Skip to main content
Log in

Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

Copyright infringement is a serious problem in the music industry, especially for Internet-based platforms. The existing audio watermarking methods for copyright protection have limited robustness against the desynchronization attacks. Besides, most of the methods are not designed for stereo signals, which are widely used by online-based music and video platforms. In this paper, we present a desynchronization-attack-resilient watermarking method for stereo signals. In the watermark embedding process, both the left channel and the right channel of the host signal are firstly segmented and transformed into the frequency domain using the discrete cosine transform (DCT). Secondly, the linear correlation between channels (LCBC) in the DCT domain is calculated using the Pearson correlation coefficient (PCC). Then watermark bits are embedded by modifying LCBC for each segment. Since the desynchronization attacks as well as other common attacks affect both the left channel and the right channel in a similar manner, LCBC is robust against both desynchronization attacks and other common attacks. Theoretical analysis and experimental results demonstrate the effectiveness of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Asikuzzaman, M., Alam, M.J., Lambert, A.J., Pickering, M.R.: Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain. IEEE Trans. Inf. Forens. Secur. 9(9), 1502–1517 (2014)

    Article  Google Scholar 

  2. Cheng, K., Wang, L., Shen, Y., Wang, H., Wang, Y., Jiang, X., Zhong, H.: Secure k-NN query on encrypted cloud data with multiple keys. IEEE Trans. Big Data 14(8), 1–14 (2017)

    Article  Google Scholar 

  3. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6 (12), 1673–1687 (1997)

    Article  Google Scholar 

  4. Elshazly, A.R., Nasr, M.E., Fuad, M.M., Abd El-Samie, F.E.: Synchronized double watermark audio watermarking scheme based on a transform domain for stereo signals. In: Int. Jpn.-Egypt Conf. Electron. Commun. Comput., pp 52–57. IEEE, Cairo (2016)

  5. Digital video piracy costs movie and TV industry at least $29 billion a year, https://www.cnet.com/news/digital-video-piracy-costs-the-movie-and-tv-industry-at-least-29-billion-study-says. Last accessed 2 Dec 2020

  6. Feng, H., Jiang, W., Huang, X., Jing, X.: Robust audio watermarking algorithm against TSM. In: Int. Conf. Itell. Comput. Integr. Syst., pp 76–78. IEEE, Guilin (2010)

  7. Ge, Y., Cao, J., Wang, H., Zhang, Y., Chen, Z.: Distributed differential evolution for anonymity-driven vertical fragmentation in outsourced data storage. In: Int. Conf. Web Inf. Syst. Eng., pp 213–226. Springer, Amsterdam (2020)

  8. Ge, Y., Yu, W., Cao, J., Wang, H., Zhan, Z., Zhang, Y., Zhang, J.: Distributed memetic algorithm for outsourced database fragmentation. IEEE Trans. Cybern. 1–14 (2020)

  9. Hwang, M., Lee, J., Lee, M., Kang, H.: SVD based adaptive QIM watermarking on stereo audio signals. IEEE Trans. Multimedia 20(1), 45–54 (2018)

    Article  Google Scholar 

  10. Jiang, H., Zhou, R., Zhang, L., Wang, H., Zhang, Y.: Sentence level topic models for associated topics extraction. World Wide Web 22(6), 2545–2560 (2019)

    Article  Google Scholar 

  11. Kang, X., Yang, R., Huang, J.: Geometric invariant audio watermarking based on an LCM feature. IEEE Trans. Multimed. 13(2), 181–190 (2011)

    Article  Google Scholar 

  12. Kim, H.J., Choi, Y.H.: A novel echo-hiding scheme with backward and forward kernels. IEEE Trans. Circuits Syst. Video Technol. 13(8), 885–889 (2003)

    Article  Google Scholar 

  13. Ko, B., Nishimura, R., Suzuki, Y.: Time-spread echo method for digital audio watermarking. IEEE Trans. Multimed. 7(2), 212–221 (2005)

    Article  Google Scholar 

  14. Lee, M., Kim, K., Lee, H.: Digital cinema watermarking for estimating the position of the pirate. IEEE Trans. Multimed. 12(7), 605–621 (2010)

