Skip to main content
Log in

Efficient audio integrity verification algorithm using discrete cosine transform

  • Published:
International Journal of Speech Technology Aims and scope Submit manuscript

Abstract

Audio recordings have been used as evidence for long times. Multimedia processing advancement makes it difficult to be completely sure about what is heard is the truth. This paper presents a promising approach for integrity verification of recorded audio signals using discrete cosine transform. This approach is based on self embedding concept which embeds block-based marks extracted from the same audio signal after being transformed into 2-D format into other blocks according to a specific algorithm. After the self-embedding process, the data is converted back into 1-D style which represents a marked audio signal. The 1-D audio signal is converted into a 2-D format and then converted back into a 1-D format using the popular lexicographic ordering scheme utilized in image processing. Reverse processes are executed to extract the verification marks from the audio signal throughout the integrity verification process. Based on the extracted audio signal properties, the integrity of the marked audio signal is evaluated. Different audio processing tasks and attacks are implemented to examine the suitability of the proposed algorithm for verifying the integrity of high-confidentiality recorded audio data. The results show that the efficient ability of the proposed approach to verify integrity and detect attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  • Ahmed, N., Natarajan, T., & Rao, K. R. (1974). Discrete cosine transform. IEEE Transactions on Computers, C–23(1), 90–93. doi:10.1109/T-C.1974.223784.

    Article  MathSciNet  MATH  Google Scholar 

  • Al-Haj, A., Bata, L., & Mohammad, A. (2009). Audio watermarking using wavelets, In: Proceedings of first international conference on networked digital technologies (pp. 398–403). NDT ‘09, July 28–31, 2009.

  • Bassia, P., Pitas, I., & Nikolaidis, N. (2001). Robust audio watermarking in the time domain. IEEE Transactions on Multimedia, 3(2), 232–241.

    Article  Google Scholar 

  • Can, Y. S., Alagoz, F., & Burus, M. E. (2014). A novel spread spectrum digital audio watermarking technique. Journal of Advances in Computer Networks, 2(1), 6–9.

    Article  Google Scholar 

  • Chang, W. H., & Chang, L. W. (2010). Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments. In: International symposium on IEEE communications and information technologies ( ISCIT).

  • Dittmann,J., Steinmetz, A., & Steinmetz, R. (1999). Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: International conference on multimedia computing and systems, Florence, June 1999.

  • Dittmann, J. (2001) Content-fragile watermarking for image authentication. In: Proceedings of SPIE (Vol. 4314). Bellingham.

  • G´omez, E., Cano, P., de C. T. Gomes, L., Batlle, E., Bonnet, M. (2002) Mixed Watermarking-Fingerprinting Approach for Integrity Verification of Audio Recordings. In: International telecommunications symposium —ITS2002, Natal.

  • Khayam, S. A. (2003). The discrete cosine transform (DCT ): Theory and a pplication. Michigan State University, March 2003.

  • Kubichek, R. (1993). Mel-cepstral distance measure for objective speech quality assessment. In: Proceedings of the IEEE Pacific Rim conference on communications, computers and signal p rocessing (pp. 125–128).

  • Li, C.-T., & Yang, F.-M. (2003). One-dimensional neighborhood forming strategy for fragile watermarking. Journal of Electronic Imaging, 12(2), 284–291.

    Article  Google Scholar 

  • Liu, C., & Chen, O. (2004). Fragile speech watermarking scheme with recovering speech contents. In: The 2004 47th Midwest symposium on circuits and systems. MWSCAS’04 (Vol. 2, pp. II-165–II-168).

  • Lu, C., Liao, H., & Chen, L. (2000) Multipurpose audio watermarking. In: Proceedings 15th international conference on pattern recognition (Vol. 3, pp. 282–285), 2002.

  • Nassar, S. S., Ayad, N. M., Kollash, H. M., Faragallah, O. S., M. El-Bendary, M. A., & Abd-Elsamie, F. E. (2014) Image contents verification algorithm using transform domain techniques. International Journal of Computer Applications (0975–8887), 97(9).

  • Petrovic, R. (2005). Digital watermarks for audio integrity verification, Serbia and Montenegro, Nis, September 28–30, 2005.

  • Radharani, S., & Valarmathi, M. L. (2010). A study of watermarking scheme for image authentication. International Journal of Computer Applications, 2(4), 24–32.

    Article  Google Scholar 

  • Shaw, G. (2000) Digital document integrity. 8th ACM multimedia conference. Los Angeles, November 2000.

  • Shiva Kumar, K. B., Raja, K. B., Chhotaray, R. K., Pattnaik, S., (2010). Coherent Steganography using Segmentation and DCT, IEEE-978-1-4244-5967-4/10/$26.00.

  • Shoemaker, C. (2002). Hidden Bits: A Survey of Techniques for Digital Watermarking Independent Study EER-290. Prof Rudko, Spring 2002.

  • Tewfik, A. H. (2000). Digital watermarking, San Mercury News. August 14, 2000.

  • Wang, S., Sekey, A., & Gersho, A. (1992). An objective measure for predicting subjective quality of speech coders. IEEE Journal on Selected Areas in Communications, 10(5), 819–829.

    Article  Google Scholar 

  • Wu, C.-P., & Jay Kuo, C.-C. (2001). Speech content integrity verification integrated with ITU G.723.1 speech coding. In: IEEE international conference on information technology: Coding and c omputing (pp. 680–684). Las Vegas, April 2001.

  • Wu, C. & Jay Kuo, C.-C. (2002). Fragile speech watermarking for content integrity verification. In: IEEE international symposium on circuits and systems, 2002. ISCAS 2002 (Vol. 2, pp. II-436–II-439).

  • Yang, W., Benbouchta, M., & Yantorno, R. (1998). Performance of the modified bark spectral distortion as an objective speech quality measure. In: Proceedings of the IEEE international conf erence on acoustic, speech and signal processing (ICASSP ) (Vol. 1, pp. 541–544). Washington, May 1998.

  • Zhang, P., Xu, S., & Yang, H. (2012) Robust and transparent audio watermarking based on improved spread spectrum and psychoacoustic masking. In: Proceedings 2012 international conference on information science and technology ( ICIST) (pp. 640–643). March 23–25, 2012.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama S. Faragallah.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nassar, S.S., Ayad, N.M., Kelash, H.M. et al. Efficient audio integrity verification algorithm using discrete cosine transform. Int J Speech Technol 19, 1–8 (2016). https://doi.org/10.1007/s10772-015-9312-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10772-015-9312-6

Keywords

Navigation