Digital audio authentication using enhanced LSB and logistic map

Keywords: Digital watermarking, audio authentication, LSB, tampering detection, logistic chaotic map

Abstract

With the advancement of communication technologies, various processes have been developed to protect digital content and ensure its secure transmission. These processes involve the utilization of multiple information processing tools, including watermarking techniques. Watermarking allows for the embedding of information into a carrier signal without compromising its quality. It enables verification of the multimedia content's integrity and facilitates the detection of manipulations by analyzing changes in the extracted watermark. This article presents a fragile watermarking algorithm designed for digital audio authentication. The algorithm employs the least significant bit (LSB) technique and analyzes the first two most significant bits (MSB) for embedding the watermark. The results obtained demonstrate the imperceptibility of the watermark, with average signal-to-noise ratio (SNR) and normalized correlation (NC) values of 43.22 dB and 0.9980, respectively. Additionally, the proposed method exhibits resilience against various attacks such as mute, cloning, and sample substitution.

Downloads

Download data is not yet available.

References

Ahmed, M. A., Kiah, M. M., Zaidan, B. B., & Zaidan, A. A. (2010). A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. Journal of Applied Sciences, 10(1), 59-64. DOI: 10.3923/jas.2010.59.64

Alwahbani, S. M., & Elshoush, H. T. (2018). Chaos-based audio steganography and cryptography using LSB method and one-time pad. In Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016: Volume 2 (pp. 755-768). Springer International Publishing. DOI: 10.1007/978-3-319-56991-8_54

Asad, M., Gilani, J., & Khalid, A. (2011, July). An enhanced least significant bit modification technique for audio steganography. In International Conference on Computer Networks and Information Technology (pp. 143-147). IEEE. DOI: 10.1109/ICCNIT.2011.6020921

Chetan, M., Bhat, P. P., Shet, V., Husenbhai, S. B., & Bhat, A. (2021, December). Audio watermarking using modified least significant bit technique. In 2021 International conference on circuits, controls and communications (CCUBE) (pp. 1-5). IEEE. DOI: 10.1109/CCUBE53681.2021.9702715

Cox, I. J., & Miller, M. L. (2002). The first 50 years of electronic watermarking. EURASIP Journal on Advances in Signal Processing, 2002, 1-7. DOI: 10.1155/S1110865702000525

Ghobadi, A., Boroujerdizadeh, A., Yaribakht, A. H., & Karimi, R. (2013, January). Blind audio watermarking for tamper detection based on LSB. In 2013 15th International Conference on Advanced Communications Technology (ICACT) (pp. 1077-1082). IEEE.

Jeruchim, M. (1984). Techniques for estimating the bit error rate in the simulation of digital communication systems. IEEE Journal on selected areas in communications, 2(1), 153-170. DOI: 10.1109/JSAC.1984.1146031

Kabal, P. (2002). An examination and interpretation of ITU-R BS. 1387: Perceptual evaluation of audio quality. TSP Lab Technical Report, Dept. Electrical & Computer Engineering, McGill University, 1-89.

Kundur, D., & Hatzinakos, D. (1999). Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE, 87(7), 1167-1180. DOI: 10.1109/5.771070

Li, S., Song, Z., Lu, W., Sun, D., & Wei, J. (2017). Parameterization of LSB in self-recovery speech watermarking framework in big data mining. Security and Communication Networks, 2017. DOI:10.1155/2017/3847092

Naskar, R., & Chakraborty, R. S., (2014). Reversible digital watermarking: theory and practices. Synthesis Lectures on Information Security, Privacy, & Trust, 5(1), 1-130. DOI:10.1007/978-3-031-02342-2

Pak, C., & Huang, L. (2017). A new color image encryption using combination of the 1D chaotic map. Signal Processing, 138, 129-137. DOI: 10.1016/j.sigpro.2017.03.011

Sathishkumar, G. A., & Sriraam, D. N. (2011). Image encryption based on diffusion and multiple chaotic maps. arXiv preprint arXiv:1103.3792.

Vargas, L. M., Vera. E., & Di Gianantonio, A. (2016). Marcas de agua: una contribución a la seguridad de archivos digitales. Revista de la Facultad de Ciencias Exactas, Físicas y Naturales, 3(1), 49-54.

Wang, D., & Zhang, X. (2015). Thchs-30: A free chinese speech corpus. Available: http://arxiv.org/abs/1512.01882

Wang, J., & He, J. (2017). A speech content authentication algorithm based on a novel watermarking method. Multimedia Tools and Applications, 76, 14799-14814. DOI:10.1007/s11042-016-4027-5

Published
2023-09-11
How to Cite
Quiñonez-Carbajal, M. T., Reyes-Reyes, R., Ponomaryov , V., & Cruz-Ramos, C. (2023). Digital audio authentication using enhanced LSB and logistic map . Pädi Boletín Científico De Ciencias Básicas E Ingenierías Del ICBI, 11(Especial2), 175-182. https://doi.org/10.29057/icbi.v11iEspecial2.10722