Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30526
A Tool for Audio Quality Evaluation Under Hostile Environment

Authors: Lillie Dewan, Akhil Kumar Arya, Jagdeep Singh Lather

Abstract:

In this paper is to evaluate audio and speech quality with the help of Digital Audio Watermarking Technique under the different types of attacks (signal impairments) like Gaussian Noise, Compression Error and Jittering Effect. Further attacks are considered as Hostile Environment. Audio and Speech Quality Evaluation is an important research topic. The traditional way for speech quality evaluation is using subjective tests. They are reliable, but very expensive, time consuming, and cannot be used in certain applications such as online monitoring. Objective models, based on human perception, were developed to predict the results of subjective tests. The existing objective methods require either the original speech or complicated computation model, which makes some applications of quality evaluation impossible.

Keywords: Digital Watermarking, Attacks, DCT, Speech Quality

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1079528

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1278

References:


[1]. Libin Cai, Ronghui Tu, Jiying Zhao,, and Yongyi Mao, "Speech Quality Evaluation: A New Application of Digital Watermarking" IEEE Transaction on Instrumentation and Measurement, vol. 56, NO. 1, February 2007.
[2]. Abdellatif Zaidi, Rémy Boyer & Pierre Duhamel, "Audio Watermarking Under Desynchronization and Additive Noise Attacks". 1053-587X: p 570 - 584, ┬® 2006 IEEE.
[3]. Sharkas, ElShafie, & Hamdy, "A Dual Digital-Image Watermarking Technique". Transactions on Engineering, Computing and Technology V5 April 2005 ISSN 1305-5313: p136 -139.
[4]. Akira Takahashi, Ryouichi Nishimura & Y├┤iti Suzuki, "Multiple Watermarks for Stereo Audio Signals Using Phase-Modulation Techniques". IEEE Transactions on signal processing, vol. 53, no. 2, February 2005: p 806 - 815
[5]. T. Falk, Q. Xu, and W. Chan, "Non-intrusive GMM-based speech quality measurement," in Proc. 2005 IEEE ICASSP-05, Mar. 2005, pp. 125-128.
[6]. D.-S. Kim and A. Tarraf, "Perceptual model for nonintrusive speech quality assessment," in Proc. 2004 IEEE ICASSP-04, May 2004, pp. 1060-1063.
[7]. T. Falk and W.-Y. Chan, "Objective speech quality assessment using gaussian mixture models," in Proc. 22nd Biennial Symp. Commun., Kingston, ON, Canada, Jun. 2004, pp. 169-171.
[8]. L. Ding and R. Goubran, "Assessment of effects of packet loss on speech quality in VoIP," in Proce. IEEE Int. Workshop HAVE2003, Ottawa, ON, Canada, Sep. 2003, pp. 49-54.
[9]. V. Licks, F. Ourique, R. Jordan, and G. Heileman, "Performance of dirtypaper codes for additive white Gaussian noise," presented at the IEEE Workshop of Statistical Signal Processing (WSSP03), MO, 2003.
[10]. R. Bäuml, J. J. Eggers, and J. Huber, "A channel model for watermarks subject to desynchronization attacks," in Proc. Int. ITG Conf. Source Channel Coding, Berlin, Germany, Jan. 2002, pp. 28-30.
[11]. Kundur D, "Watermarking with diversity: Insights and implications". IEEE Multimedia 8(4): p 46-52, 2001.
[12]. J. W. Seok and J. W. Hong, "Audio watermarking for copyright protection of digital audio data," Electron. Lett., vol. 37, no. 1, pp. 60- 61, 2001.
[13]. P. Meerwald, A. Uhl, "A Survey of Wavelet-Domain Watermarking Algorithms" EI San Jose, CA, USA, 2001.
[14]. Yu H, Kundur D & Lin C, "Spies, thieves, and lies: The battle for multimedia in the digital era". IEEE Multimedia 8(3): p 8-12, 2001.
[15]. J.R. Hernandez, M.Amado, and F. Perez-Gonzalez, "DCT- Domain Watermarking Techniques for Still Images: Detector Performance Analysis And a New Structure", in IEEE Trans. Image Processing, vol. 9, pp 55-68, Jan. 2000.
[16]. F.A.P. Petitcolas, "Watermarking Schemes Evaluation" ", in IEEE Signal Processing Magazine, Vol 17, pp 58-64, September 2000.
[17]. G. Langelaar, I. Setyawan, R.L. Lagendijk, "Watermarking Digital Image and Video Data", in IEEE Signal Processing Magazine, Vol 17, pp 20- 43, September 2000.
[18]. J.R. Hernandez, M.Amado, and F. Perez-Gonzalez, "DCT- Domain Watermarking Techniques for Still Images: Detector Performance Analysis And a New Structure", in IEEE Trans. Image Processing, vol. 9, pp 55-68, Jan. 2000.
[19]. M. Arnold, "Audio watermarking: Features, applications and algorithms," in IEEE Int. Conf. Multimedia and Expo 2000, vol. 2, 2000, pp. 1013-1016.
[20]. M. Kutter, F. Hartung, "Introduction to Watermarking Techniques" in Information Techniques for Steganography and Digital Watermarking, S.C. Katzenbeisser et al., Eds. Northwood, MA: Artech House, Dec. 1999, pp 97-119.
[21]. Information hiding techniques of steganography and digital watermarking Stefan Katzenbeisser. Fabien A. P. Petitcolas (Editors), Artech House Books, 1999.
[22]. I.J. Cox, M.L. Miller, J.M.G. Linnartz, T. Kalker, "A Review of Watermarking Principles and Practices" in Digital Signal Processing for Multimedia Systems, K.K. Parhi, T. Nishitani, eds., Marcel Dekker, Inc., 1999, pp 461-482.
[23]. F.A.P. Petitcolas, "Introduction to information hiding" in Information Techniques for Steganography and Digital Watermarking, S.C. Katzenbeisser et al., Eds. Northwood, MA: Artech House, Dec. 1999, pp 1-11.
[24]. J. Dugelay, S. Roche, "A Survey of Current Watermarking Techniques" in Information Techniques for Steganography and Digital Watermarking, S.C. Katzenbeisser et al., Eds. Northwood, MA: Artech House, Dec. 1999, pp 121-145.
[25]. Kii. H, Onishi. J,Ozawa.S, "The digital watermarking method by using both patchwork and DCT," Mulmedia Computing and Systems. IEEE International Conference on vol. 1, pp. 895-899, 1999.
[26]. I. Cox, M. Miller, and A. McKellips, "Watermarking as communication with side information," in Proc. Int. Conf. Multimedia Computing Systems, Jul. 1999, pp. 1127-1141.
[27]. M. Barni, F. Bartolini, V. Cappellini, and A. Piva, "DCT-domain system for robust image watermarking," Signal Process., vol. 66, pp. 357-372, 1998.
[28]. F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Process., vol. 66, no. 3, pp. 283-301, 1998.
[29]. S Craver, et. al., "Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications", IEEE Jou.. Selected Areas in Communications, Vol. 16, No. 4, May 1998, pp 573-586.
[30]. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for images, audio and video," in IEEE Int. Conf. Image Processing, vol. 3, pp. 243-246, 1996.
[31]. Allen, J.B, "How do human process and recognize speech?" IEEE Trans. on Speech and Audio Processing, vol. 2, no. 4, pp.567-577, 1994.
[32]. R.C.Gonzalez and R.E.Woods, Digital Image Processing, Addison- Wesley Publishing company, Inc., 1993.