Aparna Gurijala
Michigan State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Aparna Gurijala.
IEEE Transactions on Speech and Audio Processing | 2005
John H. L. Hansen; Rongqing Huang; Bowen Zhou; Michael Seadle; John R. Deller; Aparna Gurijala; Mikko Kurimo; Pongtep Angkititrakul
In this study, we discuss a number of issues for audio stream phrase recognition for information retrieval for a new National Gallery of the Spoken Word (NGSW). NGSW is the first largescale repository of its kind, consisting of speeches, news broadcasts, and recordings that are of historical content from the 20 th Century. We propose a system diagram and discuss critical tasks associated with effective audio information retrieval that include: advanced audio segmentation, speech recognition model adaptation for acoustic background noise and speaker variability, and natural language processing for text query requests. A number of questions regarding copyright assessment, metadata construction, digital watermarking must also be addressed for a sustainable audio collection of this magnitude. Our experimental online system entitled “SpeechFind” is presented which allows for audio retrieval from a portion of the NGSW corpus. We discuss a number of research challenges to address the overall task of robust phrase searching in unrestricted audio corpora. 1. Overview The problem of reliable speech recognition for spoken
asilomar conference on signals, systems and computers | 2003
Aparna Gurijala; John R. Deller
Speech watermarking strategies inevitably alter original signal content. Fidelity is adversely affected by increased perturbation while watermark robustness to attack is generally improved. Parameter-embedded watermarking is effected through slight perturbations of parametric models of some deeply integrated dynamics of the speech. Within this framework, a specific algorithm is presented in which the fidelity-robustness tradeoff can be objectively assessed and quantifiably adjusted according to specific measures. An overview of the general parameter-embedding strategy is followed by presentation of the featured algorithm, analysis of its properties, and experiments with speech data to assess fidelity, robustness, and other performance properties.
Proceedings of SPIE | 2005
Aparna Gurijala; Syed Ali Khayam; Hayder Radha; John R. Deller
Advances in network communications have necessitated secure local-storage and transmission of multimedia content. In particular, military networks need to securely store sensitive imagery which at a later stage may be transmitted over bandwidth-constrained wireless networks. This work investigates compression efficiency of JPEG and JPEG 2000 standards for encrypted images. An encryption technique proposed by Kuo et al. in [4] is employed. The technique scrambles the phase spectrum of an image by addition of the phase of an all-pass pre-filter. The post-filter inverts the encryption process, provided the correct pseudo-random filter coefficients are available at the receiver. Additional benefits of pre/post-filter encryption include the prevention of blocking effects and better robustness to channel noise [4]. Since both JPEG and JPEG 2000 exploit spatial and perceptual redundancies for compression, pre/post-filtered (encrypted) images are susceptible to compression inefficiencies. The PSNR difference between the unencrypted and pre/post-filtered images after decompression is determined for various compression rates. Compression efficiency decreases with an increase in compression rate. For JPEG and JPEG 2000 compression rates between 0.5 to 2.5 bpp, the difference in PSNR is negligible. Partial encryption is proposed wherein a subset of image phase coefficients are scrambled. Due to the phase sensitivity of images, even partial scrambling of the phase information results in unintelligible data. The effect of compression on partially encrypted images is observed for various bit-rates. When 25% of image phase coefficients are scrambled, the JPEG and JPEG 2000 compression performance of encrypted images is almost similar to that of unencrypted images for compression rates in the 0.5 to 3.5 bpp range.
acm/ieee joint conference on digital libraries | 2002
Michael Seadle; John R. Deller; Aparna Gurijala
An important research component in the creation of the National Gallery of the Spoken Word (NGSW) is the development of watermarking technologies for the audio library. In this paper we argue that audio watermarking is a particularly desirable means of intellectual property protection. There is evidence that the courts consider watermarks to be a legitimate form of copyright protection. Watermarking facilitates redress, and represents a form of copyright protection that universities can use without being inconsistent in their mission to disseminate knowledge.
