Secured Speech Watermarking with DCT Compression and Chaotic Embedding Using DWT and SVD

被引:8
作者
Kumar, Kasetty Praveen [1 ]
Kanhe, Aniruddha [1 ]
机构
[1] Natl Inst Technol Puducherry, Dept Elect & Commun Engn, Karaikal 609609, India
关键词
Chaotic embedding; DCT; DWT; SVD; AUDIO STEGANOGRAPHY;
D O I
10.1007/s13369-021-06431-8
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, a secured watermarking algorithm based on chaotic embedding of speech signal in discrete wavelet transform (DWT) domain of cover audio is proposed. The speech signal to be embedded is compressed using discrete cosine transform (DCT) by finding the suitable number of DCT coefficients such that the perceptual quality of decompressed signal is preserved. The chaoticmapis used to select the cover audio frames randomly instead of performing sequential embedding. The cover audio is decomposed usingDWTfollowed by singular value decomposition (SVD), and theDCT coefficients of the speech signal are embedded in the singular matrix of the cover audio. The proposedwatermarking algorithm achieves good imperceptibility with an average SNR and ODG of 46 dB and -1.07, respectively. The proposed algorithm can resist to various signal processing attacks such as noise addition, low-pass filtering, requantization, resampling, amplitude scaling, and MP3 compression. Experimental results show that the secret speech is reconstructed with an average perceptual evaluation of speech quality (PESQ) score of 4.26 under no attack condition, and above 3.0 under various signal processing attacks. Further, the correlation between original and reconstructed secret speech signal is close to unity. In addition, the loss in the generality of the information of the reconstructed speech signal is tested and is found minimum even the watermarked audio is subjected to various signal processing attacks. The proposed algorithm is also tested for false positive test to ensure the security of watermarking algorithm.
引用
收藏
页码:10003 / 10024
页数:22
相关论文
共 33 条
[1]   Combined speech compression and encryption using chaotic compressive sensing with large key size [J].
Al-Azawi, Maher K. Mahmood ;
Gaze, Ali M. .
IET SIGNAL PROCESSING, 2018, 12 (02) :214-218
[2]   An Adaptive High Capacity Model for Secure Audio Communication Based on Fractal Coding and Uniform Coefficient Modulation [J].
Ali, Ahmed Hussain ;
George, Loay Edwar ;
Mokhtar, Mohd Rosmadi .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2020, 39 (10) :5198-5225
[3]   High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain [J].
Ali, Ahmed Hussain ;
George, Loay Edwar ;
Zaidan, A. A. ;
Mokhtar, Mohd Rosmadi .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) :31487-31516
[4]   The Adaptive Multi-Level Phase Coding Method in Audio Steganography [J].
Alsabhany, Ahmed Abduljabbar ;
Ridzuan, Farida ;
Azni, A. H. .
IEEE ACCESS, 2019, 7 :129291-129306
[5]   Secure Speech Content Based on Scrambling and Adaptive Hiding [J].
Ballesteros, Dora M. ;
Renza, Diego .
SYMMETRY-BASEL, 2018, 10 (12)
[6]   Highly transparent steganography model of speech signals using Efficient Wavelet Masking [J].
Ballesteros L, Dora M. ;
Moreno A, Juan M. .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (10) :9141-9149
[7]   A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately [J].
Bharti, Shambhu Shankar ;
Gupta, Manish ;
Agarwal, Suneeta .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (16) :23179-23201
[8]   A novel approach for verifiable (n, n) audio secret sharing scheme [J].
Bharti, Shambhu Shankar ;
Gupta, Manish ;
Agarwal, Suneeta .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) :25629-25657
[9]  
Burrus C. S., 1997, Introduction to Wavelets and Wavelet Transforms: A Primer
[10]   Optimization-based audio watermarking with integrated quantization embedding [J].
Chen, Shuo-Tsung ;
Huang, Huang-Nan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) :4735-4751