Abstract
This paper discusses the modification of a robust digital audio watermarking scheme to allow the disclosure of the embedding and detection algorithms. The chosen scheme uses MPEG 1 Layer 3 compression to determine the position of the mark bits in the frequency domain. The marking positions would be exposed if the original embedding algorithm was disclosed. In fact, it is shown that even if an attacker did not know the exact tuning parameters used for embedding, he or she could still produce an approximate superset of the marking frequencies from only a marked copy and successfully attack the file. To avoid this problem, a secret key is introduced in the embedding and detection processes. The secret key includes the seed of a pseudo-random number generator which is used to compute the exact marking positions. The modification is then analysed in terms of capacity, imperceptibility, robustness and security. The experiments show that the modified scheme preserves most of the properties of the original one, such as robustness against MP3 compression for the most frequently used bit rates, and does introduce additional security as the mark is more difficult to erase when the embedding and detection algorithms are disclosed.
Chapter PDF
Similar content being viewed by others
References
Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Process. 83(10), 2069–2084 (2003)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Cayre, F., Fontaine, C., Furon, T.: Watermarking attack: Security of wss techniques. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 171–183. Springer, Heidelberg (2005)
Cox, I., Linnartz, J.-P.: Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications 16, 587–593 (1998)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. on Information Theory 22(6), 644–654 (1976)
Dittman, J., Steinebach, M., Lang, A., Zmudzinski, S.: Advanced audio watermarking benchmarking. In: Proceedings of the IS&T/SPIE’s 16th Annual Symposium on Electronic Imaging, Sant Jose, CA, US. Security, Steganography, and Watermarking of Multimedia Contents VI, January 2004, vol. 5306 (2004)
Domingo-Ferrer, J., Herrera-Joancomartí, J.: Short collusion-secure fingerprinting based on dual binary hamming codes. Electronics Letters 36(20), 1697–1699 (2000)
Domingo-Ferrer, J., Herrera-Joancomartí, J.: Simple collusion-secure fingerprinting schemes for images. In: Proceedings of the Information Technology: Coding and Computing ITCC 2000, pp. 128–132. IEEE Computer Society Press, Los Alamitos (2000)
EBU. SQAM - Sound Quality Assessment Material (2001), http://sound.media.mit.edu/mpeg4/audio/sqam/
Furon, T., et al.: Security analysis. Deliverable 5. 5 (2002). IST project CERTIMARK (IST-1999-10987)
ITU-R. Recommendation BS.1387. Method for objective measurements of perceived audio quality (December 1998)
Jansson, T.: Homepage for BladeEnc (2001), http://bladeenc.mp3.no/
Kalker, T.: Considerations on watermarking security. In: Proceedings of the IEEE Fourth Workshop on Multimedia Signal Processing, Cannes, France, October 2001, pp. 201–206 (2001)
Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires 9, 5–38 (1883)
Lang, A., Dittmann, J., Delp, E.J.: Application-oriented audio watermark benchmark service. In: Proceedings of the IS&T/SPIE’s 17th annual symposium on Electronic Imaging, San Jose, CA, January 2005, vol. 5681 (2005)
Lerch, A.: EAQUAL - Evaluate Audio QUALity, http://www.mp3-tech.org/programmer/sources/eaqual.tgz.
Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Transactions on Modeling and Computer Simulation 8(1), 3–30 (1998)
Megías, D., Herrera-Joancomartí, J., Minguillón, J.: A robust audio watermarking scheme based on MPEG 1 layer 3 compression. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 226–238. Springer, Heidelberg (2003)
Megías, D., Herrera-Joancomartí, J., Minguillón, J.: An audio watermarking scheme robust against stereo attacks. In: Proceedings of the Multimedia and Security Workshop, Magdeburg, Germany), September 2004, pp. 206–213. ACM Press, New York (2004)
Megías, D., Herrera-Joancomartí, J., Minguillón, J.: Robust frequency domain audio watermarking: a tuning analysis. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 244–258. Springer, Heidelberg (2005)
Thiede, T., Treurniet, W.C., Bitto, R., Schmidmer, C., Sporer, T., Beerends, J.G., Colomes, C., Keyhl, M., Stoll, G., Brandeburg, K., Feiten, B.: PEAQ – The ITU standard for objective measurement of perceived audio quality. J. Audio Eng. Soc. 48(1-2), 3–29 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Megías, D., Herrera-Joancomartí, J., Minguillón, J. (2005). Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio. In: Qing, S., Mao, W., López, J., Wang, G. (eds) Information and Communications Security. ICICS 2005. Lecture Notes in Computer Science, vol 3783. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11602897_36
Download citation
DOI: https://doi.org/10.1007/11602897_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30934-5
Online ISBN: 978-3-540-32099-9
eBook Packages: Computer ScienceComputer Science (R0)