Advertisement

Multiple Watermark Generation Using Dot Code A and Hadamard Transform for Audio Content

  • Jizhe Cui
  • Jungjae Lee
  • Jongweon Kim
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 339)

Abstract

In this paper, we propose an audio watermarking algorithm for embedding information of multiple users into audio content in order to trace illegal distribution. The information is generated by Dot Code A, which can express multiple user information with error correction. A Hadamard transform is used to spread Dot Code A. This also ensures the algorithm is robust. The embedding range of the AC coefficients is within [-0.5, -0.3] and [0.3, 0.5] in the discrete cosine transform domain. At an embedding strength of 0.7, the signal-to-noise ratio of the test audio is over 53 dB, and we are able to extract the Dot Code A from the watermarked audio exactly.

Keywords

Multiple Watermark Dot Code A Hadamard Transform 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kim, J., Kim, N., Lee, D., Park, S., Lee, S.: Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Processing: Image Communication 25, 559–576 (2010)Google Scholar
  2. 2.
    Lee, Y., Kim, J.: Robust Blind Watermarking Scheme for Digital Images Based on Discrete Fractional Random Transform. In: Kim, T.-H., Adeli, H., Grosky, W.I., Pissinou, N., Shih, T.K., Rothwell, E.J., Kang, B.-H., Shin, S.-J. (eds.) MulGraB 2011, Part II. CCIS, vol. 263, pp. 139–145. Springer, Heidelberg (2011)Google Scholar
  3. 3.
    Li, D., Kim, J.: Secure Image Forensic Marking Algorithm using 2D Barcode and Off-axis Hologram in DWT-DFRNT Domain. Applied Mathematics & Information Sciences (AMIS) 6(2S), 513–520 (2012)Google Scholar
  4. 4.
    Nah, J., Kim, J., Kim, J.: Video Forensic Marking Algorithm Using Peak Position Modulation. Applied Mathematics & Information Sciences (AMIS) 6(6S) (to be published, 2012) Google Scholar
  5. 5.
    Wei, S.D.: Algorithm to Embed multiple digital watermarking in BMP Image. Shanghai Communication University master’s course paper (2008)Google Scholar
  6. 6.
    Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  7. 7.
    Wei, Z., Qin, P., Fu, Y.Q.: Perceptual digital watermarking of images using wavelet transform. IEEE Transactions on Consumer Electronics 44(4), 1267–1272 (1998)CrossRefGoogle Scholar
  8. 8.
    Peli, E.: In search of a contrast metric: Matching the perceived contrast of Gabor patches of different phases and bandwidths. Vision Research 37(23), 3217–3224 (1997)CrossRefGoogle Scholar
  9. 9.
    Van Gils, W.J.: Method of identifying objects provided with a code field containing a dot code, a device for identifying such a dot code, and a product provided with such a dot code. US Patent Number: 4745269 (May 17, 1988)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Jizhe Cui
    • 1
  • Jungjae Lee
    • 2
  • Jongweon Kim
    • 3
  1. 1.Dept. of Information Management & Information SystemsYanbian UniversityChina
  2. 2.Korea Copyright CommissionSeoulKorea
  3. 3.Dept. of Copyright ProtectionSangmyung UniversitySeoulKorea

Personalised recommendations