Abstract
This paper describes an audio watermarking scheme based on lossy compression. The main idea is taken from an image watermarking approach where the JPEG compression algorithm is used to determine where and how the mark should be placed. Similarly, in the audio scheme suggested in this paper, an MPEG 1 Layer 3 algorithm is chosen for compression to determine the position of the mark bits and, thus, the psychoacoustic masking of the MPEG 1 Layer 3 compression is implicitly used. This methodology provides with a high robustness degree against compression attacks. The suggested scheme is also shown to succeed against most of the StirMark benchmark attacks for audio.
Chapter PDF
References
Petitcolas, F., Anderson, R., Kuhn, M.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 219–239. Springer, Heidelberg (1998)
Petitcolas, F., Anderson, R.: Evaluation of copyright marking systems. In: Proceedings of IEEE Multimedia Systems 1999, pp. 574–579 (1999)
Bell, A.: The dynamic digital disk. IEEE Spectrum 36, 28–35 (1999)
Swanson, M., Kobayashi, M., Tewfik, A.: Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE 86(6), 1064–1087 (1998)
Swanson, M.D., Zhu, B., Tewfik, A.: Current state of the art, challenges and future directions for audio watermarking. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems, vol. 1, pp. 19–24. IEEE Computer Society, Los Alamitos (1999)
Voyatzis, G., Pitas, I.: Protecting digital image copyrights: a framework. IEEE Computer Graphics and Applications 19, 18–24 (1999)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)
Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L.: Robust audio watermarking using perceptual masking. Elsevier Signal Processing, Special Issue on Copyright Protection And Access Control 66, 337–335 (1998)
Kim, J.L.W., Lee, W.: An audio watermarking scheme robust to mpeg audio compression. In: Proc. NSIP, Antalya, Turkey, vol. 1, pp. 326–330 (1999)
Gruhl, A.L.D., Bender, W.: Echo hiding. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 295–316. Springer, Heidelberg (1996)
Bassia, P., Pitas, I., Nikolaidis, N.: Robust audio watermarking in the time domain. IEEE Transactions on Multimedia 3, 232–241 (2001)
Domingo-Ferrer, J., Herrera-Joancomartí, J.: Simple collusion-secure fingerprinting schemes for images. In: Proceedings of the Information Technology: Coding and Computing ITCC 2000, pp. 128–132. IEEE Computer Society, Los Alamitos (2000)
Domingo-Ferrer, J., Herrera-Joancomartí, J.: Short collusion-secure fingerprinting based on dual binary hamming codes. Electronics Letters 36, 1697–1699 (2000)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Purnhagen, H.: SQAM - Sound Quality Assessment Material (2001), http://www.tnt.uni-hannover.de/project/mpeg/audio/sqam/
Steinebach, M., Petitcolas, F., Raynal, F., Dittmann, J., Fontaine, C., Seibel, S., Fates, N., Ferri, L.: Stirmark benchmark: audio watermarking attacks. In: Proceedings of the Information Technology: Coding and Computing ITCC 2001, pp. 49–54. IEEE Computer Society, Los Alamitos (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this paper
Cite this paper
Megías, D., Herrera-Joancomartí, J., Minguillón, J. (2003). A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression. In: Lioy, A., Mazzocchi, D. (eds) Communications and Multimedia Security. Advanced Techniques for Network and Data Protection. CMS 2003. Lecture Notes in Computer Science, vol 2828. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45184-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-540-45184-6_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20185-4
Online ISBN: 978-3-540-45184-6
eBook Packages: Springer Book Archive