This letter presents a speech watermarking scheme that is combined with CELP (Code Excited Linear Prediction) speech coding for speech authentication. The excitation codebook of CELP is partitioned into three parts and labeled '0', '1' and 'any' according to the private key. Watermark embedding process chooses the codebook whose label is the same as the watermark bit and combines it with the codebook labeled 'any' for CELP coding. A statistical method is employed to detect the watermark, and the watermark length for authentication and detection threshold are determined by false alarm probability and missed detection probability. The new codebook partition technique produces less distortion, and the statistical detection method guarantees that the error probability can be controlled under prescribed level.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Zhe-Ming LU, Bin YAN, Sheng-He SUN, "Watermarking Combined with CELP Speech Coding for Authentication" in IEICE TRANSACTIONS on Information,
vol. E88-D, no. 2, pp. 330-334, February 2005, doi: 10.1093/ietisy/e88-d.2.330.
Abstract: This letter presents a speech watermarking scheme that is combined with CELP (Code Excited Linear Prediction) speech coding for speech authentication. The excitation codebook of CELP is partitioned into three parts and labeled '0', '1' and 'any' according to the private key. Watermark embedding process chooses the codebook whose label is the same as the watermark bit and combines it with the codebook labeled 'any' for CELP coding. A statistical method is employed to detect the watermark, and the watermark length for authentication and detection threshold are determined by false alarm probability and missed detection probability. The new codebook partition technique produces less distortion, and the statistical detection method guarantees that the error probability can be controlled under prescribed level.
URL: https://global.ieice.org/en_transactions/information/10.1093/ietisy/e88-d.2.330/_p
Copy
@ARTICLE{e88-d_2_330,
author={Zhe-Ming LU, Bin YAN, Sheng-He SUN, },
journal={IEICE TRANSACTIONS on Information},
title={Watermarking Combined with CELP Speech Coding for Authentication},
year={2005},
volume={E88-D},
number={2},
pages={330-334},
abstract={This letter presents a speech watermarking scheme that is combined with CELP (Code Excited Linear Prediction) speech coding for speech authentication. The excitation codebook of CELP is partitioned into three parts and labeled '0', '1' and 'any' according to the private key. Watermark embedding process chooses the codebook whose label is the same as the watermark bit and combines it with the codebook labeled 'any' for CELP coding. A statistical method is employed to detect the watermark, and the watermark length for authentication and detection threshold are determined by false alarm probability and missed detection probability. The new codebook partition technique produces less distortion, and the statistical detection method guarantees that the error probability can be controlled under prescribed level.},
keywords={},
doi={10.1093/ietisy/e88-d.2.330},
ISSN={},
month={February},}
Copy
TY - JOUR
TI - Watermarking Combined with CELP Speech Coding for Authentication
T2 - IEICE TRANSACTIONS on Information
SP - 330
EP - 334
AU - Zhe-Ming LU
AU - Bin YAN
AU - Sheng-He SUN
PY - 2005
DO - 10.1093/ietisy/e88-d.2.330
JO - IEICE TRANSACTIONS on Information
SN -
VL - E88-D
IS - 2
JA - IEICE TRANSACTIONS on Information
Y1 - February 2005
AB - This letter presents a speech watermarking scheme that is combined with CELP (Code Excited Linear Prediction) speech coding for speech authentication. The excitation codebook of CELP is partitioned into three parts and labeled '0', '1' and 'any' according to the private key. Watermark embedding process chooses the codebook whose label is the same as the watermark bit and combines it with the codebook labeled 'any' for CELP coding. A statistical method is employed to detect the watermark, and the watermark length for authentication and detection threshold are determined by false alarm probability and missed detection probability. The new codebook partition technique produces less distortion, and the statistical detection method guarantees that the error probability can be controlled under prescribed level.
ER -