Advertisement

Digital Sound Watermarks Based on Improved Sinusoidal Analysis/Synthesis Model

  • Zhe Song
  • Zhigeng Pan
  • Jiaoying Shi
Conference paper
Part of the Eurographics book series (EUROGRAPH)

Abstract

In this paper, a simple and efficient algorithm for designing digital sound watermark is presented. The main idea is by hiding the secret information in the amplitude of a certain frequency under 20Hz. This approach improved the sinusoidal analysis / synthesis model. Our approach can improve the sound watermark detection even after the signal has been compressed by MEPG lay-3. The experimental results illustrated the efficiency of our algorithm.

Keywords

Audio Signal Secret Message Information Hiding Data Hiding Secret Information 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bender, W.; Gruhl, D.; Morimoto, N. et al. Techniques for data hiding. IBM Systems Journal, Vol. 35 (1996) pp 313–320CrossRefGoogle Scholar
  2. 2.
    Kahn, D. The history of Steganography. First International Workshop on Information Hiding, Cambridge, U.K.(May/June, 1996 ) pp 1–5Google Scholar
  3. 3.
    Hartuma, F.; Kutter, M. Multimedia watermarking techniques. Proceedings of The IEEE, Vo187, No.7(July, 1999 ) pp 1079–1107Google Scholar
  4. 4.
    Schyndel, R. V.; Tirkel, A.; Osborne, C. A digital watermark. Proceedings of the IEEE International Conference on Image Processing, Vol.2(1994)pp86–90Google Scholar
  5. 5.
    Jessop, P. The busniess cases for audio watermarking. Proceedings of IEEE Conf. on Acoustic, Speech, and Signal Processing, Vol. 4 (1999) pp 2077–2078Google Scholar
  6. 6.
    Machado, R. “Stego”, http://www.nitv.net/~mech/Romana/stego.html(1994).
  7. 7.
    Gruhl, D.; Bender, W. Information Hiding to Foil the Casual Counterfeiter. Second International Workshop on Information Hiding, Portland, Oregon, USA(April, 1998) pp 1–15CrossRefGoogle Scholar
  8. 8.
    Cox, I.; Kilian, J. Et al. A Secure, Robust Watermark for Multimedia. First International Workshop on Information Hiding, Cambridge, U.K. (May/June, 1996) pp 183–205Google Scholar
  9. 9.
    Cox, I.; Kilian, J. Et al. Secure Spread Spectrum Watermarking for Multimedia. NECI Technical Report 95–10, NEC Research Institute, Princeton, NJ, (1995)Google Scholar
  10. 10.
    Boney, L.; Tewfik, A.H.; Hamdy, K.N. Digital watermarking for audio signals. Proceedings of IEEE Multimedia’96 (1996) pp 483–490Google Scholar
  11. 11.
    Bassia, P.; Pitas, I. Robust audio watermarking in the time domain. EUSIPO’98, Rhodes, Greece.(Sept., 1998)Google Scholar
  12. 12.
    Ikeda, M.; Takeda, K.; Itakura, F. Audio data hiding by use of band-limited random sequences. Proceedings of IEEE International conference on Acoustic, Speech and Signal Processing, Vol.4(1999)pp2315–2318Google Scholar
  13. 13.
    Yaidimci, Y. et al. Data hiding in speech using phase coding. Eurospeech’97(1997) pp1679–1683Google Scholar
  14. 14.
    Wang, Y. A new watermarking method of digital audio content for copyright protection. Proceedings of ICSP’98, Vol. 2 (1998) pp 1420–1423Google Scholar
  15. 15.
    Tilki, J.F.; Beex, A.A. Encoding a hiding digital signature onto an audio signal using psychoacoustic masking. Proceedings of 7th Inter. Con. On Digital signal Processing Application & Technology, Boston(1996) pp476–480Google Scholar
  16. 16.
    McAulay, R.J.; Quatieri, T.F. Speech analysis/synthesis based on a sinusoidal representation. IEEE Trans. Acoust. Speech Signal Processing, Vol. ASSP-34 (1986) pp 744–754CrossRefGoogle Scholar
  17. 17.
    Song, Z.; Zhang, Q.; Shi, J.Y. An improved Sinusoidal Analysis/ Synthesis model. Proceeding of r China Computer Conference, China (1998) pp 936–941Google Scholar
  18. 18.
    Song, Z. The presentation and application of audio signal feature parameters”, Master Thesis, Zhejiang University, China (March, 1999)Google Scholar
  19. 19.
    Fraunhofer Institut Integrierte Schaltungen, “13enc/13dec: layer-3 encoder/decoder ”, http://www.iisfhg.de/departs/amm/laver3/sw/
  20. 20.
    Ptzmann, B. Information hiding terminology. In: R. Anderson, editor, Information Hiding, First International Workshop, Volume 1174 of Lecture Notes in Computer Science, Springer-Verlag, Berlin(1996) pp347–350CrossRefGoogle Scholar

Copyright information

© Springer-Verlag/Wien 2000

Authors and Affiliations

  • Zhe Song
    • 1
  • Zhigeng Pan
    • 2
  • Jiaoying Shi
    • 1
  1. 1.Department of Computer Science and EngineeringZhejiang UniversityHangzhouP.R.China
  2. 2.Department of ComputingHong Kong Polytechnic UniversityKowloon, Hong KongChina

Personalised recommendations