Advertisement

A Semi-Fragile Digital Audio Watermarking Scheme for MP3-Encoded Signals Using Huffman Data

  • Salma MasmoudiEmail author
  • Maha Charfeddine
  • Chokri Ben Amar
Article
  • 9 Downloads

Abstract

Dynamic development in the field of information technologies, storage and sharing a large amount of data via Internet, raises the following question: How to ensure and protect a multimedia document against illegal distribution, reproduction and copying? One of the proposed solutions is digital watermarking which is an approach that embeds imperceptible information into digital data. Although most of the known algorithms operate in the uncompressed or linear domain, few are able to embed watermarks in the compressed domain. This paper describes an audio watermarking scheme that operates directly in the compressed domain. It inserts watermark in MP3 bit streams. Our scheme uses Huffman data mainly big values region and recompression calibration to hide secret information. Furthermore, it allows blind retrieval of an embedded watermark which does not need the original audio. Experimental results prove the imperceptibility of the proposed method and the robustness against several attacks.

Keywords

Audio watermarking MP3 compression Huffman data Big values region Robustness 

Notes

Acknowledgements

The authors would like to thank Professor Mohamed Adel ALIMI from REGIM (REsearch Group on Intelligent Machines) laboratory for his advice and the fruitful discussions elaborated with him. The research leading to these results received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the grant agreement number LR11ES48.

References

  1. 1.
    K. Aniruddha, A. Gnanasekaran, A blind audio watermarking scheme employing DCT-HT-SD technique. Circuits Syst. Signal Process. 38(8), 3697–3714 (2018)Google Scholar
  2. 2.
    T. Bouchrika, M. Zaied, O. Jemai, C. Ben Amar, Ordering computers by hand gestures recognition based on wavelet networks, in Proceedings of the 2nd International Conference on Communications Computing and Control Applications, Marseilles, France (2012). pp. 1–6. https://doi.org/10. 1109/CCCAGoogle Scholar
  3. 3.
    H. Boughrara, M. Chtourou, C. Ben Amar, MLP neural network based face recognition system using constructive training algorithm, in Proceedings of the 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, Tangier, Morocco (2012), pp. 233–238Google Scholar
  4. 4.
    M. Charfeddine, M. El’Arbi, C. Ben Amar, A new DCT audio watermarking scheme based on preliminary MP3 study. Multimed. Tools Appl. 70(3), 1521–1557 (2012)CrossRefGoogle Scholar
  5. 5.
    F. Chaabane, M. Charfeddine, C. Ben Amar, A multimedia tracing traitors scheme using multi-level hierarchical structure for tardos fingerprint based audio watermarking, in Proceedings of the 2014 IEEE International Conference on Signal Processing and Multimedia Applications (SIGMAP), Vienna, Austria (2014), pp. 289–296Google Scholar
  6. 6.
    F. Chaabane, M. Charfeddine, C. Ben Amar, A survey on digital tracing traitors schemes, in Proceedings of the IEEE 9th International Conference on Information Assurance and Security (IAS), Gammarth, Tunisia (2013), pp. 85–90Google Scholar
  7. 7.
    N. Cvejic, T. Seppänen, Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks (Information Science Reference, Hershey, 2008)CrossRefGoogle Scholar
  8. 8.
    M. El’Arbi, M. Charfeddine, S. Masmoudi, M. Koubaa, C. Ben Amar, Video watermarking algorithm with BCH error correcting codes hidden in audio channel, in Proceedings of the, IEEE Symposium Series in Computational Intelligence. Paris (2011), pp. 164–17Google Scholar
  9. 9.
    M. El’Arbi, C. Ben Amar, H. Nicolas, Video watermarking based on neural networks, in Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, Toronto, Canada (2006), pp. 1577–1580Google Scholar
  10. 10.
    M. Guedri, M. Zaied, C. Ben Amar, Indexing and images retrieval by content, in Proceedings of the 2011 International Conference on High Performance Computing and Simulation, HPCS 2011, Istanbul, Turkey (2011), pp. 369–375Google Scholar
  11. 11.
    International Organization for Standardization/International Electrotechnical Commission, Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s, ISO/IEC 11172 (1993)Google Scholar
  12. 12.
    M. Koubaa, M. El’Arbi, C. Ben Amar, H. Nicolas, H. Collusion, MPEG4 compression and frame dropping resistant video watermarking. Multimed. Tools Appl. 56(2), 281–301 (2012)CrossRefGoogle Scholar
  13. 13.
    A. Lang, et al., Audio watermark attacks: from single to profile attacks, in Proceedings of the 7th Workshop on Multimedia and Security (ACM), New York, NY, USA (2005), pp. 39–50Google Scholar
  14. 14.
    E. Mezghani, M. Charfeddine, C. Ben Amar, Audio silence deletion before and after MPEG video compression, in Proceedings of the 2013 IEEE International Conference on Computer Applications Technology (ICCAT), Sousse, Tunisia (2013), pp. 1–5Google Scholar
  15. 15.
    M. Mejdoub, L. Fonteles, C. Ben Amar, M. Antonini, Fast indexing method for image retrieval using tree-structured lattices, in Proceedings of the 2008 International Workshop on Content-Based Multimedia Indexing, CBMI 2008, London, UK (2008), pp. 365–372Google Scholar
  16. 16.
    S. Masmoudi, M. Charfeddine, C. Ben Amar, Robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multiresolution domain, in Proceedings of the, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). Luxor, Egypt (2010), pp. 326–331Google Scholar
  17. 17.
    M. Othmani, W. Bellil, C. Ben Amar, A.M. Alimi, A new structure and training procedure for multi-mother wavelet networks. Int. J. Wavelets Multiresolut. Inf. Process. 8(1), 149–175 (2010)MathSciNetCrossRefGoogle Scholar
  18. 18.
    R. Raissi, The theory behind MP3. MP3’Tech (2002)Google Scholar
  19. 19.
    A.V. Subramanyam, S. Emmanuel, Audio watermarking in partially compressed-encrypted domain, in Proceedings of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, South Korea (2012), pp. 2867–2872Google Scholar
  20. 20.
    I. Teyeb, O. Jemai M. Zaied, C. Ben Amar, A novel approach for drowsy driver detection using head posture estimation and eyes recognition system based on wavelet network, in Proceedings of the 5th International Conference on Information, Intelligence, Systems and Applications, Chania, Greece (2014), pp. 379–384Google Scholar
  21. 21.
    Union Internationale des Télécommunications (UIT) . Recommandation B.S. 1387 . Méthode de mesure objective de la qualité du son perçu (2001)Google Scholar
  22. 22.
    A. Wali, N. Ben Aoun, H. Karray, C. Ben Amar, A.M. Alimi, A New System for Event Detection from Video Surveillance Sequences, Lecture Notes in Computer Science, 6475 LNCS (PART 2) (Springer, Berlin, 2010), pp. 110–120Google Scholar
  23. 23.
    B. Yang, et al., Lossless and secure watermarking scheme in MP3 audio by modifying redundant bit in the frames, in The Proceedings of the IEEE 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), Vol. 1, Xi’an, China (2013), pp. 154–157Google Scholar
  24. 24.
    S. Zhaopin et al., Window switching strategy based semi-fragile watermarking for MP3 tamper detection. Multimed. Tools Appl. 76(7), 9363–9386 (2017)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Salma Masmoudi
    • 1
    Email author
  • Maha Charfeddine
    • 1
  • Chokri Ben Amar
    • 1
  1. 1.REGIM-LAB: REsearch Group on Intelligent Machines University of Sfax, National Engineering School of Sfax (ENIS)SfaxTunisia

Personalised recommendations