Skip to main content

Audio Watermarking with Cryptography

  • Chapter
  • First Online:
Digital Audio Watermarking

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSSIGNAL))

  • 830 Accesses

Abstract

Watermarking and cryptography are two closely related research subjects with a similar general objective of protecting important information in digital form. In terms of protecting multimedia content, encryption is applied to ensure the transmission of content information is secure, while watermarking is used for further protection after the content has been decrypted by authorized users. This chapter addresses encryption-related audio watermarking. First, we discuss several audio watermarking schemes with the incorporation of cryptography. After that, we will look into an alternative notion of leveraging the theory of compressive sensing for watermarking system design. It has been shown that the compressive sensing process is similar to an encryption process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    It is called sparse domain if the signal transformed into this domain is sparse. However, since most multimedia signals are not really sparse, we avoid abusing the word “sparse” in the context of this book, and refer to it as dimension expanded domain, or over-complete dictionary based transform domain.

References

  1. Subramanyam AV, Emmanuel S (2012) Audio watermarking in partially compressed-encrypted domain. In 2012 IEEE international conference on systems, man, and cybernetics (SMC), pp 2867–2872

    Google Scholar 

  2. Datta K, Gupta IS (2013) Partial encryption and watermarking scheme for audio files with controlled degradation of quality. Multimedia Tools Appl 64(3):649–669

    Article  Google Scholar 

  3. Hamdi B, Hassene S (2013) A new approach combining speech chaotic encryption with fragile image watermarking for audio securing and intrusion detection. In 2013 international conference on electrical engineering and software applications (ICEESA), pp 1–6

    Google Scholar 

  4. Schneier B (1996) Applied cryptography. Wiley, New York

    MATH  Google Scholar 

  5. Castelluccia C, Mykletun E, Tsudik G (2005) Efficient aggregation of encrypted data in wireless sensor networks. In Proceedings of the second annual international conference on mobile and ubiquitous systems: networking and services (MobiQuitous), pp 109–117

    Google Scholar 

  6. Candes EJ, Wakin MB (2008) An introduction to compressive sampling. IEEE Sign Process Mag 25(2):21–30 ISSN 1053-5888

    Article  Google Scholar 

  7. Aharon M, Elad M, Bruckstein A (2006) K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation. IEEE Trans Sign Process 54(11):4311–4322

    Article  Google Scholar 

  8. Mallat SG, Zhang Z (1993) Matching pursuits with time-frequency dictionaries. IEEE Trans Sign Process 41(12):3397–3415

    Article  MATH  Google Scholar 

  9. Tropp JA (2004) Greed is good: algorithmic results for sparse approximation. IEEE Trans Inf Theor 50(10):2231–2242

    Article  MathSciNet  MATH  Google Scholar 

  10. Dai W, Milenkovic O (2009) Subspace pursuit for compressive sensing signal reconstruction. IEEE Trans Inf Theor 55(5):2230–2249

    Article  MathSciNet  Google Scholar 

  11. Candes EJ, Tao T (2005) Decoding by linear programming. IEEE Trans Inf Theor 51(12):4203–4215

    Article  MathSciNet  MATH  Google Scholar 

  12. Kim SJ, Koh K, Lustig M, Boyd S, Gorinevsky D (2007) An interior-point method for large-scale \(\ell _1\)-regularized least squares. IEEE J Sel Topics Sign Process 1(4):606–617

    Article  Google Scholar 

  13. Mohimani H, Babaie-Zadeh M, Jutten C (2009) A fast approach for overcomplete sparse decomposition based on smoothed \(\ell ^{0}\) norm. IEEE Trans Sign Process 57(1):289–301

    Article  MathSciNet  MATH  Google Scholar 

  14. Babacan S, Molina R, Katsaggelos A (2010) Bayesian compressive sensing using laplace priors. IEEE Trans Image Process 19(1):53–63

    Article  MathSciNet  Google Scholar 

  15. Ji S, Xue Y, Carin L (2008) Bayesian compressive sensing. IEEE Trans Sign Process 56(6):2346–2356

    Article  MathSciNet  Google Scholar 

  16. Candes EJ, Tao T (2006) Near-optimal signal recovery from random projections: Universal encoding strategies? IEEE Trans Inf Theor 52(12):5406–5425

    Article  MathSciNet  MATH  Google Scholar 

  17. Rachlin Y, Baron D (2008) The secrecy of compressed sensing measurements. In Proceedings of 46th Annual Allerton Conference on Communication Control Computer, Urbana-Champaign, IL, pp 813–817

    Google Scholar 

  18. Orsdemir A, Altun HO, Sharma G, Bocko MF (2008) On the security and robustness of encryption via compressed sensing. In proceedings of IEEE military communication conference on (MILCOM), pp 1–8, San Diego, CA, 2008

    Google Scholar 

  19. Zhang Y, Zhang LY, Zhou J, Liu L, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access 4:2507–2519

    Article  Google Scholar 

  20. Hua G, Xiang Y, Bi G (2016b) When compressive sensing meets data hiding. IEEE Sign Process Lett 23(4):473–477

    Article  Google Scholar 

  21. Cancelli G, Barni M (2009) MPSteg-Color: Data hiding through redundant basis decomposition. IEEE Trans Inf Forensics Secur 4(3):346–358 Sep

    Article  Google Scholar 

  22. Chang L-H, Wu J-Y (2014) An improved rip-based performance guarantee for sparse signal recovery via orthogonal matching pursuit. IEEE Trans Inf Theor 60(9):5702–5715

    Article  MathSciNet  Google Scholar 

  23. Cancelli G, Barni M, Menegaz G (2006) MPSteg: Hiding a message in the matching pursuit domain. Proc SPIE 6072:1–9

    Google Scholar 

  24. Cancelli G, Barni M (2007) MPSteg-Color: A new steganographic technique for color images. In 9th International Workshop in Information Hiding (IH 2007), vol 4567, Saint Malo, France, pp 1–15

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Xiang .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Xiang, Y., Hua, G., Yan, B. (2017). Audio Watermarking with Cryptography. In: Digital Audio Watermarking. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-4289-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4289-8_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4288-1

  • Online ISBN: 978-981-10-4289-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics