Skip to main content

Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS)

  • Conference paper
Computer Information Systems – Analysis and Technologies

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 245))

Abstract

In this paper, an algorithm has been proposed to provide security to digital songs through amplitude modulation along with generating a secure hidden signal with an authenticating code without affecting its audible quality. Generating the hidden authenticating signal with the help of amplitude modulation for selected phases of song signal is the first phase of proposed technique followed by fabrication of authenticating code using higher frequencies above audible range. The embedded hidden secure signal as well as authenticating code will use to detect and identify the original song from similar available songs. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (“.wav”) stereo sound file.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mondal, U.K., Mandal, J.K.: A Practical Approach of Embedding Secret Key to Authenticate Tagore Songs (ESKATS). In: Wireless Information Networks & Business Information System Proceedings (WINBIS 2010), vol. 6(1), pp. 67–74. organized by Rural Nepal Technical Academy (Pvt.) Ltd., Nepal (2010)

    Google Scholar 

  2. Mondal, U.K., Mandal, J.K.: A Novel Technique to Protect Piracy of Quality Songs through Amplitude Manipulation (PPAM). In: International Symposium on Electronic System Design (ISED 2010), pp. 246–250 (2010) ISBN 978-0-7695-4294-2

    Google Scholar 

  3. Xiaoxiao, D., Bocko, M.F., Ignjatovic, Z.: Data Hiding Via Phase Manipulation of Audio Signals. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2004), vol. 5, pp. 377–380 (2004) ISBN 0-7803-8484-9

    Google Scholar 

  4. Erten, G., Salam, F.: Voice Output Extraction by Signal Separation. In: ISCAS 1998, vol. 3, pp. 5–8 (1998) ISBN 07803-4455-3

    Google Scholar 

  5. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000) ISBN 978-1-58053-035-4

    Google Scholar 

  6. Arnold, M.: Audio watermarking: Features, applications and algorithms. In: IEEE International Conference on Multimedia and Expo., New York, NY, vol. 2, pp. 1013–1016 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mondal, U.K., Mandal, J.K. (2011). Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS). In: Chaki, N., Cortesi, A. (eds) Computer Information Systems – Analysis and Technologies. Communications in Computer and Information Science, vol 245. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27245-5_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27245-5_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27244-8

  • Online ISBN: 978-3-642-27245-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics