Abstract
In this research paper, performance of an efficient audio contents integrity verification algorithm using Discrete Cosine Transform (DCT) has been analyzed and studied in presence the different noise and attacks. This approach of audio contents verification is designed based on a self-mark idea, the embedded mark is generated from the same audio file after transforming the sensitive 2-D audio file into two equal size partitions. Integrity and confidentiality verification of classified recorded audio scenario also, has been tested and evaluated in this research paper using the encryption technique to encrypt the marked audio files. Different computer experiments simulation have been executed to evaluate and analysis the performance of the stand-alone self-mark algorithm and with the encryption stage merging. These experiments tested the performance of these two security approaches with presence different attacks. Reverse processes are executed to verify the contents integrity of the audio files. According to the quality of the extracted audio file from the verification process compared to the original audio file, this audio contents integrity algorithm is applicable and robust. Quality of the extracted audio file is evaluated using the different metrics tools. The different attacks are employed to measure the robustness and reliability of this algorithm. The statistical analysis of the results has been presented, it is proved to have high detection sensitivity to observe and discover any audio manipulations even they were inaudible.
Similar content being viewed by others
Data availability
This study data that support the findings are available from the corresponding author upon reasonable request.
References
Abouelfadl, A. A., El-Bendary, M. A. M., & Shawki, F. (2014). Enhancing transmission over wireless image sensor networks based on ZigBee network. Life Science Journal, 11(8), 342–354.
Al-Haj, A., Bata, L., & Mohammad, A. (2009). Audio watermarking using wavelets. In Proceedings first international conference on networked digital technologies, 2009. NDT '09, 28–31, (pp. 398–403).
Bassia, P., Pitas, I., & Nikolaidis, N. (2001). Robust audio watermarking in the time domain. IEEE Transactions on Multimedia, 3(2), 232–241.
Can, Y. S., Alagoz, F., & Burus, M. E. (2014). A novel spread spectrum digital audio watermarking technique. Journal of Advances in Computer Networks, 2(1), 6–9.
Dittmann, J. (2001). Content-fragile watermarking for image authentication. Proceedings of SPIE, 4314, 175–184.
Dittmann, J., Steinmetz, A., & Steinmetz, R. (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking, In International conference on multimedia computing and systems, Florence.
El-Bendary, M. A. M. (2017). FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of of noise and different attacks. Multimedia Tools and Applications, 76(24), 26463–26501.
El-Bendary, M. A. M., & Abou El-Azm, A. E. (2018). Complexity considerations: Efficient image transmission over mobile communications channels. Multimedia Tools and Applications, 78, 16633–16664.
El-Bendary, M. A. M., Abou-El-Azm, A. E., & El-Fishawy, N. A. (2013). Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Wireless Networks 19, 517–532. https://doi.org/10.1007/s11276-012-0482-8
El-Bendary, M. A. M., Faragallah, O. S., & Nassar, S. S. (2023). An efficient hidden marking approach for forensic and contents verification of digital images. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-022-14104-3
El-Bendary, M. A. M., Kasban, H., Haggag, A., & El-Tokhy, M. A. R. (2020). Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security. Multimedia Tools and Applications, 79(33), 24507–24535.
Faragallah, Osama S., Farouk, M., El-sayed, Hala S., & El-bendary, Mohsen A.M. (2022). Secure audio transmission over wireless uncorrelated rayleigh fading channel. Computers, Materials & Continua 70(1), 1603–1615.
Gomez, E., Cano, P., Gomes, L., Batlle, E., Bonnet, M. (2002). Mixed watermarking-fingerprinting approach for integrity verification of audio recordings. In International telecommunications symposium—ITS2002, Natal, Brazil.
Kasban, H., & El-Bendary, M. A. (2016). Performance improvement of digital image transmission over mobile WiMAX networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-016-3671-4
Kasban, H., Nassar, S., & El-Bendary, M. A. M. (2021). Medical images transmission over wireless multimedia sensor networks with high data rate. Analog Integrated Circuits and Signal Processing, 108(1), 125–140.