    Article  Google Scholar 

  15. Liang, X., Xiang, S.: Robust reversible audio watermarking based on high-order difference statistics. Signal Process. 173, 107584 (2020)

    Article  Google Scholar 

  16. Liu, Z., Huang, Y., Huang, J.: Patchwork based audio watermarking robust against desynchronization and recapturing attacks. IEEE Trans. Inf. Forens. Secur. 14(5), 1171–1180 (2019)

    Article  Google Scholar 

  17. Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51(4), 898–905 (2003)

    Article  MathSciNet  Google Scholar 

  18. Nadeau, A., Sharma, G.: An audio watermark designed for efficient and robust resynchronization after analog playback. IEEE Trans. Inf. Forens. Secur. 12(6), 1393–1405 (2017)

    Article  Google Scholar 

  19. Natgunanathan, I., Xiang, Y., Hua, G., Beliakov, G., Yearwood, J.: Patchwork-based multilayer audio watermarking. IEEE/ACM Trans. Audio, Speech, Lang Process. 25(11), 2176–2187 (2017)

    Article  Google Scholar 

  20. Natgunanathan, I., Xiang, Y., Rong, Y., Peng, D.: Robust patchwork-based watermarking method for stereo audio signals. Multimedia Tools Appl. 72 (2), 1387–1410 (2014)

    Article  Google Scholar 

  21. Natgunanathan, I., Xiang, Y., Rong, Y., Zhou, W., Guo, S.: Robust patchwork-based embedding and decoding scheme for digital audio watermarking. IEEE/ACM Trans. Audio Speech Lang Process. 20(8), 2232–2239 (2012)

    Article  Google Scholar 

  22. Natgunanathan, I., Xiang, Y., Zong, T.: Patchwork-based stereo audio watermarking against de-synchronization attack. In: Int. Congr. Image Signal Process., pp 1601–1605. IEEE, Chongqing (2012)

  23. Oh, H.O., Kim, H.W., Seok, J.W., Hong, J.W., Youn, D.H.: Transparent and robust audio watermarking with a new echo embedding technique. In: IEEE Int. Conf. Multimed. Expo, pp 433–436. IEEE, Tokyo (2001)

  24. Pourhashemi, S.M., Mosleh, M., Erfani, Y.: A novel audio watermarking scheme using ensemble-based watermark detector and discrete wavelet transform. Neural Comput. Appl. 33(11), 6161–6181 (2021)

    Article  Google Scholar 

  25. Salah, E., Amine, K., Redouane, K., Fares, K.: A Fourier transform based audio watermarking algorithm. Appl. Acoust. 172, 107652 (2021)

    Article  Google Scholar 

  26. Stütz, T., Autrusseau, F., Uhl, A.: Non-blind structure-preserving substitution watermarking of H.264/CAVLC inter-frames. IEEE Trans. Multimed. 16 (5), 1337–1349 (2014)

    Article  Google Scholar 

  27. Su, P., Chang, Y., Wu, C.: Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals. IEEE Trans. Inf. Forensics Security 8(12), 1897–1908 (2013)

    Article  Google Scholar 

  28. Su, Z., Zhang, G., Yue, F., Chang, L., Jiang, J., Yao, X.: SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking. IEEE Trans. Multimed. 20(10), 2631–2644 (2018)

    Article  Google Scholar 

  29. Takahashi, A., Nishimura, R., Suzuki, Y.: Multiple watermarks for stereo audio signals using phase-modulation techniques. IEEE Trans. Signal Process. 53(2), 806–815 (2005)

    Article  MathSciNet  Google Scholar 

  30. The True Cost of Sound Recording Piracy to the U.S. Economy, https://www.riaa.com/reports/the-true-cost-of-sound-recording-piracy-to-the-u-s-economy. Last accessed 2 Dec 2020

  31. Thiede, T., Treurniet, W., Bitto, R., Schmidmer, C., Sporer, T., Beerends, J., Colomes, C., Keyhl, M., Stoll, G., Brandenburg, K., Feiten, B.: PEAQ–the ITU standard for objective measurement of perceived audio quality. J. Audio Eng. Soc. 48(1), 3–29 (2000)

