Abstract
In this paper, an algorithm has been proposed to provide security to digital songs through amplitude modulation along with generating a secure hidden signal with an authenticating code without affecting its audible quality. Generating the hidden authenticating signal with the help of amplitude modulation for selected phases of song signal is the first phase of proposed technique followed by fabrication of authenticating code using higher frequencies above audible range. The embedded hidden secure signal as well as authenticating code will use to detect and identify the original song from similar available songs. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (“.wav”) stereo sound file.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mondal, U.K., Mandal, J.K.: A Practical Approach of Embedding Secret Key to Authenticate Tagore Songs (ESKATS). In: Wireless Information Networks & Business Information System Proceedings (WINBIS 2010), vol. 6(1), pp. 67–74. organized by Rural Nepal Technical Academy (Pvt.) Ltd., Nepal (2010)
Mondal, U.K., Mandal, J.K.: A Novel Technique to Protect Piracy of Quality Songs through Amplitude Manipulation (PPAM). In: International Symposium on Electronic System Design (ISED 2010), pp. 246–250 (2010) ISBN 978-0-7695-4294-2
Xiaoxiao, D., Bocko, M.F., Ignjatovic, Z.: Data Hiding Via Phase Manipulation of Audio Signals. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2004), vol. 5, pp. 377–380 (2004) ISBN 0-7803-8484-9
Erten, G., Salam, F.: Voice Output Extraction by Signal Separation. In: ISCAS 1998, vol. 3, pp. 5–8 (1998) ISBN 07803-4455-3
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000) ISBN 978-1-58053-035-4
Arnold, M.: Audio watermarking: Features, applications and algorithms. In: IEEE International Conference on Multimedia and Expo., New York, NY, vol. 2, pp. 1013–1016 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mondal, U.K., Mandal, J.K. (2011). Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS). In: Chaki, N., Cortesi, A. (eds) Computer Information Systems – Analysis and Technologies. Communications in Computer and Information Science, vol 245. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27245-5_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-27245-5_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27244-8
Online ISBN: 978-3-642-27245-5
eBook Packages: Computer ScienceComputer Science (R0)