IJCNIS Vol. 17, No. 1, 8 Feb. 2025
Cover page and Table of Contents: PDF (size: 676KB)
PDF (676KB), PP.57-67
Views: 0 Downloads: 0
Arnold Transform, Vowel, FFT, Min Algorithm, PSNR, SSIM
The critical challenge with the continuously increasing number of Internet users is copying and duplication, which has caused content integrity and protection. To manage and secure the signals from unauthorized consumers of digital content, we require certain procedures. Digital watermarking scheme on vowel-based approach can address these problems. Thus, we can provide a robust and secure method that solves the issues of copyright, illegal intentional or unintentional modification. In this paper, we have proposed vowel-based speech watermarking techniques using the FFT method with the help of the Min algorithm. We observe that the proposed FFT-based watermarking scheme provides better results in comparison to the existing methods.
Rajeev Kumar, Kshitiz Singh, Jainath Yadav, Ajay Kumar, Indranath Chatterjee, "Vowel based Speech Watermarking Techniques using FFT and Min Algorithm", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.1, pp.57-67, 2025. DOI:10.5815/ijcnis.2025.01.05
[1]Y. He and Y. Hu. ‘A proposed digital image watermarking based on DWT-DCT-SVD’, in 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), May, pp.1214–1218, 2018.
[2]S. Bhattacharya, T. Chattopadhyay, and A. Pal, “A survey on different video watermarking techniques and comparative analysis with reference to H. 264/AVC,” in 2006 IEEE International Symposium on Consumer Electronics. IEEE, 2006, pp. 1–6.
[3]V. Singh, “Digital watermarking: a tutorial,” Cyber Journals, Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011.
[4]D. Ambika & V. Radha, “Speech Watermarking Using Discrete Wavelet Transform”, Discrete Cosine Transform And Singular Value Decomposition. Int. J. Comput. Sci. Eng. Technol, 5(11), 1089-1093, 2014.
[5]M. A. Nematollahi and S. A. R. Al-Haddad, “An overview of digital speech watermarking,” International Journal of Speech Technology, vol. 16, no. 4, pp. 471–488, 2013.
[6]A. Jadhav and M. Kolhekar, “Digital watermarking in video for copyright protection,” in 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies. IEEE, 2014, pp. 140–144.
[7]G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Real-time labeling of MPEG-2 compressed video,” Journal of Visual Communication and Image Representation, vol. 9, no. 4, pp. 256–270, 1998.
[8]M. S. Kankanhalli, K. Ramakrishnan et al., “Adaptive visible watermarking of images,” in Proceedings IEEE International Conference on Multimedia Computing and Systems, vol. 1. IEEE, 1999, pp. 568–573.
[9]S. P. Mohanty, K. Ramakrishnan, and M. Kankanhalli, “A dual watermarking technique for images,” in Proceedings of the seventh ACM international conference on Multimedia (Part 2). Citeseer, 1999, pp. 49–51.
[10]M. M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification,” in Proceedings of international conference on image processing, vol. 2. IEEE, 1997, pp. 680–683.
[11]F. Perez-Gonzalez and J. R. Hernandez, “A tutorial on digital watermarking,” in Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No. 99CH36303). IEEE, 1999, pp. 286–292.
[12]O. Jane and E. Elbai, ‘Hybrid non-blind watermarking based on DWT and SVD’, Journal of Applied Research and Technology, Vol. 12, No. 4, pp.750–761, 2014.
[13]I. J. Cox and M. L. Miller, “Electronic watermarking: the first 50 years,” in 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No. 01TH8564). IEEE, 2001, pp. 225–230.
[14]R. Kumar and J. Yadav, “Vowel and non-vowel frame segmentation based digital speech watermarking technique using lpa method,” Journal of Information Security and Applications, vol. 68, p. 103218, 2022.
[15]Q. Wu, R. Ding, and J. Wei, “Audio watermarking algorithm with a synchronization mechanism based on spectrum distribution,” Security and Communication Networks, vol. 2022, 2022.
[16]A. Kanhe and A. Gnanasekaran, “Robust image-in-audio watermarking technique based on DCT-SVD transform,” EURASIP Journal on Audio, Speech, and Music Processing, vol. 2018, no. 1, p. 16, 2018.
[17]A. Singha and M. A. Ullah, “Audio watermarking with multiple images as watermarks,” IETE Journal of Education, vol. 61, no. 2, pp. 64–75, 2020.
[18]Z. Liu, Y. Huang, and J. Huang, “Patchwork-based audio watermark- ing robust against de-synchronization and recapturing attacks,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1171–1180, 2019.
[19]M. Charfeddine, E. Mezghani, S. Masmoudi, C. B. Amar, and H. Al- humyani, “Audio watermarking for security and non-security applica- tions,” IEEE Access, vol. 10, pp. 12 654–12 677, 2022.
[20]S. Alshathri and E. E.-D. Hemdan, “An efficient audio watermarking scheme with scrambled medical images for secure medical internet of things systems,” Multimedia Tools and Applications, pp. 1–19, 2023.
[21]K. O. Boateng, B. W. Asubam, and D. S. Laar, “Improving the effectiveness of the median filter,” 2012.
[22]R.-S. Run, S.-J. Horng, J.-L. Lai, T.-W. Kao, and R.-J. Chen, “An improved SVD-based watermarking technique for copyright protection,” Expert Systems with applications, vol. 39, no. 1, pp. 673–689, 2012.
[23]L. Min, L. Ting, and H. Yu-jie, “Arnold transform based image scrambling method,” in 3rd International Conference on Multimedia Technology(ICMT-13). Atlantis Press, 2013/11. [Online]. Available: https://doi.org/10.2991/icmt-13.2013.160
[24]A. Revathi, N. Sasikaladevi, and C. Jeyalakshmi, “Digital speech water- marking to enhance the security using speech as a biometric for person authentication,” International Journal of Speech Technology, vol. 21, no. 4, pp. 1021–1031, 2018.