skip to main content
10.1145/1022431.1022467acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

An audio watermarking scheme robust against stereo attacks

Published:20 September 2004Publication History

ABSTRACT

In this paper, a watermarking scheme for both monophonic and stereophonic audio files is presented. The suggested method uses MPEG 1 Layer 3 compression to determine where and how the embedded mark must be introduced, combined with an error correcting code and a majority voting scheme. The scheme is shown to achieve high robustness against malicious attacks while maintaining a reasonable imperceptibility. The mark is embedded by modifying the magnitude of the spectrum at certain frequencies which have been chosen according to their relevance. The results show that the suggested watermarking scheme is robust against the attacks of the audio StirMark benchmark and compression attacks using the Sound Quality Assessment Material as the experimental corpus set.

References

  1. P. Bassia, I. Pitas, and N. Nikolaidis. Robust audio watermarking in the time domain. IEEE Transactions on Multimedia, 3(2):232--241, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In Advances in Cryptology-CRYPTO'95, LNCS 963, pages 452--465. Springer-Verlag, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12):1673--1687, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. L. D. Gruhl and W. Bender. Echo hiding. In Proceedings of the 1st Workshop on Information Hiding, number 1174 in Lecture Notes in Computer Science, pages 295--316, Cambridge, England, may 1996. Springer Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Dittman, M. Steinebach, A. Lang, and S. Zmudzinski. Advanced audio watermarking benchmarking. In Proceedings of the IS&T/SPIE's 16th Annual Symposium on Electronic Imaging, volume 5306 - Security, Steganography, and Watermarking of Multimedia Contents VI, Sant Jose, CA, US, January 2004.Google ScholarGoogle ScholarCross RefCross Ref
  6. J. Domingo-Ferrer and J. Herrera-Joancomarti. Short collusion-secure fingerprinting based on dual binary hamming codes. Electronics Letters, 36(20):1697--1699, Sept. 2000.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. Domingo-Ferrer and J. Herrera-Joancomarti. Simple collusion-secure fingerprinting schemes for images. In Proceedings of the Information Technology: Coding and Computing ITCC'2000, pages 128--132. IEEE Computer Society, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. Jansson. Homepage for BladeEnc, 2001. http://bladeenc.mp3.no/.Google ScholarGoogle Scholar
  9. A. T. M.D. Swanson, B. Zhu and L. Boney. Robust audio watermarking using perceptual masking. Elsevier Signal Processing, Special Issue on Copyright Protection And Access Control, 66(3):337--335, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Megias, J. Herrera-Joancomarti, and J. Minguillon. A robust audio watermarking scheme based on MPEG 1 layer 3 compression. In Communications and Multimedia Security - CMS 2003, LNCS 963, pages 226--238. Springer-Verlag, 2003.Google ScholarGoogle Scholar
  11. F. Petitcolas and R. Anderson. Evaluation of copyright marking systems. In Proceedings of IEEE Multimedia Systems'99, pages 574--579, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H. Purnhagen. SQAM - Sound Quality Assessment Material, 2001. http://www.tnt.uni-hannover.de/project/mpeg/audio/sqam/.Google ScholarGoogle Scholar
  13. A. Swanson, M.D.; Bin Zhu; Tewfik. Current state of the art, challenges and future directions for audio watermarking. In Proceedings of IEEE International Conference on Multimedia Computing and Systems, volume~1, pages 19--24. IEEE Computer Society, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Swanson, M. Kobayashi, and A. Tewfik. Multimedia data-embedding and watermarking technologies. In Proceedings of the IEEE, volume 86(6), pages 1064--1087. IEEE Computer Society, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  15. I. Voyatzis, G.; Pitas. Protecting digital image copyrights: a framework. IEEE Computer Graphics and Applications, 19(1):18--24, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. L. W. Kim and W. Lee. An audio watermarking scheme robust to MPEG audio compression. In Proc. NSIP, volume 1, pages 326--330, Antalya, Turkey, 1999.Google ScholarGoogle Scholar
  17. H. Ozer, I. Avcibacs, B. Sankur, and N. Memon. Steganalysis of audio based on audio quality metrics. In Proceedings of the IS&T/SPIE's 15th Annual Symposium on Electronic Imaging, volume 5020 - Security and Watermarking of Multimedia Contents V, Santa Clara, CA, US, January 2003.Google ScholarGoogle Scholar

Index Terms

  1. An audio watermarking scheme robust against stereo attacks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MM&Sec '04: Proceedings of the 2004 workshop on Multimedia and security
        September 2004
        236 pages
        ISBN:1581138547
        DOI:10.1145/1022431

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 September 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate128of318submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader