Abstract
In Chap. 4, the embedding and detection algorithms of the proposed audio watermarking scheme were analyzed theoretically. The aim of this chapter is to examine system performance in terms of imperceptibility, robustness, security, data payload, and computational complexity, as required in Sect. 1.3.1..
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Additive noise attack is a commonly used attack in robustness test of audio watermarking techniques. As clearly indicated in Appendix A and B, SDMI standard and STEP 2000 employ 36 dB and 40 dB additive noise attack respectively. Therefore, a rigorous additive noise attack with a lower SNR value, i.e., 36 dB additive noise attack, is chosen for our basic robustness test listed in Appendix E.
- 2.
The 3.5 kHz low-pass filtered version refers to a version of host audio filtered by a 3.5 kHz low-pass filter, and the 96 kbps MP3 compressed version refers to a version of host audio after MP3 compression at 96 kbps.
- 3.
In fact, the noises are quite loud already, as proved by the ODGs.
- 4.
The attacks with symbol ∗ in Table 5.15 are described as follows. Under the “NA” category, the schemes in [5, 7] did not specify the value of the SNR. Under the “AM” category, the schemes in [5, 7] compressed the amplitude with a nonlinear gain function. Under the “LP” category, the schemes in [3, 8] tested band-pass filtering only. Under the “TSM” category, the schemes in [9, 10] implemented random stretching (at ± 4 % and ± 8 %, respectively) merely by omitting or inserting a random number of samples, which is considered similar to random sample cropping/inserting.
- 5.
These unlisted attacks were undertaken in several schemes as follows. Requantization: only the scheme in [3] tested 8-bit requantization and the detection succeeded. DA/AD conversion: the schemes in [4, 7–10] tested DA/DA conversion and the detections succeeded. Cropping: the schemes in [2, 4, 5] tested different cropping operations and the detections succeeded. Jittering: the schemes in [2, 5] tested different jittering operations and the detections succeeded. TPPSM: the scheme in [1] tested ± 1 % pitch-scaling and the detection succeeded; the scheme in [3] tested the case that the pitch is shifted up by two semitones and the detections completely failed; the schemes in [9, 10] implemented pitch shifting (at ± 4 % and ± 8 % respectively) merely by linear interpolation without anti-alias filtering and the detections succeeded.
- 6.
It was reported as “noise addition that can be heard clearly by everybody [5].”
References
H. Malik, R. Ansari, A. Khokhar, Robust audio watermarking using frequency-selective spread spectrum. IET Inform. Secur. 2(4), 129–150 (2008)
S.J. Xiang, H.J. Kim, J.W. Huang, Audio watermarking robust against time-scale modification and mp3 compression. Signal Process. 88(10), 2372–2387 (2008)
O.T.-C. Chen, W.-C. Wu, Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Trans. Audio Speech Lang. Process. 16(3), 629–638 (2008)
X. He, Watermarking in Audio: Key Techniques and Technologies (Cambria Press, Youngstown, 2008)
W. Li, X. Y. Xue, P.Z. Lu, Localized audio watermarking technique robust against time-scale modification. IEEE Trans. Multimed. 8(1), 60–69 (2006)
M.F. Mansour, A.H. Tewfik, Data embedding in audio using time-scale modification. IEEE Trans. Speech Audio Process. 13(3), 432–440 (2005)
N. Cvejic, T. Seppanen, Robust audio watermarking in wavelet domain using frequency hopping and patchwork method, in Proceedings of the 3rd International Symposium on Image and Signal Processing and Analysis, 2003, pp. 251–255
D. Kirovsk, H.S. Malvar, Spread-spectrum watermarking of audio signals. IEEE Trans. Signal Process. 51(4), 1020–1033 (2003)
R. Tachibana, S. Shimizu, S. Kobayashi, An audio watermarking method using a two-dimensional pseudo-random array. Signal Process. 82(10), 1455–1469 (2002)
R. Tachibana, Improving audio watermarking robustness using stretched patterns against geometric distortion, in Proceedings of IEEE Pacific-Rim Conference on Multimedia (PCM), 2002, pp. 647–654
S. Katzenbeisser, F.A.P. Petitcolas (eds.), Information Hiding Techniques for Steganography and Digital Watermarking (Artech House, Boston, 2000)
Y.Q. Lin, W.H. Abdulla, Audio watermarking for copyrights protection. Technical Report SoE-650, School of Engineering, The University of Auckland (2007)
ITU-R Recommendation BS.1534-1, ITU-R Recommendation BS.1534-1: Method for the Subjective Assessment of Intermediate Quality Level of Coding Systems, 2003
P. Kabal, An examination and interpretation of ITU-R BS.1387: Perceptual evaluation of audio quality. Technical Report, TSP Lab, McGill University (2003) [Online], http://www-mmsp.ece.mcgill.ca/Documents
C.-W. Tang, H.-M. Hang, A feature-based robust digital image watermarking scheme. IEEE Trans. Signal Process. 51(4), 950–959 (2003)
N. Collins, Introduction to Computer Music (Wiley, New York, 2009)
A. Lang, Documentation for Stirmark for Audio (2002) [Online], http://amsl-smb.cs.uni-magdeburg.de/stirmark/doc/index.html
H. Zhao, M. Wu, Z.J. Wang, K.J.R. Liu, Nonlinear collusion attacks on independent fingerprints for multimedia. Proc. ICASSP 5, 664–667 (2003)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lin, Y., Abdulla, W.H. (2015). Performance Evaluation of Audio Watermarking. In: Audio Watermark. Springer, Cham. https://doi.org/10.1007/978-3-319-07974-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-07974-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07973-8
Online ISBN: 978-3-319-07974-5
eBook Packages: EngineeringEngineering (R0)