Abstract
Data piracy has become a great concern in today’s multimedia applications since digital data can be reproduced without any quality loss. Digital watermarking is one technique that can be used against piracy. In this paper, we propose an idea of using raw speech data as a watermark signal to enhance the robustness of the watermark. To recover the information in the watermark, the extracted watermark will be played back as speech to a listener, and through the intelligent audio perception of the human listener, the contents of the speech may be recognized. Our approach is based on the fact that raw speech contains a considerable amount of redundancy, therefore, its contents can still be recognized after the extraction process, even if the watermarked data is badly attacked. As long as the raw speech, extracted from the attacked watermarked data, contains enough important information, its contents can be intelligible. Furthermore, the impressive intelligence of the human perceptual system, as it tends to adjust and learn quickly to determine the repeated speech, enhances the probability of recognizing the contents of the extracted raw speech. A set of experiments was carried out to show that the proposed method not only successfully survives the common attacks, but also yields high intelligibility.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35413-2_36
Chapter PDF
Similar content being viewed by others
Key words
References
S. Sakaguchi, T. Arai and Y. Murahara, “The effect of polarity inversion of speech on human perception and data hiding as an application”, Proceedings IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 2, pp. 917–920, 2000.
M. D. Swanson, B. Zhu and A. H. Tewfik, “Data hiding for video-in-video”, Proceedings International Conference on Image Processing, Vol. 2, pp. 676–679, 1997.
D. Mukherjee, J. J. Chae, S. K. Mitra and B. S. Manjunath, “A source and channel-coding framework for vector-based data hiding in video’; IEEE Transactions on Circuits and Systems for Video Technology, Vol. 10, No. 4, June 2000.
G. B. Rhoads, “Indentification/authentication coding method and apparatus”, Rep. WIPO WO 95/14289, World Intellectual Property Organization, 1995.
R.G. Van Schyndel, A. Z. Tirkel and C. F. Osborne, “A digital watermark’; International Conference on Image Processing, Vol. 2, pp. 86–90, 1994.
W. Bender, D. Gruhl and N. Morimoto, “Techniques for data hiding’; Proceedings SPIE, Vol. 2420, pp. 40, February 1995.
M. Kutter, F. Jordan and F. Bossen, “Digital Signature of color images using amplitude modulation’; Journal of Electronic Imaging, Vol. 7, pp. 326–332, 1998.
M. George, J. Y. Chouinard and N. Georganas, “Digital watermarking of images and video using direct sequence spread spectrum techniques’; Proceedings IEEE Canadian Conference on Electrical and Computer Engineer, Shaw Conference Center, Edmonton, Alberta, Canada, May 1999.
F. Hartung and M. Kutter, “Multimedia watermarking techniques”, Proceedings of IEEE, Vol. 87, No. 7, pp. 1079–1107, July 1999.
T. S. Rappaport, “Wireless communications principles and practice’; Prentice Hall, 1996.
J. Bellamy, “Digital telephony’; John Wiley & Sons, pp. 123–130, 1991.
S. Haykin, “Communication systems’; John Willy & Sons, INC, 1994.
J. Flanagan, M. Schroeder, B. Atal, R. Crochiere, N. Jayant and J. Tribolet, “Speech coding”, IEEE Transactions Communications, pp. 710–737, April 1979.
M. H. Segal, “Speech intelligibility in the space shuttle mid-deck noise Environment: The Effect of Active Noise Reduction Technology’; http://ergo.human.cornell.edu/ November 1999.
H. K. Dunn and S. D. White, “Statistical measurements on conversational speech’; Journal of Acoustic Society of America, pp. 278–288, January 1940.
CityU Image Processing Lab, http://www.image.cityu.edu.hk/imagedb/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Nintanavongsa, P., Amornraksa, T. (2001). Using Raw Speech as a Watermark, Does it Work?. In: Steinmetz, R., Dittman, J., Steinebach, M. (eds) Communications and Multimedia Security Issues of the New Century. IFIP — The International Federation for Information Processing, vol 64. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35413-2_21
Download citation
DOI: https://doi.org/10.1007/978-0-387-35413-2_21
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-4811-6
Online ISBN: 978-0-387-35413-2
eBook Packages: Springer Book Archive