Skip to main content

Detectors for Echo Hiding Systems

  • Conference paper
  • First Online:
Information Hiding (IH 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2578))

Included in the following conference series:

Abstract

Echo hiding is a method of hiding information in an audio clip by the addition of embedding imperceptible echoes. The echoes are detected by various methods, including autocorrelation and cepstral analysis. We treat echo hiding as general multiplicative embedding in the frequency domain, and derive appropriate detectors based on various statistical models of audio FFT coefficients. This results in several detectors that are both simpler and more powerful than cepstral detection. We also observe that detection by simple correlation in the log-spectral domain performs very well in contrast to much more complicated approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R.P. Bogert, M. J. Healy and J.W. Tukey, “The Quefrency Alanysis of Time Series for Echoes: Cepstrum, Pseudo-Autocovariance, Cross-Ceptsrum and Saphe-Cracking,” Proceedings of the Symposium on Time Series Analysis, Brown University, jun 1962. pp. 209–243. 249

    Google Scholar 

  2. T.M. Cover and J.A. Thomas, Elements of Information Theory. New York: John Wiley and Sons, Inc., 1991. 255

    MATH  Google Scholar 

  3. S. Craver, M. Wuand B. Liu, “What Can We Reasonably Expect From Watermarks?”, Proceedings of IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 2001.

    Google Scholar 

  4. D. Gruhl, A. Lu and W. Bender, “Echo Hiding,” 1st workshop on Info. Hiding, 1996. 247, 248, 250

    Google Scholar 

  5. R. Harris, “Whatever Happened to SDMI?,” Associated Press, 29 Apr. 2002. 248

    Google Scholar 

  6. F.A.P. Petitcolas, R. J. Anderson and M. Kuhn “Attacks on Copyright Marking Systems,” 2nd workshop on Info. Hiding, 1998. 248, 254

    Google Scholar 

  7. R. Petrovic, J. M. Winograd, K. Jemili and E. Metois, “Apparatus and method for encoding and decoding information in analog signals,” US Patent No 05940135, August 1999. 247, 249

    Google Scholar 

  8. H.V. Poor, An Introduction to Signal Detection and Estimation, 2nd ed. Berlin-Heidelberg: Springer-Verlag, 1998. 250

    Google Scholar 

  9. J.G. Proakis, Digital Communications, 3rd ed. Boston, MA: McGraw-Hill, 1995. 252

    Google Scholar 

  10. Secure Digital Music Initiative, “Call for Proposals for Phase II Screening Technology, Version 1.0,” February 2000. 248

    Google Scholar 

  11. J. Stern and J. Boeuf, “An Analysis of One of the SDMI Candidates,” 4th workship Workshop on Info. Hiding, 2001. 248

    Google Scholar 

  12. M. Wu, B. Liu, S. Craver, D. Dean, A. Stubblefield, D. Wallach, B. Swartzlander, and E. Felten, “Reading Between the Lines: Lessons Learned from the SDMI Challenge,” Proceedings of the 10th USENIX security symposium, Washington DC, August 2001. 248

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Craver, S., Liu, B., Wolf, W. (2003). Detectors for Echo Hiding Systems. In: Petitcolas, F.A.P. (eds) Information Hiding. IH 2002. Lecture Notes in Computer Science, vol 2578. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36415-3_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-36415-3_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00421-9

  • Online ISBN: 978-3-540-36415-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics