ABSTRACT
A wide range of watermarking evaluation approaches and especially image benchmarking suites have been described in the literature. Our paper sets the main focus on the evaluation of digital audio watermarking with StirMark Benchmark for Audio (SMBA). Here we describe the currently implemented single geometric attacks in detail and introduce our so-called attack profiles. Profiles reflect an application oriented point of view ranging from the normal usage of audio content like internet radio or music shops up to typical attacker scenarios. In particular we present a definition of an extended profile which is composed of three basic profiles specific for annotation watermarks. Furthermore, we demonstrate how SMBA attacks can be used to evaluate the transparency of digital watermarking algorithms regarding the embedding strength. Test results based on an example audio watermarking algorithm and the measurement of transparency and capacity are presented.
- Emmanuel C. Ifeachor, Barrie W. Jervis, Digital Signal Processing, Prentice Hall, ISBN 0201 59619 9, 2002 Google ScholarDigital Library
- Nedeljko Cvejic, Algorithms for Audio Watermarking and Steganography, Department of Electrical and Information Engineering, Information Processing Laboratory, University of Oulu, 2004Google Scholar
- Jana Dittmann, Martin Steinebach, Andreas Lang, Sascha Zmudzinsky, Advanced audio watermarking benchmarking, San Jose, CA, USA Bellingham, Washington, USA, SPIE 2004, vol. 5306Google Scholar
- EAQUAL, http://home.wanadoo.nl/~w.speek/eaqual.htm, 2004Google Scholar
- Zaid Ghazal, Umsetzung und Vergleich von digitalen Audio Wasserzeichenalgorithmen, diploma thesis at Otto-von-Guericke University of Magdeburg, 2005Google Scholar
- ITU-R Recommendation BS.1387, Method for Objective Measurements of Perceived Audio Quality, Dec. 1998Google Scholar
- F.Y. Duan, I. King, A Short Summary of Digital Watermarking Techniques for Multimedia Data, Department of Computer Science and Engineering, Chinese University of Hong Kong, Shatin, N.T., Hong Kong, ChinaGoogle Scholar
- M. Kutter, F.A.P. Petitcolas, A fair benchmark for image watermarking system, In SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, Vol. 3657, San Jose, CA, USA, 25-27 January 1999Google Scholar
- M. Kutter, S. Voloshynovskiy and A. Herrigel, Watermark copy attack, In Ping Wah Wong and Edward J. Delp eds., IS&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, Vol. 3971 of SPIE Proceedings, San Jose, California USA, 23-28 January 2000Google Scholar
- Andreas Lang, Jana Dittmann, StirMark and profiles: from high end up to preview scenarios, Reviewed Paper, IFIP/GI Workshop on Virtual Goods, Ilmenau (Germany), 28-29 May 2004, online publication available from http://virtualgoods.tu-ilmenau.de/2004/program.htmlGoogle Scholar
- Andreas Lang, Ryan Spring, StirMark Benchmark for Audio - Attack Description, internal report, 2004Google Scholar
- A. Lang, J. Dittmann, E. T. Lin, E. J. Delp, Application Oriented Audio Watermark Benchmark Service, to appear in SPIE 2005, San JoseGoogle Scholar
- Benoit Macq, Jana Dittmann, Edward J. Delp, Benchmarking of Image Watermarking Algorithms for Digital Rights Management, Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management, pp. 971--984, Vol. 92 No. 6, June 2004Google Scholar
- D.D.Rife, J.Vanderkooy, Transfer-Function Measurement with Maximum-Length Sequences, JAES, Vol. 37, June 1989Google Scholar
- Secret Rabbit Code (aka libsamplerate), http://www.mega-nerd.com/SRC/, 2004Google Scholar
- SoundTouch Sound Processing Library, http://sky.prohosting.com/oparviai/soundtouch/, 2004Google Scholar
- SQAM - Sound Quality Assessment Material, http://sound.media.mit.edu/mpeg4/audio/sqam/, 2004Google Scholar
- Steven W. Smith, The Scientist and Engineer's Guide to Digital Processing, California Technical Publishing, ISBN 0 9660176 3 3, 1997 Google ScholarDigital Library
- T. Thiede, W. C. treurniet, R. Bitto, C. Schmidmer, T. Sporer, J. G. Beerends, C. Colomes, M. Keyhl, G. Stoll, K. Brandeburg, B. Feiten, PEAQ -- The ITU Standard for Objective Measurement of Perceived Audio Quality, J. Audio Eng. Soc., vol. 48, pp. 3--29, Jan-Feb. 2000Google Scholar
- Visit Audacity, Inc, http://www.audacity.com/, 2004Google Scholar
- Thomas Vogel, Jana Dittmann, Illustration Watermarking: An Object Based Approach for Digital Images, to appear in SPIE 2005, San JoseGoogle Scholar
- X Multimedia System, http://www.xmms.com/, 2004Google Scholar
- Eberhard Zwicker, Hugo Fastl, Psychoacoustics. Facts and Models, Springer, Berlin, November 2001, ISBN 3 540 65063 6Google Scholar
Index Terms
Audio watermark attacks: from single to profile attacks
Recommendations
Watermarking scheme capable of resisting attacks based on availability of inserter
Image and Video Coding beyond StandardsAttacks based on the presence of watermark inserter are easy to perform since they make use of similarity between an original watermark and additionally added ones by using the same inserter and key. In this paper, a novel watermarking scheme capable of ...
Feature based watermarking using watermark template match
This paper presents a robust digital image watermarking scheme using feature point detection and watermark template match. A scale interactive model based filter is used to extract the feature points of original image, based on which a watermark ...
Detection attack analysis using partial watermark in DCT domain
SIN '12: Proceedings of the Fifth International Conference on Security of Information and NetworksThe paper presents a novel framework for blind watermark detection on additive watermarking in Discrete Cosine Transform (DCT) domain. Watermarks which resist any attempt by an adversary to thwart their intended purpose such as unauthorized detection, ...
Comments