OF SPEECH CODERS By: WANG, SH; SEKEY, A; GERSHO, A IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS Volume: 10 Issue: 5 Pages: 819-829 Published: JUN 1992 Times Cited: 154 22. Fragile speech watermarking for content integrity verification By: Wu, C.; Jay Kuo, C.-C. IEEE INT S CIRC SYST Volume: 2 Pages: II-436-II-439 Published: 2002 Times Cited: 1 23. Speech content integrity verification integrated with ITU G.723.1 speech coding By: Wu, CP; Kuo, CCJ INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, PROCEEDINGS Pages: 680-684 Published: 2001 Times Cited: 13 24. Title: [not available] By: YANG WH ACOUST SPEECH SIG PR Pages: 541 Published: 1998 Times Cited: 16 25. Robust and transparent audio watermarking based on improved spread spectrum and psychoacoustic masking By: Zhang, P.; Xu, S.; Yang, H. P IEEE INT C INF SCI Pages: 640-643 Published: 2012