Skip to main content
Log in

A fingerprint-based audio authentication scheme using frequency domain statistical characteristic

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, a major problem faced by digital data providers and owners is protecting data from malicious falsification and distribution. As a solution to this problem, digital fingerprinting technique is now attracting attention as new method for integrity protection. According to frequency domain statistical characteristic, an efficient fingerprint-based audio authentication scheme is proposed in this paper. Initially, the host audio signal is equally divided into non-overlapping frames, moreover, each audio frame is then equally split into non-overlapping segments, and the DFT (discrete Fourier transform) domain relation of each audio segment is computed. Then DFT domain relations of each audio frame are adopted to generate the corresponding binary pattern using non-uniform quantization. Finally, the fingerprint is obtained by performing XOR operation between the binary pattern and binary pseudo-random sequence. Simulation results demonstrate the effectiveness of our scheme in terms of inaudibility, detection reliability, robustness against some non-malicious signal processing operations and vulnerability against malicious falsification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Chen OTC, Liu CH (2007) Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Transactions on Audio, Speech, and Language Processing 15(5):1605–1616

    Article  Google Scholar 

  2. Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Systems with Applications 36(2):1300–1307

    Article  Google Scholar 

  3. Chen OTC, Wu WC (2008) Highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Transactions on Audio, Speech, and Language Processing 16(3):629–638

    Article  Google Scholar 

  4. Chen N, Zhu J (2008) A multipurpose audio watermarking scheme for copyright protection and content authentication. IEEE Conference on Multimedia & Expro, pp 221–224

  5. Erfani Y, Siahpoush S (2009) Robust audio watermarking using improved TS echo hiding. Digital Signal Processing 19(5):809–814

    Article  Google Scholar 

  6. Fan MQ, Wang HX (2009) Chaos-based discrete fractional Sine transform domain audio watermarking scheme. Computers & Electrical Engineering 35(3):506–516

    Article  MATH  MathSciNet  Google Scholar 

  7. Fan MQ, Wang HX (2011) Statistical characteristic-based robust audio watermarking for resolving plackback speed modification. Digital Signal Processing 21(1):110–117

    Article  Google Scholar 

  8. Gao HJ, Zhang YS, Liang SY (2006) A new chaotic algorithm for image encryption. Chaos Solitons and Fractals 29:393–399

    Article  MATH  Google Scholar 

  9. Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems. Proceeding of Electronic Imaging 3657:226–239

    Google Scholar 

  10. Liu R, Tian XP (2011) A space-bit-plane scrambling algorithm for image based on chaos. Journal of Multimedia 6(5):458–466

    Article  Google Scholar 

  11. Lu CS, Liao HYM, Chen LH (2000) Multipurpose audio watermarking. 15th International Conference on Pattern Recognition, vol. 3, pp 282–285

  12. Park CM, Thapa D, Wang GN (2007) Speech authentication system using digital watermarking and pattern recovery. Pattern Recognition Letters 28(8):931–938

    Article  Google Scholar 

  13. Wang HX, Fan MQ (2010) Centroid-based semi-fragile audio watermarking in hybrid domain. Science in China-Series F: Information Science, pp 619–633

  14. Wang HQ, Nishimura R, Suzuki Y (2008) Fuzzy self-adaptive digital audio watermarking based on time-spread echo hiding. Applied Acoustics 69(10):868–874

    Article  Google Scholar 

  15. Xiang SJ, Huang JW (2007) Histogram-based audio watermarking against time-scale modifications and cropping attacks. IEEE Transactions on Multimedia 9(7):1357–1372

    Article  Google Scholar 

  16. Xiang SJ, Huang JW, Yang R (2006) Time-scale invariant audio watermarking based on the statistical features in time domain. Information Hiding, pp 1–16

  17. Xu DW, Wang RD, Wang JC (2011) A novel watermarking scheme for H.264/AVC video authentication. Signal Processing: Image Communication 26(6):267–279

    Google Scholar 

Download references

Acknowledgments

The authors appreciate the handling editor and anonymous reviewers for their valuable comments to improve this paper.

This work was supported by National Natural Science Foundation of China (NSFC) under grant No.61170226, and Shandong Province Outstanding Young Scientists Foundation under grant No.BS2011DX034.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming-Quan Fan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fan, MQ., Wang, HX. & Li, HJ. A fingerprint-based audio authentication scheme using frequency domain statistical characteristic. Multimed Tools Appl 70, 2255–2270 (2014). https://doi.org/10.1007/s11042-012-1203-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1203-0

Keywords

Navigation