Abstract
This paper presents a new approach for speech signal watermarking using encrypted watermarks. The objective of this approach is to increase the degree of security of speech watermarking. In the proposed framework, watermark embedding is implemented with singular value decomposition due to its robustness to attacks. Moreover, two encryption schemes are tested for watermark image encryption; chaotic encryption due to its permutation nature and data encryption standard (DES) due to its diffusion nature. Overall and block-by-block watermarking scenarios are tested and compared for speech signal watermarking. Different modes of operation of the DES are investigated for watermark image encryption. These modes are the electronic code book, cipher block chaining, cipher feedback, and output feedback (OFB) modes. Simulation results reveal that the DES with OFB mode and the chaotic Baker map encryption make the system less sensitive to attacks with good quality of extracted watermarks.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
http://en.kioskea.net/contents/134-introduction-to-encryption-with-des, Accessed July 29, 2013 and http://en.wikipedia.org/wiki/Block_cipher_mode_of_operation. Access July 29, 2013.
References
Abd El-Samie, F. E. (2009). An efficient singular value decomposition algorithm for digital speech watermarking. International Journal of Speech Technology, 12(1), 27–45. https://doi.org/10.1186/s13636-014-0037-2.
Abd El-Samie, F. E., Shafik, A., El-sayed, H. S., Elhalafawy, S. M., Diab, S. M., Sallam, B. M., & Faragallah, O. S. (2015). Sensitivity of automatic speaker identification to SVD digital audio watermarking. International Journal of Speech Technology, 18(4), 565–581.
Arnold, M. (2000). Audio watermarking: Features, applications and algorithms. In Proceeding of the IEEE international conference on multimedia and expo.
Bhat, V., Sengupta, I., & Das, A. (2010). An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digital Signal Processing, 20(6), 1547–1558.
Chang, C.-C., Hu, Y.-S., & Lin, C.-C. (2007). A digital watermarking scheme based on singular value decomposition. Berlin: Springer.
Cheng, Q., Sorenson, J. (2001). Spread spectrum signaling for speech watermarking. In Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP) (Vol. 3, pp. 1337–1340).
Chouinard, J.-Y. (2002). Design of secure computer system CSI4138/CEG4394. Notes on the data encryption standard (DES), uottawa.ca.
Cvejic, N., & Seppanen, T. (Eds.). (2007). Digital audio watermarking techniques and technologies. Applications and benchmarks. Hershey: IGI Global. https://doi.org/10.4018/978-1-59904-513-9.
Dhar, P. K., & Shimamura, T. (2013). Audio watermarking in transform domain based on singular value decomposition and Cartesian-polar transformation. International Journal of Speech Technology, 17(2), 133–144.
Dhar, P. K., & Shimamura, T. (2015). Blind SVD-based audio watermarking using entropy and log-polar transformation. Journal of Information Security and Applications, 20, 74–83.
Driedger, J. (2011). Time-scale modication algorithms for music audio signals. Master’s thesis, Saarland University.
Fridrich, J. (1997). Image encryption based on chaotic maps. In Proceedings of the IEEE international conference on systems, man, and cybernetics (Vol. 2, pp. 1105–1110).
Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos, 8(6), 1259–1284.
Gaur, G., & Meena, R. S. (2012). Secure transmission of biometric scan images using data encryption standards (DES) algorithm. Rosemead: Scientific & Academic Publishing.
Girin, L., Marchand, S. (2004). Watermarking of speech signals using the sinusoidal model and frequency modulation of the partials. In Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP) (Vol. 1, pp. 633–636).
Khaldi, K., & Boudraa, A. O. (2013). Audio watermarking via EMD. IEEE Transaction on Audio, Speech and Language Processing, 21(3), 675–680. https://doi.org/10.1109/TASL.2012.2227733.
Kwok, H. S., & Tang, W. K. S. (2007). A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons & Fractals, 32(4), 1518–1529.
Lei, B. Y., Soon, I. Y., & Li, Z. (2011). Blind and robust audio watermarking scheme based on SVD–DCT. Signal Processing, 91(8), 1973–1984.
Megías, D., Serra-ruiz, J., & Fallahpour, M. (2010). Efficient self synchronized blind audio watermarking system based on time domain and FF amplitude modification. Signal Processing, 90(12), 3078–3092. https://doi.org/10.1016/j.sigpro.2010.05.012.
Mohammad, A. A., Alhaj, A., & Shaltaf, S. (2008). An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Processing, 88(9), 2158–2180.
Nematollahi, M. A., & Al-Haddad, S. A. R. (2013). An overview of digital speech watermarking. International Journal of Speech Technology, 78, 1–18.
Ninness, B., & Henriksen, S. J. (2008). Time-scale modification of speech signals. IEEE Transactions on Signal Processing, 56(4), 1479–1488.
Al-Nuaimy, W. A., EL-Bendary, M. A. M., Shafik, A., et al. (2011). An SVD audio watermarking approach using chaotic encrypted images. Digital Signal Processing, 21(6), 764–779. https://doi.org/10.1016/j.dsp.2011.01.013.
Park, C.-M., Thapa, D., & Wang, G.-N. (2007). Speech authentication system using digital watermarking and pattern recovery. Pattern Recognition Letters, 28(8), 931–938.
Rangding, W., Dawen, X., Jiner, C., & Chengtou, D. (2004). Digital audio watermarking algorithm based on linear predictive coding in wavelet domain. In Proceedings of the 7th IEEE international conference on signal processing (ICSP’04) (Vol. 1, pp. 2393–2396). https://doi.org/10.1109/ICOSP.2004.1442262.
Shterev, I. D. (2007). Quantization-based watermarking: Methods for amplitude scale estimation security and linear filtering invariance. Delf: Delft University of Technology.
Wang, B., Xie, Y., Zhou, C., Zhou, S., & Zheng, X. (2016). Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps. Optik-International Journal for Light and Electron Optics, 127(7), 3541–3545.
Zeng, G., Qiu, Z. (2008). Audio watermarking in DCT: Embedding strategy and algorithm. In Proceedings of the 11th IEEE international conference on signal processing (ICSP’08) (Vol. 1, pp. 2193–2196). https://doi.org/10.1109/ICOSP.2008.4697583.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
El-Gazar, S., Abbas, A.M., El-Dolil, S. et al. Efficient SVD speech watermarking with encrypted images. Int J Speech Technol 21, 953–965 (2018). https://doi.org/10.1007/s10772-018-9531-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10772-018-9531-8