Skip to main content

Performance Evaluation of Audio Watermarking

  • Chapter
  • First Online:
Audio Watermark
  • 2113 Accesses

Abstract

In Chap. 4, the embedding and detection algorithms of the proposed audio watermarking scheme were analyzed theoretically. The aim of this chapter is to examine system performance in terms of imperceptibility, robustness, security, data payload, and computational complexity, as required in Sect. 1.3.1..

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Additive noise attack is a commonly used attack in robustness test of audio watermarking techniques. As clearly indicated in Appendix A and B, SDMI standard and STEP 2000 employ 36 dB and 40 dB additive noise attack respectively. Therefore, a rigorous additive noise attack with a lower SNR value, i.e., 36 dB additive noise attack, is chosen for our basic robustness test listed in Appendix E.

  2. 2.

    The 3.5 kHz low-pass filtered version refers to a version of host audio filtered by a 3.5 kHz low-pass filter, and the 96 kbps MP3 compressed version refers to a version of host audio after MP3 compression at 96 kbps.

  3. 3.

    In fact, the noises are quite loud already, as proved by the ODGs.

  4. 4.

    The attacks with symbol ∗ in Table 5.15 are described as follows. Under the “NA” category, the schemes in [5, 7] did not specify the value of the SNR. Under the “AM” category, the schemes in [5, 7] compressed the amplitude with a nonlinear gain function. Under the “LP” category, the schemes in [3, 8] tested band-pass filtering only. Under the “TSM” category, the schemes in [9, 10] implemented random stretching (at ± 4 % and ± 8 %, respectively) merely by omitting or inserting a random number of samples, which is considered similar to random sample cropping/inserting.

  5. 5.

    These unlisted attacks were undertaken in several schemes as follows. Requantization: only the scheme in [3] tested 8-bit requantization and the detection succeeded. DA/AD conversion: the schemes in [4, 710] tested DA/DA conversion and the detections succeeded. Cropping: the schemes in [2, 4, 5] tested different cropping operations and the detections succeeded. Jittering: the schemes in [2, 5] tested different jittering operations and the detections succeeded. TPPSM: the scheme in [1] tested ± 1 % pitch-scaling and the detection succeeded; the scheme in [3] tested the case that the pitch is shifted up by two semitones and the detections completely failed; the schemes in [9, 10] implemented pitch shifting (at ± 4 % and ± 8 % respectively) merely by linear interpolation without anti-alias filtering and the detections succeeded.

  6. 6.

    It was reported as “noise addition that can be heard clearly by everybody [5].”

References

  1. H. Malik, R. Ansari, A. Khokhar, Robust audio watermarking using frequency-selective spread spectrum. IET Inform. Secur. 2(4), 129–150 (2008)

    Article  Google Scholar 

  2. S.J. Xiang, H.J. Kim, J.W. Huang, Audio watermarking robust against time-scale modification and mp3 compression. Signal Process. 88(10), 2372–2387 (2008)

    Article  MATH  Google Scholar 

  3. O.T.-C. Chen, W.-C. Wu, Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Trans. Audio Speech Lang. Process. 16(3), 629–638 (2008)

    Article  Google Scholar 

  4. X. He, Watermarking in Audio: Key Techniques and Technologies (Cambria Press, Youngstown, 2008)

    Google Scholar 

  5. W. Li, X. Y. Xue, P.Z. Lu, Localized audio watermarking technique robust against time-scale modification. IEEE Trans. Multimed. 8(1), 60–69 (2006)

    Article  Google Scholar 

  6. M.F. Mansour, A.H. Tewfik, Data embedding in audio using time-scale modification. IEEE Trans. Speech Audio Process. 13(3), 432–440 (2005)

    Article  Google Scholar 

  7. N. Cvejic, T. Seppanen, Robust audio watermarking in wavelet domain using frequency hopping and patchwork method, in Proceedings of the 3rd International Symposium on Image and Signal Processing and Analysis, 2003, pp. 251–255

    Google Scholar 

  8. D. Kirovsk, H.S. Malvar, Spread-spectrum watermarking of audio signals. IEEE Trans. Signal Process. 51(4), 1020–1033 (2003)

    Article  MathSciNet  Google Scholar 

  9. R. Tachibana, S. Shimizu, S. Kobayashi, An audio watermarking method using a two-dimensional pseudo-random array. Signal Process. 82(10), 1455–1469 (2002)

    Article  MATH  Google Scholar 

  10. R. Tachibana, Improving audio watermarking robustness using stretched patterns against geometric distortion, in Proceedings of IEEE Pacific-Rim Conference on Multimedia (PCM), 2002, pp. 647–654

    Google Scholar 

  11. S. Katzenbeisser, F.A.P. Petitcolas (eds.), Information Hiding Techniques for Steganography and Digital Watermarking (Artech House, Boston, 2000)

    Google Scholar 

  12. Y.Q. Lin, W.H. Abdulla, Audio watermarking for copyrights protection. Technical Report SoE-650, School of Engineering, The University of Auckland (2007)

    Google Scholar 

  13. ITU-R Recommendation BS.1534-1, ITU-R Recommendation BS.1534-1: Method for the Subjective Assessment of Intermediate Quality Level of Coding Systems, 2003

    Google Scholar 

  14. P. Kabal, An examination and interpretation of ITU-R BS.1387: Perceptual evaluation of audio quality. Technical Report, TSP Lab, McGill University (2003) [Online], http://www-mmsp.ece.mcgill.ca/Documents

  15. C.-W. Tang, H.-M. Hang, A feature-based robust digital image watermarking scheme. IEEE Trans. Signal Process. 51(4), 950–959 (2003)

    Article  MathSciNet  Google Scholar 

  16. N. Collins, Introduction to Computer Music (Wiley, New York, 2009)

    Google Scholar 

  17. A. Lang, Documentation for Stirmark for Audio (2002) [Online], http://amsl-smb.cs.uni-magdeburg.de/stirmark/doc/index.html

  18. H. Zhao, M. Wu, Z.J. Wang, K.J.R. Liu, Nonlinear collusion attacks on independent fingerprints for multimedia. Proc. ICASSP 5, 664–667 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Lin, Y., Abdulla, W.H. (2015). Performance Evaluation of Audio Watermarking. In: Audio Watermark. Springer, Cham. https://doi.org/10.1007/978-3-319-07974-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07974-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07973-8

  • Online ISBN: 978-3-319-07974-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics