Skip to main content

NDFT-Based Audio Watermarking Scheme with High Robustness Against Malicious Attack

  • Chapter
Book cover Intelligent Computing in Signal Processing and Pattern Recognition

Part of the book series: Lecture Notes in Control and Information Sciences ((LNCIS,volume 345))

Abstract

Due to public frequency points leading to weak robustness against malicious attack in DFT-based audio watermarking algorithm, a novel audio watermarking scheme based on nonuniform discrete Fourier transform (NDFT) is proposed to improve robustness against malicious attack in this paper. NDFT transform could set up random sampling points in frequency domain as desired rather than fixed frequency points in DFT. The characteristic of NDFT provides the possibility to hide embedding positions. In the NDFT-domain selectable frequency range which satisfies necessary requirements of audio watermarking scheme, the proposed scheme utilizes chaotic system to select embedding points for random and hidden embedding positions. Theoretical analysis and simulation results show that the proposed scheme not only guarantees robustness against common operations, but also further improves systemic security and robustness against malicious attack due to the secret embedding position.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM System Journal. (1996) 313–336

    Google Scholar 

  2. Wu, S. Q, Huang, J. W., Huang, D., Yun, Q. Shi: Efficiently Self-synchronized Audio Watermarking for Assured Audio Data Transmission. IEEE Transactions on Broadcasting. (2005) 69–76

    Google Scholar 

  3. Yang, H.Y., Wang, X.Y., Zhao, H.: A New Digital Audio Watermarking Algorithm for Copyright Protection. Microelectronics and Computer. (2004) 12–18

    Google Scholar 

  4. Muhammad Khurram Khan, Zhang, J.S., Tian, L.: Protecting Biometric Data for Personal Identification, Lecture Notes in Computer Science, Springer-Verlag, (2004) 629–38

    Google Scholar 

  5. Wang, Q.S., Sun, S.H.: Watermark Embedding Algorithms Based on Quantizing Frequency Domain Parameters of Digital Audio Signal. Acta Acustica. (2002) 379–385

    Google Scholar 

  6. A. Kerckhoff. La Cryptographie Militaire: Journal des Sciences Militaires 9th series. (1883) 5–38, 161–191

    Google Scholar 

  7. Sonali Bagchi, Sanjit K Mitra: The Nonuniform Discrete Fourier Transform and its Application in Filter Design. IEEE Trans. on Circuits and System-II:Analog and Digital Signal Processing. (1996) 422–433

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Xie, L., Zhang, J., He, H. (2006). NDFT-Based Audio Watermarking Scheme with High Robustness Against Malicious Attack. In: Huang, DS., Li, K., Irwin, G.W. (eds) Intelligent Computing in Signal Processing and Pattern Recognition. Lecture Notes in Control and Information Sciences, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-37258-5_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-37258-5_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37257-8

  • Online ISBN: 978-3-540-37258-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics