Tampering Detection in Speech Signals by Semi-Fragile Watermarking Based on Singular-Spectrum Analysis

  • Jessada KarnjanaEmail author
  • Masashi Unoki
  • Pakinee Aimmanee
  • Chai Wutiwiwatchai
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 63)


To solve the problem of unauthorized modification in speech signals, this paper proposes a novel speech-tampering-detection scheme by using the semi-fragile watermarking based on the singular-spectrum analysis (SSA). The SSA is used to analyze the speech signals of which the singular spectra are extracted. The watermark (e.g., signature in-formation) is embedded into those signals by modifying some parts of the singular spectra according to the watermark bit. By comparing the extracted watermark with the original one, the tampered segments of the speech signals are identified and located. The evaluation results show that the proposed scheme is fragile to several malicious attacks but robust against other signal-processing operations. It also satisfies the inaudibility criteria. The proposed scheme not only can locate the tampered locations, but it also can make a prediction about the tampering types and the tampering strength.


singular-spectrum analysis singular values speech-tampering detection semi-fragile watermarking inaudible watermarking 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Toda, T., Black, A. W., Tokuda, K.: Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory. IEEE Transactions on Audio, Speech, and Language Processing, 15(8), 2222-2235. (2007)Google Scholar
  2. 2.
  3. 3.
    Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography. Morgan Kaufmann. (2007)Google Scholar
  4. 4.
    Unoki, M., Miyauchi, R.: Detection of tampering in speech signals with inaudible watermarking technique. In IIHMSP, pp. 118–121. (2012)Google Scholar
  5. 5.
    Cvejic, N. (ed.): Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks: Applications and Benchmarks. IGI Global. (2007)Google Scholar
  6. 6.
    Wu, C. P., Kuo, C. C.: Fragile speech watermarking for content integrity verification. In ISCAS, pp. 436–439. (2002)Google Scholar
  7. 7.
    Yan, B., Lu, Z. M., Sun, S. H., Pan, J. S. (2005, September). Speech authentication by semi-fragile watermarking. In KES, pp. 497–504. (2005)Google Scholar
  8. 8.
    Wang, S., Unoki, M., Kim, N. S.: Formant enhancement based speech watermarking for tampering detection. In INTERSPEECH, pp. 1366–1370. (2014)Google Scholar
  9. 9.
    Wang, S., Miyauchi, R., Unoki, M., Kim, N. S.: Tampering detection scheme for speech signals using formant enhancement based watermarking. J. Inform. Hiding Multimed. Sign. Process, 6, 1264-1283. (2015)Google Scholar
  10. 10.
    Karnjana, J., Unoki, M., Aimmanee, P., Wutiwiwatchai, C.: An Audio Watermarking Scheme Based on Singular-Spectrum Analysis. LNCS, 9023, 145–159. (2014)Google Scholar
  11. 11.
    Karnjana, J., Aimmanee, P., Unoki, M., Wutiwiwatchai, C.: An audio watermarking scheme based on automatic parameterized singular-spectrum analysis using differential evolution. In APSIPA, pp. 543–551. (2015)Google Scholar
  12. 12.
    Golyandina, N., Nekrutkin, V., Zhigljavsky, A.: Analysis of Time Series Structure: SSA and related techniques. Chapman and Hall/CRC, United States (2001)Google Scholar
  13. 13.
    Takeda, K., Sagisaka, Y., Katagiri, S., Abe, M., Kuwabara, H.: Speech database users manual. ATR Interpreting Telephony Research Laboratories, TR-I-0028. (1988)Google Scholar
  14. 14.
    Bassia, P., Pitas, I.: Robust audio watermarking in the time domain. In EUSIPCO, pp. 25–28. (1998)Google Scholar
  15. 15.
    ITU Recommendation P.862: Perceptual evaluation of speech quality, [Accessed 11 June 2016]
  16. 16.
    Log-spectral distance (LSD), [Accessed 11 June 2016]

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Jessada Karnjana
    • 1
    • 2
    Email author
  • Masashi Unoki
    • 1
  • Pakinee Aimmanee
    • 2
  • Chai Wutiwiwatchai
    • 3
  1. 1.School of Information ScienceJapan Advanced Institute of Science and TechnologyNomi, IshikawaJapan
  2. 2.Sirindhorn International Institute of TechnologyThammasat UniversityMuangThailand
  3. 3.National Electronics and Computer Technology CenterKhlong LuangThailand

Personalised recommendations