Abstract
Echo hiding is a method of hiding information in an audio clip by the addition of embedding imperceptible echoes. The echoes are detected by various methods, including autocorrelation and cepstral analysis. We treat echo hiding as general multiplicative embedding in the frequency domain, and derive appropriate detectors based on various statistical models of audio FFT coefficients. This results in several detectors that are both simpler and more powerful than cepstral detection. We also observe that detection by simple correlation in the log-spectral domain performs very well in contrast to much more complicated approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
R.P. Bogert, M. J. Healy and J.W. Tukey, “The Quefrency Alanysis of Time Series for Echoes: Cepstrum, Pseudo-Autocovariance, Cross-Ceptsrum and Saphe-Cracking,” Proceedings of the Symposium on Time Series Analysis, Brown University, jun 1962. pp. 209–243. 249
T.M. Cover and J.A. Thomas, Elements of Information Theory. New York: John Wiley and Sons, Inc., 1991. 255
S. Craver, M. Wuand B. Liu, “What Can We Reasonably Expect From Watermarks?”, Proceedings of IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 2001.
D. Gruhl, A. Lu and W. Bender, “Echo Hiding,” 1st workshop on Info. Hiding, 1996. 247, 248, 250
R. Harris, “Whatever Happened to SDMI?,” Associated Press, 29 Apr. 2002. 248
F.A.P. Petitcolas, R. J. Anderson and M. Kuhn “Attacks on Copyright Marking Systems,” 2nd workshop on Info. Hiding, 1998. 248, 254
R. Petrovic, J. M. Winograd, K. Jemili and E. Metois, “Apparatus and method for encoding and decoding information in analog signals,” US Patent No 05940135, August 1999. 247, 249
H.V. Poor, An Introduction to Signal Detection and Estimation, 2nd ed. Berlin-Heidelberg: Springer-Verlag, 1998. 250
J.G. Proakis, Digital Communications, 3rd ed. Boston, MA: McGraw-Hill, 1995. 252
Secure Digital Music Initiative, “Call for Proposals for Phase II Screening Technology, Version 1.0,” February 2000. 248
J. Stern and J. Boeuf, “An Analysis of One of the SDMI Candidates,” 4th workship Workshop on Info. Hiding, 2001. 248
M. Wu, B. Liu, S. Craver, D. Dean, A. Stubblefield, D. Wallach, B. Swartzlander, and E. Felten, “Reading Between the Lines: Lessons Learned from the SDMI Challenge,” Proceedings of the 10th USENIX security symposium, Washington DC, August 2001. 248
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Craver, S., Liu, B., Wolf, W. (2003). Detectors for Echo Hiding Systems. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_16
Download citation
DOI: https://doi.org/10.1007/3-540-36415-3_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00421-9
Online ISBN: 978-3-540-36415-3
eBook Packages: Springer Book Archive