A Tool for Audio Quality Evaluation Under Hostile Environment

In this paper is to evaluate audio and speech quality with the help of Digital Audio Watermarking Technique under the different types of attacks (signal impairments) like Gaussian Noise, Compression Error and Jittering Effect. Further attacks are considered as Hostile Environment. Audio and Speech Quality Evaluation is an important research topic. The traditional way for speech quality evaluation is using subjective tests. They are reliable, but very expensive, time consuming, and cannot be used in certain applications such as online monitoring. Objective models, based on human perception, were developed to predict the results of subjective tests. The existing objective methods require either the original speech or complicated computation model, which makes some applications of quality evaluation impossible.




References:
[1]. Libin Cai, Ronghui Tu, Jiying Zhao,, and Yongyi Mao, "Speech Quality
Evaluation: A New Application of Digital Watermarking" IEEE
Transaction on Instrumentation and Measurement, vol. 56, NO. 1,
February 2007.
[2]. Abdellatif Zaidi, Rémy Boyer & Pierre Duhamel, "Audio Watermarking
Under Desynchronization and Additive Noise Attacks". 1053-587X: p
570 - 584, ┬® 2006 IEEE.
[3]. Sharkas, ElShafie, & Hamdy, "A Dual Digital-Image Watermarking
Technique". Transactions on Engineering, Computing and Technology
V5 April 2005 ISSN 1305-5313: p136 -139.
[4]. Akira Takahashi, Ryouichi Nishimura & Y├┤iti Suzuki, "Multiple
Watermarks for Stereo Audio Signals Using Phase-Modulation
Techniques". IEEE Transactions on signal processing, vol. 53, no. 2,
February 2005: p 806 - 815
[5]. T. Falk, Q. Xu, and W. Chan, "Non-intrusive GMM-based speech quality
measurement," in Proc. 2005 IEEE ICASSP-05, Mar. 2005, pp. 125-128.
[6]. D.-S. Kim and A. Tarraf, "Perceptual model for nonintrusive speech
quality assessment," in Proc. 2004 IEEE ICASSP-04, May 2004, pp.
1060-1063.
[7]. T. Falk and W.-Y. Chan, "Objective speech quality assessment using
gaussian mixture models," in Proc. 22nd Biennial Symp. Commun.,
Kingston, ON, Canada, Jun. 2004, pp. 169-171.
[8]. L. Ding and R. Goubran, "Assessment of effects of packet loss on speech
quality in VoIP," in Proce. IEEE Int. Workshop HAVE2003, Ottawa, ON,
Canada, Sep. 2003, pp. 49-54.
[9]. V. Licks, F. Ourique, R. Jordan, and G. Heileman, "Performance of
dirtypaper codes for additive white Gaussian noise," presented at the
IEEE Workshop of Statistical Signal Processing (WSSP03), MO, 2003.
[10]. R. Bäuml, J. J. Eggers, and J. Huber, "A channel model for watermarks
subject to desynchronization attacks," in Proc. Int. ITG Conf. Source
Channel Coding, Berlin, Germany, Jan. 2002, pp. 28-30.
[11]. Kundur D, "Watermarking with diversity: Insights and implications".
IEEE Multimedia 8(4): p 46-52, 2001.
[12]. J. W. Seok and J. W. Hong, "Audio watermarking for copyright
protection of digital audio data," Electron. Lett., vol. 37, no. 1, pp. 60-
61, 2001.
[13]. P. Meerwald, A. Uhl, "A Survey of Wavelet-Domain Watermarking
Algorithms" EI San Jose, CA, USA, 2001.
[14]. Yu H, Kundur D & Lin C, "Spies, thieves, and lies: The battle for
multimedia in the digital era". IEEE Multimedia 8(3): p 8-12, 2001.
[15]. J.R. Hernandez, M.Amado, and F. Perez-Gonzalez, "DCT- Domain
Watermarking Techniques for Still Images: Detector Performance
Analysis And a New Structure", in IEEE Trans. Image Processing, vol.
9, pp 55-68, Jan. 2000.
[16]. F.A.P. Petitcolas, "Watermarking Schemes Evaluation" ", in IEEE Signal
Processing Magazine, Vol 17, pp 58-64, September 2000.
[17]. G. Langelaar, I. Setyawan, R.L. Lagendijk, "Watermarking Digital Image
and Video Data", in IEEE Signal Processing Magazine, Vol 17, pp 20-
43, September 2000.
[18]. J.R. Hernandez, M.Amado, and F. Perez-Gonzalez, "DCT- Domain
Watermarking Techniques for Still Images: Detector Performance
Analysis And a New Structure", in IEEE Trans. Image Processing, vol.
9, pp 55-68, Jan. 2000.
[19]. M. Arnold, "Audio watermarking: Features, applications and
algorithms," in IEEE Int. Conf. Multimedia and Expo 2000, vol. 2, 2000,
pp. 1013-1016.
[20]. M. Kutter, F. Hartung, "Introduction to Watermarking Techniques" in
Information Techniques for Steganography and Digital Watermarking,
S.C. Katzenbeisser et al., Eds. Northwood, MA: Artech House, Dec.
1999, pp 97-119.
[21]. Information hiding techniques of steganography and digital
watermarking Stefan Katzenbeisser. Fabien A. P. Petitcolas (Editors),
Artech House Books, 1999.
[22]. I.J. Cox, M.L. Miller, J.M.G. Linnartz, T. Kalker, "A Review of
Watermarking Principles and Practices" in Digital Signal Processing for
Multimedia Systems, K.K. Parhi, T. Nishitani, eds., Marcel Dekker, Inc.,
1999, pp 461-482.
[23]. F.A.P. Petitcolas, "Introduction to information hiding" in Information
Techniques for Steganography and Digital Watermarking, S.C.
Katzenbeisser et al., Eds. Northwood, MA: Artech House, Dec. 1999,
pp 1-11.
[24]. J. Dugelay, S. Roche, "A Survey of Current Watermarking Techniques"
in Information Techniques for Steganography and Digital
Watermarking, S.C. Katzenbeisser et al., Eds. Northwood, MA: Artech
House, Dec. 1999, pp 121-145.
[25]. Kii. H, Onishi. J,Ozawa.S, "The digital watermarking method by using
both patchwork and DCT," Mulmedia Computing and Systems. IEEE
International Conference on vol. 1, pp. 895-899, 1999.
[26]. I. Cox, M. Miller, and A. McKellips, "Watermarking as communication
with side information," in Proc. Int. Conf. Multimedia Computing
Systems, Jul. 1999, pp. 1127-1141.
[27]. M. Barni, F. Bartolini, V. Cappellini, and A. Piva, "DCT-domain system
for robust image watermarking," Signal Process., vol. 66, pp. 357-372,
1998.
[28]. F. Hartung and B. Girod, "Watermarking of uncompressed and
compressed video," Signal Process., vol. 66, no. 3, pp. 283-301, 1998.
[29]. S Craver, et. al., "Resolving Rightful Ownerships with Invisible
Watermarking Techniques: Limitations, Attacks and Implications",
IEEE Jou.. Selected Areas in Communications, Vol. 16, No. 4, May
1998, pp 573-586.
[30]. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, "Secure spread spectrum
watermarking for images, audio and video," in IEEE Int. Conf. Image
Processing, vol. 3, pp. 243-246, 1996.
[31]. Allen, J.B, "How do human process and recognize speech?" IEEE Trans.
on Speech and Audio Processing, vol. 2, no. 4, pp.567-577, 1994.
[32]. R.C.Gonzalez and R.E.Woods, Digital Image Processing, Addison-
Wesley Publishing company, Inc., 1993.