Skip to main content

Tampering Detection in Speech Signals by Semi-Fragile Watermarking Based on Singular-Spectrum Analysis

  • Conference paper
  • First Online:

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 63))

Abstract

To solve the problem of unauthorized modification in speech signals, this paper proposes a novel speech-tampering-detection scheme by using the semi-fragile watermarking based on the singular-spectrum analysis (SSA). The SSA is used to analyze the speech signals of which the singular spectra are extracted. The watermark (e.g., signature in-formation) is embedded into those signals by modifying some parts of the singular spectra according to the watermark bit. By comparing the extracted watermark with the original one, the tampered segments of the speech signals are identified and located. The evaluation results show that the proposed scheme is fragile to several malicious attacks but robust against other signal-processing operations. It also satisfies the inaudibility criteria. The proposed scheme not only can locate the tampered locations, but it also can make a prediction about the tampering types and the tampering strength.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Toda, T., Black, A. W., Tokuda, K.: Voice conversion based on maximum-likelihood estimation of spectral parameter trajectory. IEEE Transactions on Audio, Speech, and Language Processing, 15(8), 2222-2235. (2007)

    Google Scholar 

  2. STRAIGHT, http://www.wakayama-u.ac.jp/kawahara/STRAIGHTadv/index_e.html [Accessed 11 June 2016]

  3. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography. Morgan Kaufmann. (2007)

    Google Scholar 

  4. Unoki, M., Miyauchi, R.: Detection of tampering in speech signals with inaudible watermarking technique. In IIHMSP, pp. 118–121. (2012)

    Google Scholar 

  5. Cvejic, N. (ed.): Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks: Applications and Benchmarks. IGI Global. (2007)

    Google Scholar 

  6. Wu, C. P., Kuo, C. C.: Fragile speech watermarking for content integrity verification. In ISCAS, pp. 436–439. (2002)

    Google Scholar 

  7. Yan, B., Lu, Z. M., Sun, S. H., Pan, J. S. (2005, September). Speech authentication by semi-fragile watermarking. In KES, pp. 497–504. (2005)

    Google Scholar 

  8. Wang, S., Unoki, M., Kim, N. S.: Formant enhancement based speech watermarking for tampering detection. In INTERSPEECH, pp. 1366–1370. (2014)

    Google Scholar 

  9. Wang, S., Miyauchi, R., Unoki, M., Kim, N. S.: Tampering detection scheme for speech signals using formant enhancement based watermarking. J. Inform. Hiding Multimed. Sign. Process, 6, 1264-1283. (2015)

    Google Scholar 

  10. Karnjana, J., Unoki, M., Aimmanee, P., Wutiwiwatchai, C.: An Audio Watermarking Scheme Based on Singular-Spectrum Analysis. LNCS, 9023, 145–159. (2014)

    Google Scholar 

  11. Karnjana, J., Aimmanee, P., Unoki, M., Wutiwiwatchai, C.: An audio watermarking scheme based on automatic parameterized singular-spectrum analysis using differential evolution. In APSIPA, pp. 543–551. (2015)

    Google Scholar 

  12. Golyandina, N., Nekrutkin, V., Zhigljavsky, A.: Analysis of Time Series Structure: SSA and related techniques. Chapman and Hall/CRC, United States (2001)

    Google Scholar 

  13. Takeda, K., Sagisaka, Y., Katagiri, S., Abe, M., Kuwabara, H.: Speech database users manual. ATR Interpreting Telephony Research Laboratories, TR-I-0028. (1988)

    Google Scholar 

  14. Bassia, P., Pitas, I.: Robust audio watermarking in the time domain. In EUSIPCO, pp. 25–28. (1998)

    Google Scholar 

  15. ITU Recommendation P.862: Perceptual evaluation of speech quality, http://www.itu.int/rec/T-REC-P.862/en [Accessed 11 June 2016]

  16. Log-spectral distance (LSD), https://en.wikipedia.org/wiki/Log-spectral_distance [Accessed 11 June 2016]

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jessada Karnjana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Karnjana, J., Unoki, M., Aimmanee, P., Wutiwiwatchai, C. (2017). Tampering Detection in Speech Signals by Semi-Fragile Watermarking Based on Singular-Spectrum Analysis. In: Pan, JS., Tsai, PW., Huang, HC. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, vol 63. Springer, Cham. https://doi.org/10.1007/978-3-319-50209-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50209-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50208-3

  • Online ISBN: 978-3-319-50209-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics