Skip to main content

How could music contain hidden information?

  • Chapter

Abstract

Audio watermarking started in the 1990s as a modern and very technical version of playing cat and mouse.1 The music industry, dominated by the “big four” record groups, also known as the “Majors” (Sony BMG, EMI, Universal, and Warner), quickly realized that the availability of digital media for music recordings and the possibility to transfer it fast and degradation-free (thanks to the availability of high data-rate networks and of efficient data compression standards) would not only offer many benefits in terms of market expansion, but also expose their business to a great danger: that of piracy of intellectual property rights. Being able to insert proprietary marks in the media without affecting audio quality (i.e., in a “transparent way”) was then recognized as a first step toward solving this issue. Additionally, ensuring the robustness of the proprietary mark to not only to usual media modifications (such as cropping, filtering, gain modification, or compression) but also to more severe piracy attacks quickly became a hot research topic worldwide.

Why not Attempt To hidE the very pResence of a MessAge in an audio tRacK ?

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   59.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Arnold M, Wolthusen S, Schmucker M (2003) Techniques and applications of digital water-marking and content protection. Artech House Publishers, Norwood, MA

    Google Scholar 

  • Baras C, Moreau N, Dymarski P (2006) Controlling the inaudibility and maximizing the robustness in an audio annotation watermarking system. IEEE Transactions on Audio, Speech and Language Processing, 14–5:1772–1782

    Article  Google Scholar 

  • Bows Y (2007) Break our Watermarking system, 2nd edition [online] Available: http://bows2.gipsa-lab.inpg.fr [02/1/2008]

    Google Scholar 

  • Chen B, Wornell G (2001) Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47:1423–1443

    Article  MathSciNet  MATH  Google Scholar 

  • Costa M (1983) Writing on dirty paper. IEEE Transactions on Information Theory, 29:439–441

    Article  MATH  Google Scholar 

  • Cox I, Miller M, Bloom J (2001) Digital watermarking: Principles and practice Morgan Kaufmann, San Francisco, CA

    Google Scholar 

  • Cox I, Miller M, McKellips A (1999) Watermarking as communications with side information. Proceedings of the IEEE, 87–7:1127–1141

    Article  Google Scholar 

  • Craver SA, Wu M, Liu B (2001) What can we reasonably expect from watermarks? Proceedings of the IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, New Paltz, NY, 223–226

    Google Scholar 

  • Furon T, Cayre F, Fontaine C (2007) Watermarking security. In: Cvejic and Seppanen (eds) Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks. Information Science Reference, Hershey, PA, USA

    Google Scholar 

  • Haykin S (1996) Adaptive filter theory, 3rd ed. Prentice-Hall, Upper Saddle River, NJ, USA

    Google Scholar 

  • Jobs S (2007) Thoughts on music, [online] Available: http://www.apple.com/ hotnews/thoughtsonmusic/ [26/9/2007]

    Google Scholar 

  • Larbi S, Jaïdane M, Moreau N (2004). A new Wiener filtering based detection scheme for time domain perceptual audio watermarking. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Montreal, Canada, 5:949–952

    Google Scholar 

  • Lee SK, Ho YS (2000) Digital audio watermarking in the cepstrum domain. IEEE Transactions on Consumer Electronics, 46–3: 744–750

    Article  MathSciNet  Google Scholar 

  • LoboGuerrero A, Bas P, Lienard J (2003) Iterative informed audio data hiding scheme using optimal filter. In Proc. IEEE Int. Conf. on Communication Technology, Beijing, China, 1408–1411

    Google Scholar 

  • Malvar H, Florencio D (2003) Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, 51–4:898–905

    Article  MathSciNet  Google Scholar 

  • Massey JL (1994) Information theory aspects of spread-spectrum communications. IEEE Third International Symposium on Spread Spectrum Techniques and Applications (ISSSTA), 1:16–21

    Article  Google Scholar 

  • Pan JS, Huang HC, Jain LC (2004) Intelligent watermarking techniques (Innovative Intelligence). World Scientific Publishing Company, Singapore

    Google Scholar 

  • Peterson RL, Ziemer RA, Borth DE (1995) Introduction to spread spectrum communications. Prentice Hall, Upper Saddle River, NJ, USA

    Google Scholar 

  • Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding -a survey. Proceedings IEEE, Special Issue on Protection of Multimedia Content, 87(7):1062–1078

    Google Scholar 

  • Proakis J (2001) Digital communications, 4th ed. McGraw-Hill, New York, USA

    Google Scholar 

  • Proakis JG, Salehi M, Bauch G (2004) Contemporary communication systems using MATLAB and SIMULINK. Brooks/Cole-Thomson Learning, Belmont, CA, USA

    Google Scholar 

  • Shannon C (1958) Channel with side information at the transmitter. IBM Journal of Research and Development, 2:222–293

    Article  MathSciNet  Google Scholar 

  • Siebenhaar F, Neubauer C, Herre J, Kulessa R (2001) New results on combined audio compression/watermarking. In 111th Convention of Audio Engineering Society (AES), New York, USA, preprint 5442

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media New York

About this chapter

Cite this chapter

Baras, C., Moreau, N., Dutoit, T. (2009). How could music contain hidden information?. In: Applied Signal Processing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-74535-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-74535-0_7

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-74534-3

  • Online ISBN: 978-0-387-74535-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics