Detectors for Echo Hiding Systems
Echo hiding is a method of hiding information in an audio clip by the addition of embedding imperceptible echoes. The echoes are detected by various methods, including autocorrelation and cepstral analysis. We treat echo hiding as general multiplicative embedding in the frequency domain, and derive appropriate detectors based on various statistical models of audio FFT coefficients. This results in several detectors that are both simpler and more powerful than cepstral detection. We also observe that detection by simple correlation in the log-spectral domain performs very well in contrast to much more complicated approaches.
KeywordsFalse Alarm Rate Audio Signal Frame Size Audio Data Detector Structure
Unable to display preview. Download preview PDF.
- R.P. Bogert, M. J. Healy and J.W. Tukey, “The Quefrency Alanysis of Time Series for Echoes: Cepstrum, Pseudo-Autocovariance, Cross-Ceptsrum and Saphe-Cracking,” Proceedings of the Symposium on Time Series Analysis, Brown University, jun 1962. pp. 209–243. 249Google Scholar
- S. Craver, M. Wuand B. Liu, “What Can We Reasonably Expect From Watermarks?”, Proceedings of IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 2001.Google Scholar
- D. Gruhl, A. Lu and W. Bender, “Echo Hiding,” 1st workshop on Info. Hiding, 1996. 247, 248, 250Google Scholar
- R. Harris, “Whatever Happened to SDMI?,” Associated Press, 29 Apr. 2002. 248Google Scholar
- F.A.P. Petitcolas, R. J. Anderson and M. Kuhn “Attacks on Copyright Marking Systems,” 2nd workshop on Info. Hiding, 1998. 248, 254Google Scholar
- R. Petrovic, J. M. Winograd, K. Jemili and E. Metois, “Apparatus and method for encoding and decoding information in analog signals,” US Patent No 05940135, August 1999. 247, 249Google Scholar
- H.V. Poor, An Introduction to Signal Detection and Estimation, 2nd ed. Berlin-Heidelberg: Springer-Verlag, 1998. 250Google Scholar
- J.G. Proakis, Digital Communications, 3rd ed. Boston, MA: McGraw-Hill, 1995. 252Google Scholar
- Secure Digital Music Initiative, “Call for Proposals for Phase II Screening Technology, Version 1.0,” February 2000. 248Google Scholar
- J. Stern and J. Boeuf, “An Analysis of One of the SDMI Candidates,” 4th workship Workshop on Info. Hiding, 2001. 248Google Scholar
- M. Wu, B. Liu, S. Craver, D. Dean, A. Stubblefield, D. Wallach, B. Swartzlander, and E. Felten, “Reading Between the Lines: Lessons Learned from the SDMI Challenge,” Proceedings of the 10th USENIX security symposium, Washington DC, August 2001. 248Google Scholar