Skip to main content

Proposed Audio Watermarking Scheme

  • Chapter
  • First Online:
Audio Watermark
  • 2122 Accesses

Abstract

Imperceptibility, robustness, and security are vital considerations in the design of any audio watermarking scheme for copyrights protection. In this chapter, a spread spectrum (SS)-based audio watermarking technique which involves the psychoacoustic model, multiple scrambling, adaptive synchronization, frequency alignment, and coded-image watermark is presented. To preserve the perceptual quality of the watermarked signal, amplitude shaping using the psychoacoustic model is employed. Also, the proposed scheme integrates multiple scrambling operations into the embedding process to prevent unauthorized detection. That is, the amount and position of the slots used for embedding each watermark bit are randomly set and certain subbands are randomly selected for the embedding. Moreover, adaptive synchronization and frequency alignment are developed to retrieve the watermarks from the attacked watermarked signals that suffer loss of synchronization. In addition, the information to be embedded can be encrypted with a coded-image, so as to provide a semantic meaning for verification as well as extra security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    As mentioned in Sect. 4.1.2, the tile is the basic module for amplitude modulation in the watermark embedding. Therefore, the detection is focused directly on the tiles, not the slots.

  2. 2.

    As defined in Sect. 1.2.1, the input to the watermark detector is generally called the attacked signal, no matter whether it has been attacked or not. In the case that a watermarked signal has been attacked, we specifically call it an attacked watermarked signal.

  3. 3.

    The random stretching attack used by [9, 10] which was implemented by omitting or inserting a random number of samples (usually called “random samples cropping/inserting”) and the pitch shifting attack by linear interpolation are much less complicated than PITSM and TPPSM.

  4. 4.

    The word “watermarking” is abbreviated as “wming” in the first two boxes in Fig. 4.8.

  5. 5.

    By definition, a coded-image belongs to a binary image, which has only two values for each pixel.

  6. 6.

    Appcr1: Character Recognition at http://www.mathworks.com/access/helpdesk/help/toolbox/nnet/.

References

  1. S.J. Xiang, H.J. Kim, J.W. Huang, Audio watermarking robust against time-scale modification and mp3 compression. Signal Process. 88(10), 2372–2387 (2008)

    Article  MATH  Google Scholar 

  2. X. He, Watermarking in Audio: Key Techniques and Technologies (Cambria Press, Youngstown, 2008)

    Google Scholar 

  3. W. Li, X. Y. Xue, P.Z. Lu, Localized audio watermarking technique robust against time-scale modification. IEEE Trans. Multimed. 8(1), 60–69 (2006)

    Article  Google Scholar 

  4. M.F. Mansour, A.H. Tewfik, Data embedding in audio using time-scale modification. IEEE Trans. Speech Audio Process. 13(3), 432–440 (2005)

    Article  Google Scholar 

  5. R. Tachibana, S. Shimizu, S. Kobayashi, An audio watermarking method using a two-dimensional pseudo-random array. Signal Process. 82(10), 1455–1469 (2002)

    Article  MATH  Google Scholar 

  6. R. Tachibana, Improving audio watermarking robustness using stretched patterns against geometric distortion, in Proceedings of IEEE Pacific-Rim Conference on Multimedia (PCM), 2002, pp. 647–654

    Google Scholar 

  7. E. Zwicker, H. Fastl, Psychoacoustics: Facts and Models (Springer, Berlin, 1990)

    Google Scholar 

  8. I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and Steganography (Morgan Kaufmann Publishers, San Francisco, 2008)

    Google Scholar 

  9. C.-P. Wu, P.-C. Su, C.-C.J. Kuo, Robust and efficient digital audio watermarking using audio content analysis, in Proceedings of SPIE Security and Watermarking of Multimedia Contents II, vol. 3971, 2000, pp. 382–392

    Google Scholar 

  10. C.-T. Hsieh, P.-Y. Sou, Blind cepstrum domain audio watermarking based on time energy features, in Proceedings of International Conference on Digital Signal Processing (DSP), vol. 2, 2002, pp. 705–708

    Google Scholar 

  11. B.-S. Ko, R. Nishimura, Y. Suzuki, Log-scaling watermark detection in digital audio watermarking. Proc. ICASSP 3, 81–84 (2004)

    Google Scholar 

  12. P. Bas, J.-M. Chassery, B. Macq, Geometrically invariant watermarking using feature points. IEEE Trans. Image Process. 11(9), 1014–1028 (2002)

    Article  Google Scholar 

  13. F.-S. Wei, F. Xue, M.Y. Li, A blind audio watermarking scheme using peak point extraction. Proc. ISCAS 5, 4409–4412 (2005)

    Google Scholar 

  14. W.H. Abdulla, Auditory based feature vectors for speech recognition systems, in Advances in Communications and Software Technologies, ed. by N.E. Mastorakis, V.V. Kluev (WSEAS Press, Greece, 2002), pp. 231–236

    Google Scholar 

  15. Y.Q. Lin, W.H. Abdulla, Robust audio watermarking technique based on Gammatone filterbank and coded-image, in Proceedings of International Symposium on Signal Processing and Its Applications (ISSPA), 2007

    Google Scholar 

  16. D. Bailey, W. Cammack, J. Guajardo, C. Paar, Cryptography in modern communication systems, in TI DSPS FEST, pp. 1–15, 1999

    Google Scholar 

  17. Y.Q. Lin, W.H. Abdulla, A secure and robust audio watermarking scheme using multiple scrambling and adaptive synchronization, in Proceedings of the 6th International Conference on Information, Communications and Signal Processing (ICICS), 2007

    Google Scholar 

  18. Y.Q. Lin, W.H. Abdulla, Y. Ma, Audio watermarking detection resistant to time and pitch scale modification, in Proceedings of IEEE International Conference on Signal Processing and Communications (ICSPC), 2007, pp. 1379–1382

    Google Scholar 

  19. M. Kahrs, K. Brandenburg, Applications of Digital Signal Processing to Audio and Acoustics (Kluwer Academic, Boston, 1998)

    Google Scholar 

  20. C.-W. Tang, H.-M. Hang, A feature-based robust digital image watermarking scheme. IEEE Trans. Signal Process. 51(4), 950–959 (2003)

    Article  MathSciNet  Google Scholar 

  21. Y.Q. Lin, W.H. Abdulla, Multiple scrambling and adaptive synchronization for audio watermarking, in Digital Watermarking, ed. by Y.Q. Shi, H.-J. Kim, S. Katzenbeisser. Lecture Notes in Computer Science, vol. 5041 (Springer, Berlin/Heidelberg, 2007), pp. 440–453

    Google Scholar 

  22. T. Acharya, A.K. Ray, Image Processing: Principles and Applications (Wiley, Hoboken, 2005)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Lin, Y., Abdulla, W.H. (2015). Proposed Audio Watermarking Scheme. In: Audio Watermark. Springer, Cham. https://doi.org/10.1007/978-3-319-07974-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07974-5_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07973-8

  • Online ISBN: 978-3-319-07974-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics