Skip to main content
Log in

Different attacks presence considerations: analyzing the simple and efficient self-marked algorithm performance for highly-sensitive audio signals contents verification

  • Published:
International Journal of Speech Technology Aims and scope Submit manuscript

Abstract

In this research paper, performance of an efficient audio contents integrity verification algorithm using Discrete Cosine Transform (DCT) has been analyzed and studied in presence the different noise and attacks. This approach of audio contents verification is designed based on a self-mark idea, the embedded mark is generated from the same audio file after transforming the sensitive 2-D audio file into two equal size partitions. Integrity and confidentiality verification of classified recorded audio scenario also, has been tested and evaluated in this research paper using the encryption technique to encrypt the marked audio files. Different computer experiments simulation have been executed to evaluate and analysis the performance of the stand-alone self-mark algorithm and with the encryption stage merging. These experiments tested the performance of these two security approaches with presence different attacks. Reverse processes are executed to verify the contents integrity of the audio files. According to the quality of the extracted audio file from the verification process compared to the original audio file, this audio contents integrity algorithm is applicable and robust. Quality of the extracted audio file is evaluated using the different metrics tools. The different attacks are employed to measure the robustness and reliability of this algorithm. The statistical analysis of the results has been presented, it is proved to have high detection sensitivity to observe and discover any audio manipulations even they were inaudible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28

Similar content being viewed by others

Data availability

This study data that support the findings are available from the corresponding author upon reasonable request.

References

  • Abouelfadl, A. A., El-Bendary, M. A. M., & Shawki, F. (2014). Enhancing transmission over wireless image sensor networks based on ZigBee network. Life Science Journal, 11(8), 342–354.

    Google Scholar 

  • Al-Haj, A., Bata, L., & Mohammad, A. (2009). Audio watermarking using wavelets. In Proceedings first international conference on networked digital technologies, 2009. NDT '09, 28–31, (pp. 398–403).

  • Bassia, P., Pitas, I., & Nikolaidis, N. (2001). Robust audio watermarking in the time domain. IEEE Transactions on Multimedia, 3(2), 232–241.

    Article  Google Scholar 

  • Can, Y. S., Alagoz, F., & Burus, M. E. (2014). A novel spread spectrum digital audio watermarking technique. Journal of Advances in Computer Networks, 2(1), 6–9.

    Article  Google Scholar 

  • Dittmann, J. (2001). Content-fragile watermarking for image authentication. Proceedings of SPIE, 4314, 175–184.

    Article  Google Scholar 

  • Dittmann, J., Steinmetz, A., & Steinmetz, R. (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking, In International conference on multimedia computing and systems, Florence.

  • El-Bendary, M. A. M. (2017). FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of of noise and different attacks. Multimedia Tools and Applications, 76(24), 26463–26501.

    Article  Google Scholar 

  • El-Bendary, M. A. M., & Abou El-Azm, A. E. (2018). Complexity considerations: Efficient image transmission over mobile communications channels. Multimedia Tools and Applications, 78, 16633–16664.

    Article  Google Scholar 

  • El-Bendary, M. A. M., Abou-El-Azm, A. E., & El-Fishawy, N. A. (2013). Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Wireless Networks 19, 517–532. https://doi.org/10.1007/s11276-012-0482-8

  • El-Bendary, M. A. M., Faragallah, O. S., & Nassar, S. S. (2023). An efficient hidden marking approach for forensic and contents verification of digital images. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-022-14104-3

    Article  Google Scholar 

  • El-Bendary, M. A. M., Kasban, H., Haggag, A., & El-Tokhy, M. A. R. (2020). Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security. Multimedia Tools and Applications, 79(33), 24507–24535.

    Article  Google Scholar 

  • Faragallah, Osama S., Farouk, M., El-sayed, Hala S., & El-bendary, Mohsen A.M. (2022). Secure audio transmission over wireless uncorrelated rayleigh fading channel. Computers, Materials & Continua 70(1), 1603–1615.

  • Gomez, E., Cano, P., Gomes, L., Batlle, E., Bonnet, M. (2002). Mixed watermarking-fingerprinting approach for integrity verification of audio recordings. In International telecommunications symposium—ITS2002, Natal, Brazil.

  • Kasban, H., & El-Bendary, M. A. (2016). Performance improvement of digital image transmission over mobile WiMAX networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-016-3671-4

    Article  Google Scholar 

  • Kasban, H., Nassar, S., & El-Bendary, M. A. M. (2021). Medical images transmission over wireless multimedia sensor networks with high data rate. Analog Integrated Circuits and Signal Processing, 108(1), 125–140.