Kubichek, R. (1993) Mel-cepstral distance measure for objective speech quality assessment. In Proceedings of the IEEE Pacific Rim conference on communications, computers and signal processing (pp. 125–128).
Liu, C., & Chen, O. (2004) Fragile speech watermarking scheme with recovering speech contents. In Circuits and systems, MWSCAS ’04, The 2004 47th Midwest symposium on circuits and systems, vol. 2, (pp. II–165 – II–168).
Lu C., C., Liao H., & Chen, L. (2002). Multipurpose audio watermarking. In Proceedings15th international conference on pattern recognition (ICPR 2000), vol. 3, (pp. 282–285). IEEE.
Mahmoud, M. M. E. A., & Xuemin (Sherman) Shen. (2014). Security for multi-hop wireless networks. Springer.
Mohamed El-Bendary, M. A., Abou-El-azm, A. E., El-Fishawy, N. A., & Shawki, F. (2012). Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP Journal on Audio, Speech, and Music Processing, 2012, 1–14.
Mohamed, M. A. M., Abou El-Azm, A., & El-Fishwy, N. (2008). Bluetooth performance improvement with existing convolutional codes over AWGN channel. In 2nd International conference on electrical engineering design and technologies (ICEEDT’08). Transactio.
Nassar, S. S., & El-Bendary, M. A. M. (2022). Confidentiality considerations: Multimedia signals transmission over different wireless channels utilized efficient secured model. Multimedia Tools and Applications, 81, 25707–25744. https://doi.org/10.1007/s11042-022-12297-1
Nassar, S. S., Ayad, N. M., Kelash, H. M., El-Sayed, H. S., & El-Bendary, M. A. M. (2016a). Content verification of encrypted images transmitted over wireless AWGN channels. Wireless Personal Communications, 88(3), 479–491.
Nassar, S. S., Ayad, N. M., Kelash, H. M., El-Sayed, H. S., El-Bendary, M. A., Abd El-Samie, F. E., & Faragallah, O. S. (2016b). Efficient audio integrity verification algorithm using discrete cosine transform. International Journal of Speech Technology, 19(1), 1–8.
Shaw, G. (2000) Digital document integrity, In 8th ACM Multimedia Conference, Los Angeles.
Soliman, N. F., Albagory, Y., Elbendary, M. A., Al-Hanafy, W., El-Rabaie, E. S., Alshebeili, S. A., & El-Samie, F. E. (2014). Chaotic interleaving for robust image transmission with LDPC Coded OFDM. Wireless Personal Communications, 79, 2141–2154.
Wang, S., Sekey, A., & Gersho, A. (1992). An objective measure for predicting subjective quality of speech coders. IEEE Journal on Selected Areas in Communications, 10(5), 819–829.
Wu, C. P., & Jay Kuo, C. C. (2001). Speech content integrity verification integrated with ITU G.723.1 speech coding. In IEEE international conference on information technology: Coding and computing, (pp. 680–684), Las Vegas.
Wu, C., & Jay Kuo, C. C. (2002) Fragile speech watermarking for content integrity verification. In IEEE international symposium on circuits and systems (ISCAS 2002), vol. 2, (pp. II–436 – II–439).
Yang, W., Benbouchta, M., & Yantorno R. (1998). Performance of the modified bark spectral distortion as an objective speech quality measure. In Proceedings of the IEEE international conference on acoustic, speech and signal processing (ICASSP). Washington, USA, vol. 1, (pp. 541–554).
Funding
This study was not funded by anyone or any authority.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Mohsen A. M. El-Bendary declares that he has no conflict of interest. Sabry S. Nassar declares that he has no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
El-Bendary, M.A.M., Nassar, S.S. Different attacks presence considerations: analyzing the simple and efficient self-marked algorithm performance for highly-sensitive audio signals contents verification. Int J Speech Technol 26, 379–394 (2023). https://doi.org/10.1007/s10772-023-10025-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10772-023-10025-0