Skip to main content

A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Abstract

Synchronization attack is one of the key issues of digital audio watermarking. In this paper, a robust digital audio watermarking algorithm in DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform) domain is presented, which can resist synchronization attack effectively. The features of the proposed algorithm are as follows: (1)More steady synchronization code and new embedded strategy are adopted to resist the synchronization attack effectively. (2)The multi-resolution characteristics of DWT and the energy- compression characteristics of DCT are combined to improve the transparency of digital watermark. (3)The algorithm can extract the watermark without the help of the original digital audio signal.

This work was supported by the Natural Science Foundation of Liaoning Province of China under Grant No.20032100 and the Open foundation of State Key Laboratory of Information Security of China under Grant No.03-02.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Miller, M.L.: The First 50 Years of Electronic Watermarking. Journal of Applied Signal Processing 56(2), 225–230 (2002)

    Google Scholar 

  2. Li, W., Yuan, Y.-Q., Li, X.-Q., Xue, X.-Y., Lu, P.-Z.: Overview of Digital Audio Watermarking. Journal on Communications 26(2), 100–111 (2005)

    Google Scholar 

  3. Lie, W.-N., Chang, L.-C.: Robust and High-Quality Time-Domain Audio Water-marking Subject to Psycho Acoustic Masking. In: Proceedings of IEEE International Symposium on Circuits and Systems, Arizona, USA, vol. 2, pp. 45–48 (2002)

    Google Scholar 

  4. Megías, D., Herrera-joancomartí, J., Minguillón, J.: A Robust Audio Watermarking Scheme Based on MPEG 1 Layer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 226–238. Springer, Heidelberg (1995)

    Google Scholar 

  5. Kim, H.J.: Audio Watermarking Techniques. Pacific Rim Workshop on Digital Steganography, Kyushu Institute of Technology, Kitakyushu, Japan (2003)

    Google Scholar 

  6. Sun, S.-H., Lu, Z.-M., Niu, X.-M.: Digital Watermarking Technique. Science Press, Beijing (2004)

    Google Scholar 

  7. Wu, C.-P., Su, P.-C., Jay Kuo, C.-C.: Robust Audio Watermarking for Copyright Protection. In: Proc. SPIE, vol. 3807, pp. 387–397 (1999)

    Google Scholar 

  8. Li, W., Xue, X.-Y.: Audio Watermarking Based on Music Content Analysis: Robust Against Time Scale Modification. In: Proceedings of the Second International Workshop on Digital Watermarking, Korea, pp. 289–300 (2003)

    Google Scholar 

  9. Wang, Y., Huang, J.-W., Shi, Y.Q.: Meaningful Watermarking for Audio with Fast Resynchronization. Journal of Computer Research and Development 40(20), 215–220 (2003)

    Google Scholar 

  10. Huang, J.-W., Wang, Y., Shi, Y.Q.: A Blind Audio Watermarking Algorithm with Self-Synchronization. In: Proceedings of IEEE International Symposium on Circuits and System, Arizona, USA, vol. 3, pp. 627–630 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, X., Zhao, H. (2005). A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_91

Download citation

  • DOI: https://doi.org/10.1007/11596981_91

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics