Abstract
To solve the problem of unauthorized modification in speech signals, this paper proposes a novel speech-tampering-detection scheme by using the semi-fragile watermarking based on the singular-spectrum analysis (SSA). The SSA is used to analyze the speech signals of which the singular spectra are extracted. The watermark (e.g., signature in-formation) is embedded into those signals by modifying some parts of the singular spectra according to the watermark bit. By comparing the extracted watermark with the original one, the tampered segments of the speech signals are identified and located. The evaluation results show that the proposed scheme is fragile to several malicious attacks but robust against other signal-processing operations. It also satisfies the inaudibility criteria. The proposed scheme not only can locate the tampered locations, but it also can make a prediction about the tampering types and the tampering strength.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Toda, T., Black, A. W., Tokuda, K.: Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory. IEEE Transactions on Audio, Speech, and Language Processing, 15(8), 2222-2235. (2007)
STRAIGHT, http://www.wakayama-u.ac.jp/kawahara/STRAIGHTadv/index_e.html [Accessed 11 June 2016]
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography. Morgan Kaufmann. (2007)
Unoki, M., Miyauchi, R.: Detection of tampering in speech signals with inaudible watermarking technique. In IIHMSP, pp. 118–121. (2012)
Cvejic, N. (ed.): Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks: Applications and Benchmarks. IGI Global. (2007)
Wu, C. P., Kuo, C. C.: Fragile speech watermarking for content integrity verification. In ISCAS, pp. 436–439. (2002)
Yan, B., Lu, Z. M., Sun, S. H., Pan, J. S. (2005, September). Speech authentication by semi-fragile watermarking. In KES, pp. 497–504. (2005)
Wang, S., Unoki, M., Kim, N. S.: Formant enhancement based speech watermarking for tampering detection. In INTERSPEECH, pp. 1366–1370. (2014)
Wang, S., Miyauchi, R., Unoki, M., Kim, N. S.: Tampering detection scheme for speech signals using formant enhancement based watermarking. J. Inform. Hiding Multimed. Sign. Process, 6, 1264-1283. (2015)
Karnjana, J., Unoki, M., Aimmanee, P., Wutiwiwatchai, C.: An Audio Watermarking Scheme Based on Singular-Spectrum Analysis. LNCS, 9023, 145–159. (2014)
Karnjana, J., Aimmanee, P., Unoki, M., Wutiwiwatchai, C.: An audio watermarking scheme based on automatic parameterized singular-spectrum analysis using differential evolution. In APSIPA, pp. 543–551. (2015)
Golyandina, N., Nekrutkin, V., Zhigljavsky, A.: Analysis of Time Series Structure: SSA and related techniques. Chapman and Hall/CRC, United States (2001)
Takeda, K., Sagisaka, Y., Katagiri, S., Abe, M., Kuwabara, H.: Speech database users manual. ATR Interpreting Telephony Research Laboratories, TR-I-0028. (1988)
Bassia, P., Pitas, I.: Robust audio watermarking in the time domain. In EUSIPCO, pp. 25–28. (1998)
ITU Recommendation P.862: Perceptual evaluation of speech quality, http://www.itu.int/rec/T-REC-P.862/en [Accessed 11 June 2016]
Log-spectral distance (LSD), https://en.wikipedia.org/wiki/Log-spectral_distance [Accessed 11 June 2016]
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Karnjana, J., Unoki, M., Aimmanee, P., Wutiwiwatchai, C. (2017). Tampering Detection in Speech Signals by Semi-Fragile Watermarking Based on Singular-Spectrum Analysis. In: Pan, JS., Tsai, PW., Huang, HC. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, vol 63. Springer, Cham. https://doi.org/10.1007/978-3-319-50209-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-50209-0_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-50208-3
Online ISBN: 978-3-319-50209-0
eBook Packages: EngineeringEngineering (R0)