Fragile speech watermarking based on exponential scale quantization for tamper detection

A fragile speech watermarking scheme of low complexity is proposed in this research as an effective way to detect malicious content alterations while tolerating content preserving operations. Since no auxiliary data are required, the authentication process is transparent to agents that perform content preserving operations such as transcoding during the transmission process. The proposed scheme is based on the modified odd/even modulation scheme with exponential scale quantization and a localized frequency masking model while assuring no mismatch between quantization steps used in watermark embedding and detection. The noise introduced by watermarking is shown to be smaller than that of speech coders. It is shown by experimental results that the proposed system is able to distinguish malicious alterations from resampling, white noise pollution, G.711 speech coding and G.721 speech coding with very low error probabilities.

[1]  Ioannis Pitas,et al.  Robust audio watermarking in the time domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[2]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[3]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[4]  A. A. Beex,et al.  Encoding a hidden auxiliary channel onto a digital audio signal using psychoacoustic masking , 1997, Proceedings IEEE SOUTHEASTCON '97. 'Engineering the New Century'.

[5]  C.-C. Jay Kuo,et al.  Speech content authentication integrated with CELP speech decoders , 2001, IEEE International Conference on Multimedia and Expo, 2001. ICME 2001..

[6]  Chun-Shien Lu,et al.  Multipurpose audio watermarking , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[7]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[8]  C.-C. Jay Kuo,et al.  Robust and efficient digital audio watermarking using audio content analysis , 2000, Electronic Imaging.

[9]  C.-C. Jay Kuo,et al.  Speech content integrity verification integrated with ITU G.723.1 speech coding , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[10]  David H. Shur,et al.  On combining watermarking with perceptual coding , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[11]  A. Miyazaki,et al.  Wavelet-based watermarking for tamper proofing of still images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[12]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).