international conference on acoustics, speech, and signal processing | 2001
Aparna Gurijala; John R. Deller
Most digital watermarking techniques are susceptible to damage by data cropping. Although the effects of cropping might not be perceptible, watermark recovery may be rendered difficult or impossible due to the desynchronization of the recovery process. The transform encryption coding (TEC) based watermarking algorithm was presented at ICASSP 2000 (see Ruiz, F.J. and Deller, J.R., Jr, IEEE International Conference on Acoustics, Speech and Signal Processing 2000). This paper investigates the performance of TEC watermarking in the presence of cropping, and presents an algorithm that identifies cropped samples and recovers watermarks from the damaged record. Implementation details and experimental results under different environmental conditions are presented.
acm/ieee joint conference on digital libraries | 2001
John R. Deller; Aparna Gurijala; Michael Seadle
This is one of two companion papers describing technical challenges faced in the development of the National Gallery of the Spoken Word (NGSW). The present paper describes watermarking technologies for intellectual property protection. Following an introduction to data watermarking, the paper focuses on a new algorithm called \textit{transform encryption coding} (TEC) and its application to watermarking the NGSW archives. TEC has a number of flexible features that make it amenable to the NGSW development.
acm multimedia | 2007
Aparna Gurijala; John R. Deller
Parameter-embedded watermarking is effected through slight perturbations of parametric models of some deeply-integrated dynamics of a signal. This paper is concerned with particular model form, linear prediction (LP), which is naturally suited to the application of interest, speech watermarking. The focus of this paper is on the robustness performance of LP-embedded speech watermarking. It is shown that the technique is quite robust to a wide array of attacks including noise addition, cropping, compression, filtering, and others. In the LP formulation, a set-theoretic adjunct to the parameter embedding can be used to identify a watermark that is optimally robust against certain attacks, within a quantified fidelity constraint.
international conference on multimedia and expo | 2005
Aparna Gurijala; John R. Deller
Parametric watermarking is effected by modifying the linear predictor coefficients of speech. In this work, the parameter noise is analyzed when watermarked speech is subjected to additive white and colored noise in the time domain. The paper presents two detection techniques for parametric watermarking. The first approach uses the Neyman-Pearson criterion to solve a binary decision problem. In the second approach, discriminant functions based on the minimum-error-rate criterion are used to determine which one of the many watermarks was embedded or if no watermark is present. Experiments with speech data are used to determine the false-alarm and missed detection rates
international symposium on circuits and systems | 2006
Aparna Gurijala; John R. Deller; Dale Joachim
Parameter-embedded watermarking is effected through slight perturbations of parametric models of some deeply-integrated dynamics of the speech signal. In set-membership filtering (SMF) based parametric watermarking, linear predictor (LP) coefficients of the original speech are modified subject to an objective fidelity constraint. SMF is used to obtain sets of allowable parameter perturbations (i.e., watermarks) subject to a constraint on the error between the watermarked and original material. This paper discusses the robustness of SMF based watermarking to filtering, quantization and combination attacks. An important consideration in watermark robustness is the energy of the watermark signal (difference between watermarked and original signals). The most robust watermark is obtained from perturbed LP coefficients at the boundary of the membership set. A constrained optimization problem is solved to obtain the best watermarks for filtering and quantization attacks
Proceedings of SPIE | 2011
Aparna Gurijala; Alastair M. Reed; Eric Evans
The paper presents a watermark robustness model based on the mobile phone cameras spatial frequency response and watermark embedding parameters such as density and strength. A new watermark robustness metric based on spatial frequency response is defined. The robustness metric is computed by measuring the area under the spatial frequency response for the range of frequencies covered by the watermark synchronization signal while excluding the interference due to aliasing. By measuring the distortion introduced by a particular camera, the impact on watermark detection can be understood and quantified without having to conduct large-scale experiments. This in turn can provide feedback on adjusting the watermark embedding parameters and finding the right trade-off between watermark visibility and robustness to distortion. In addition, new devices can be quickly qualified for their use in smart image applications. The iPhone 3G, iPhone 3GS, and iPhone 4 camera phones are used as examples in this paper to verify the behavior of the watermark robustness model.