Authenticating Sensitive Speech-Recitation in Distance-Learning Applications using Real-Time Audio Watermarking
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
Thispaper focuses on audio-watermarking authentication and integrity-protection within the context of the speech-data transmitted over the Internet in a real-time learning environment.The Arabic Quran recitation through distance learning is used as a case-study example that is characteristic of sensitive data requiring robust authentication and integrity measures. Thisworkproposes an approach for the purpose ofauthenticating and validatingaudio-data transmitted by a publisher or during communications between an instructor and students reciting via Internet communications.The watermarking approach proposed here is based on detection of the key patternswithin the audio signal as an input to the algorithm before the embedding phase is performed.The developed application could be easily used at both sides of the communication for ensuring authenticity and integrity of the transmitted speech signal and is proved effective for many distance-learning applications that require low-complexity processing in real-time.
Authors and Affiliations
Omar Tayan, Lamri Laouamer, Tarek Moulahi, Yasser Alginahi
Internet Forensics Framework Based-on Clustering
Internet network attacks are complicated and worth studying. The attacks include Denial of Service (DoS). DoS attacks that exploit vulnerabilities found in operating systems, network services and applications. Indicators...
Performance of window synchronisation in coherent optical ofdm system
In this paper we investigate the performances of a robust and efficient technique for frame/symbol timing synchronization in coherent optical OFDM. It uses a preamble consisting of only two training symbol with two ident...
NMVSA Greedy Solution for Vertex Cover Problem
Minimum vertex cover (MVC) is a well-known NP-Complete optimization problem. The importance of MVC in theory and practical comes from the wide range of its applications. This paper describes a polynomial time greedy algo...
Enhancing Quality of Lossy Compressed Images using Minimum Decreasing Technique
The acceleration in technology development came with the urgent need to use large amounts of information, and the way of storing or transferring the huge information via various digital networks became very important iss...
Survey of Wireless MANET Application in Battlefield Operations
In this paper, we present a framework for performance analysis of wireless MANET in combat/battle field environment. The framework uses a cross-layer design approach where four different kinds of routing protocols are co...