Digital Audio Watermarking by Amplitude Embedding System
This paper proposed an amplitude embedding system for digital audio watermarking in the wavelet domain. In this paper, the relationship between the watermarked coefficients and the original coefficients is first presented and then amplitude-based embedding rules are combined into an amplitude-based embedding system that incorporates a system state. For the embedding in this system, the information includes synchronization codes and the watermarks are embedded into the DWT lowest frequency sub-band coefficients which can be described by a matrix form. Moreover, the SNR is rewritten as a performance index which is a quadratic form. Then, a nonlinear function connecting the performance index and the embedding system is derived. Accordingly, an optimization-based embedding system is proposed. Finally, the Karush–Kuhn–Tucker (KKT) Theorem is used to obtain the optimal solution, which is an important formula for watermarking. In addition, the hidden information can be extracted without knowledge of the original audio. In the experiments, the performance of the proposed system is tested and the results verify the high SNR and strong robustness against multimedia signal processing or malicious attacks.
KeywordsAmplitude Embedding system Audio watermarking Wavelet SNR Optimal
- 3.Chen, S.-T., Huang, H.-N., Chen, C.-C., Tseng, K.-K., Tu, S.-Y.: Adaptive audio watermarking via the optimization point of view on wavelet-based entropy, pp. 971–980. Digital Signal Processing, Elsevier (2013)Google Scholar
- 5.Chen, S.-T., Guo, Y.-J., Huang, H.-N., Kung, W.-M., Tseng, K.-K., Tu, S.-Y.: Hiding patients confidential data in the ecg signal via a transform-domain quantization scheme. J. Med. Syst. 38(6), 54 (2014)Google Scholar
- 8.Zhao, M., Pan, J.-S., Chen, S.-T.: Entropy-based audio watermarking via the point of view on the compact particle swarm optimization. J. Internet Technol. 16(3), 485–495 (2015)Google Scholar
- 10.Lee, M.-C., Lau, C.-Y.:Three orders mixture algorithm of audio steganography combining cryptography. J. Inf. Hiding Multimed. Signal Process. 9(4) (2018)Google Scholar