{"title":"Algorithms for hiding data in speech signals","authors":"A. F. Marquez, R. Sankar, W. Moreno","doi":"10.1109/SECON.2012.6196906","DOIUrl":null,"url":null,"abstract":"This paper presents speech watermarking techniques based on modification of the duration of estimated silence regions, direct samples replacement within silence regions, dc component changes per short-time frame, and specific modification of low-amplitude samples ranges in a speech signal. These methods could be used to secretly embed information into speech data for applications such as copyright protection, annotations, and covert communications. Natural variability of the modified parameters within a sentence makes the algorithms imperceptible to the human listener while providing enough bandwidth to hide encoded information. Performance of the schemes is evaluated by comparing them to other data watermarking approaches. Experimental results for several speech signals verify the robustness of the algorithm.","PeriodicalId":187091,"journal":{"name":"2012 Proceedings of IEEE Southeastcon","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Proceedings of IEEE Southeastcon","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2012.6196906","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents speech watermarking techniques based on modification of the duration of estimated silence regions, direct samples replacement within silence regions, dc component changes per short-time frame, and specific modification of low-amplitude samples ranges in a speech signal. These methods could be used to secretly embed information into speech data for applications such as copyright protection, annotations, and covert communications. Natural variability of the modified parameters within a sentence makes the algorithms imperceptible to the human listener while providing enough bandwidth to hide encoded information. Performance of the schemes is evaluated by comparing them to other data watermarking approaches. Experimental results for several speech signals verify the robustness of the algorithm.