    Google Scholar 

  32. Vimalachandran, P., Liu, H., Lin, Y., Ji, K., Wang, H., Zhang, Y.: Improving accessibility of the Australian My Health Records while preserving privacy and security of the system. Health Inf. Sci. Syst. 8(1), 1–9 (2020)

    Google Scholar 

  33. Wang, H., Wang, Y., Taleb, T., Jiang, X.: Special issue on security and privacy in network computing. World Wide Web 23(2), 951–957 (2020)

    Article  Google Scholar 

  34. Wang, H., Yi, X., Bertino, E., Sun, L.: Protecting outsourced data in cloud computing through access management. Concurrency Comput. Pract. Exp. 28(3), 600–615 (2014)

    Article  Google Scholar 

  35. Wu, J., Shin, J.: Discrete cosine transform in error control coding. IEEE Trans. Commun. 43(5), 1857–1861 (1995)

    Article  Google Scholar 

  36. Xiang, Y., Natgunanathan, I., Guo, S., Zhou, W., Nahavandi, S.: Patchwork based audio watermarking method robust to desynchronization attacks. IEEE/ACM Trans. Audio Speech Lang Process. 22(9), 1413–1423 (2014)

    Article  Google Scholar 

  37. Xiang, Y., Natgunanathan, I., Peng, D., Hua, G., Liu, B.: Spread spectrum audio watermarking using multiple orthogonal PN sequences and variable embedding strengths and polarities. IEEE/ACM Trans. Audio, Speech, Lang Process. 26(3), 529–539 (2018)

    Article  Google Scholar 

  38. Xiang, Y., Natgunanathan, I., Peng, D., Zhou, W., Shui, Y.: A dual-channel time-spread echo method for audio watermarking. IEEE Trans. Inf. Forens. Secur. 7(2), 383–392 (2012)

    Article  Google Scholar 

  39. Xiang, Y., Natgunanathan, I., Rong, Y., Guo, S.: Spread spectrum based high embedding capacity watermarking method for audio signals. IEEE/ACM Trans. Audio Speech Lang Process. 23(12), 2228–2237 (2015)

    Article  Google Scholar 

  40. Xiang, Y., Peng, D., Natgunanathan, I., Zhou, W.: Effective pseudonoise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo based audio watermarking. IEEE Trans. Multimed. 13 (1), 2–13 (2011)

    Article  Google Scholar 

  41. Zhang, F., Wang, Y., Liu, S., Wang, H.: Decision-based evasion attacks on tree ensemble classifiers. World Wide Web 23, 2957–2977 (2020)

    Article  Google Scholar 

  42. Zhao, J., Zong, T., Xiang, Y., Gao, L., Beliakov, G.: Robust blockchain-based cross-platform audio copyright protection system using content-based fingerprint. In: Int. Conf. Web Inf. Syst. Eng., pp 201–212. Springer, Amsterdam (2020)

  43. Zong, T., Xiang, Y., Guo, S., Rong, Y.: Rank based image watermarking method with high embedding capacity and robustness. IEEE Access 4(1), 1689–1699 (2016)

    Article  Google Scholar 

  44. Zong, T., Xiang, Y., Natgunanathan, I., Gao, L., Zhou, W.: Channel correlation based robust audio watermarking mechanism for stereo signals. In: Int. Conf. Web Inf. Syst. Eng., pp 240–251. Springer, Amsterdam (2020)

  45. Zong, T., Xiang, Y., Natgunanathan, I., Guo, S., Zhou, W., Beliakov, G.: Robust histogram shape based method for image watermarking. IEEE Trans. Circuits Syst. Video Technol. 25(5), 717–729 (2015)

    Article  Google Scholar 

Download references

Funding

The authors have no relevant financial or non-financial interests to disclose. The authors have no financial or proprietary interests in any material discussed in this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan Zhao.

Ethics declarations

Conflict of Interests

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Special Issue on Web Information Systems Engineering 2020

Guest Editors: Hua Wang, Zhisheng Huang, and Wouter Beek

Partial financial support was received from the Australian Research Council under grant LP170100458.

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zong, T., Zhao, J., Xiang, Y. et al. Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels. World Wide Web 25, 357–379 (2022). https://doi.org/10.1007/s11280-021-00897-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-021-00897-0

Keywords

Navigation