    Article  Google Scholar 

  • Kubichek, R. (1993) Mel-cepstral distance measure for objective speech quality assessment. In Proceedings of the IEEE Pacific Rim conference on communications, computers and signal processing (pp. 125–128).

  • Liu, C., & Chen, O. (2004) Fragile speech watermarking scheme with recovering speech contents. In Circuits and systems, MWSCAS ’04, The 2004 47th Midwest symposium on circuits and systems, vol. 2, (pp. II–165 – II–168).

  • Lu C., C., Liao H., & Chen, L. (2002). Multipurpose audio watermarking. In Proceedings15th international conference on pattern recognition (ICPR 2000), vol. 3, (pp. 282–285). IEEE.

  • Mahmoud, M. M. E. A., & Xuemin (Sherman) Shen. (2014). Security for multi-hop wireless networks. Springer.

    Book  Google Scholar 

  • Mohamed El-Bendary, M. A., Abou-El-azm, A. E., El-Fishawy, N. A., & Shawki, F. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP Journal on Audio, Speech, and Music Processing, 2012, 1–14.

    Article  Google Scholar 

  • Mohamed, M. A. M., Abou El-Azm, A., & El-Fishwy, N. (2008). Bluetooth performance improvement with existing convolutional codes over AWGN channel. In 2nd International conference on electrical engineering design and technologies (ICEEDT’08). Transactio.

  • Nassar, S. S., & El-Bendary, M. A. M. (2022). Confidentiality considerations: Multimedia signals transmission over different wireless channels utilized efficient secured model. Multimedia Tools and Applications, 81, 25707–25744. https://doi.org/10.1007/s11042-022-12297-1

    Article  Google Scholar 

  • Nassar, S. S., Ayad, N. M., Kelash, H. M., El-Sayed, H. S., & El-Bendary, M. A. M. (2016a). Content verification of encrypted images transmitted over wireless AWGN channels. Wireless Personal Communications, 88(3), 479–491.

    Article  Google Scholar 

  • Nassar, S. S., Ayad, N. M., Kelash, H. M., El-Sayed, H. S., El-Bendary, M. A., Abd El-Samie, F. E., & Faragallah, O. S. (2016b). Efficient audio integrity verification algorithm using discrete cosine transform. International Journal of Speech Technology, 19(1), 1–8.

    Article  Google Scholar 

  • Shaw, G. (2000) Digital document integrity, In 8th ACM Multimedia Conference, Los Angeles.

  • Soliman, N. F., Albagory, Y., Elbendary, M. A., Al-Hanafy, W., El-Rabaie, E. S., Alshebeili, S. A., & El-Samie, F. E. (2014). Chaotic interleaving for robust image transmission with LDPC Coded OFDM. Wireless Personal Communications, 79, 2141–2154.

    Article  Google Scholar 

  • Wang, S., Sekey, A., & Gersho, A. (1992). An objective measure for predicting subjective quality of speech coders. IEEE Journal on Selected Areas in Communications, 10(5), 819–829.

    Article  Google Scholar 

  • Wu, C. P., & Jay Kuo, C. C. (2001). Speech content integrity verification integrated with ITU G.723.1 speech coding. In IEEE international conference on information technology: Coding and computing, (pp. 680–684), Las Vegas.

  • Wu, C., & Jay Kuo, C. C. (2002) Fragile speech watermarking for content integrity verification. In IEEE international symposium on circuits and systems (ISCAS 2002), vol. 2, (pp. II–436 – II–439).

  • Yang, W., Benbouchta, M., & Yantorno R. (1998). Performance of the modified bark spectral distortion as an objective speech quality measure. In Proceedings of the IEEE international conference on acoustic, speech and signal processing (ICASSP). Washington, USA, vol. 1, (pp. 541–554).

Download references

Funding

This study was not funded by anyone or any authority.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohsen A. M. El-Bendary.

Ethics declarations

Conflict of interest

Mohsen A. M. El-Bendary declares that he has no conflict of interest. Sabry S. Nassar declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

El-Bendary, M.A.M., Nassar, S.S. Different attacks presence considerations: analyzing the simple and efficient self-marked algorithm performance for highly-sensitive audio signals contents verification. Int J Speech Technol 26, 379–394 (2023). https://doi.org/10.1007/s10772-023-10025-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10772-023-10025-0

Keywords

Navigation