Abstract
Watermarking and cryptography are two closely related research subjects with a similar general objective of protecting important information in digital form. In terms of protecting multimedia content, encryption is applied to ensure the transmission of content information is secure, while watermarking is used for further protection after the content has been decrypted by authorized users. This chapter addresses encryption-related audio watermarking. First, we discuss several audio watermarking schemes with the incorporation of cryptography. After that, we will look into an alternative notion of leveraging the theory of compressive sensing for watermarking system design. It has been shown that the compressive sensing process is similar to an encryption process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
It is called sparse domain if the signal transformed into this domain is sparse. However, since most multimedia signals are not really sparse, we avoid abusing the word “sparse” in the context of this book, and refer to it as dimension expanded domain, or over-complete dictionary based transform domain.
References
Subramanyam AV, Emmanuel S (2012) Audio watermarking in partially compressed-encrypted domain. In 2012 IEEE international conference on systems, man, and cybernetics (SMC), pp 2867–2872
Datta K, Gupta IS (2013) Partial encryption and watermarking scheme for audio files with controlled degradation of quality. Multimedia Tools Appl 64(3):649–669
Hamdi B, Hassene S (2013) A new approach combining speech chaotic encryption with fragile image watermarking for audio securing and intrusion detection. In 2013 international conference on electrical engineering and software applications (ICEESA), pp 1–6
Schneier B (1996) Applied cryptography. Wiley, New York
Castelluccia C, Mykletun E, Tsudik G (2005) Efficient aggregation of encrypted data in wireless sensor networks. In Proceedings of the second annual international conference on mobile and ubiquitous systems: networking and services (MobiQuitous), pp 109–117
Candes EJ, Wakin MB (2008) An introduction to compressive sampling. IEEE Sign Process Mag 25(2):21–30 ISSN 1053-5888
Aharon M, Elad M, Bruckstein A (2006) K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation. IEEE Trans Sign Process 54(11):4311–4322
Mallat SG, Zhang Z (1993) Matching pursuits with time-frequency dictionaries. IEEE Trans Sign Process 41(12):3397–3415
Tropp JA (2004) Greed is good: algorithmic results for sparse approximation. IEEE Trans Inf Theor 50(10):2231–2242
Dai W, Milenkovic O (2009) Subspace pursuit for compressive sensing signal reconstruction. IEEE Trans Inf Theor 55(5):2230–2249
Candes EJ, Tao T (2005) Decoding by linear programming. IEEE Trans Inf Theor 51(12):4203–4215
Kim SJ, Koh K, Lustig M, Boyd S, Gorinevsky D (2007) An interior-point method for large-scale \(\ell _1\)-regularized least squares. IEEE J Sel Topics Sign Process 1(4):606–617
Mohimani H, Babaie-Zadeh M, Jutten C (2009) A fast approach for overcomplete sparse decomposition based on smoothed \(\ell ^{0}\) norm. IEEE Trans Sign Process 57(1):289–301
Babacan S, Molina R, Katsaggelos A (2010) Bayesian compressive sensing using laplace priors. IEEE Trans Image Process 19(1):53–63
Ji S, Xue Y, Carin L (2008) Bayesian compressive sensing. IEEE Trans Sign Process 56(6):2346–2356
Candes EJ, Tao T (2006) Near-optimal signal recovery from random projections: Universal encoding strategies? IEEE Trans Inf Theor 52(12):5406–5425
Rachlin Y, Baron D (2008) The secrecy of compressed sensing measurements. In Proceedings of 46th Annual Allerton Conference on Communication Control Computer, Urbana-Champaign, IL, pp 813–817
Orsdemir A, Altun HO, Sharma G, Bocko MF (2008) On the security and robustness of encryption via compressed sensing. In proceedings of IEEE military communication conference on (MILCOM), pp 1–8, San Diego, CA, 2008
Zhang Y, Zhang LY, Zhou J, Liu L, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access 4:2507–2519
Hua G, Xiang Y, Bi G (2016b) When compressive sensing meets data hiding. IEEE Sign Process Lett 23(4):473–477
Cancelli G, Barni M (2009) MPSteg-Color: Data hiding through redundant basis decomposition. IEEE Trans Inf Forensics Secur 4(3):346–358 Sep
Chang L-H, Wu J-Y (2014) An improved rip-based performance guarantee for sparse signal recovery via orthogonal matching pursuit. IEEE Trans Inf Theor 60(9):5702–5715
Cancelli G, Barni M, Menegaz G (2006) MPSteg: Hiding a message in the matching pursuit domain. Proc SPIE 6072:1–9
Cancelli G, Barni M (2007) MPSteg-Color: A new steganographic technique for color images. In 9th International Workshop in Information Hiding (IH 2007), vol 4567, Saint Malo, France, pp 1–15
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Xiang, Y., Hua, G., Yan, B. (2017). Audio Watermarking with Cryptography. In: Digital Audio Watermarking. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-4289-8_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-4289-8_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4288-1
Online ISBN: 978-981-10-4289-8
eBook Packages: EngineeringEngineering (R0)