skip to main content
10.1145/1073170.1073179acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Audio watermark attacks: from single to profile attacks

Authors Info & Claims
Published:01 August 2005Publication History

ABSTRACT

A wide range of watermarking evaluation approaches and especially image benchmarking suites have been described in the literature. Our paper sets the main focus on the evaluation of digital audio watermarking with StirMark Benchmark for Audio (SMBA). Here we describe the currently implemented single geometric attacks in detail and introduce our so-called attack profiles. Profiles reflect an application oriented point of view ranging from the normal usage of audio content like internet radio or music shops up to typical attacker scenarios. In particular we present a definition of an extended profile which is composed of three basic profiles specific for annotation watermarks. Furthermore, we demonstrate how SMBA attacks can be used to evaluate the transparency of digital watermarking algorithms regarding the embedding strength. Test results based on an example audio watermarking algorithm and the measurement of transparency and capacity are presented.

References

  1. Emmanuel C. Ifeachor, Barrie W. Jervis, Digital Signal Processing, Prentice Hall, ISBN 0201 59619 9, 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Nedeljko Cvejic, Algorithms for Audio Watermarking and Steganography, Department of Electrical and Information Engineering, Information Processing Laboratory, University of Oulu, 2004Google ScholarGoogle Scholar
  3. Jana Dittmann, Martin Steinebach, Andreas Lang, Sascha Zmudzinsky, Advanced audio watermarking benchmarking, San Jose, CA, USA Bellingham, Washington, USA, SPIE 2004, vol. 5306Google ScholarGoogle Scholar
  4. EAQUAL, http://home.wanadoo.nl/~w.speek/eaqual.htm, 2004Google ScholarGoogle Scholar
  5. Zaid Ghazal, Umsetzung und Vergleich von digitalen Audio Wasserzeichenalgorithmen, diploma thesis at Otto-von-Guericke University of Magdeburg, 2005Google ScholarGoogle Scholar
  6. ITU-R Recommendation BS.1387, Method for Objective Measurements of Perceived Audio Quality, Dec. 1998Google ScholarGoogle Scholar
  7. F.Y. Duan, I. King, A Short Summary of Digital Watermarking Techniques for Multimedia Data, Department of Computer Science and Engineering, Chinese University of Hong Kong, Shatin, N.T., Hong Kong, ChinaGoogle ScholarGoogle Scholar
  8. M. Kutter, F.A.P. Petitcolas, A fair benchmark for image watermarking system, In SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, Vol. 3657, San Jose, CA, USA, 25-27 January 1999Google ScholarGoogle Scholar
  9. M. Kutter, S. Voloshynovskiy and A. Herrigel, Watermark copy attack, In Ping Wah Wong and Edward J. Delp eds., IS&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, Vol. 3971 of SPIE Proceedings, San Jose, California USA, 23-28 January 2000Google ScholarGoogle Scholar
  10. Andreas Lang, Jana Dittmann, StirMark and profiles: from high end up to preview scenarios, Reviewed Paper, IFIP/GI Workshop on Virtual Goods, Ilmenau (Germany), 28-29 May 2004, online publication available from http://virtualgoods.tu-ilmenau.de/2004/program.htmlGoogle ScholarGoogle Scholar
  11. Andreas Lang, Ryan Spring, StirMark Benchmark for Audio - Attack Description, internal report, 2004Google ScholarGoogle Scholar
  12. A. Lang, J. Dittmann, E. T. Lin, E. J. Delp, Application Oriented Audio Watermark Benchmark Service, to appear in SPIE 2005, San JoseGoogle ScholarGoogle Scholar
  13. Benoit Macq, Jana Dittmann, Edward J. Delp, Benchmarking of Image Watermarking Algorithms for Digital Rights Management, Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management, pp. 971--984, Vol. 92 No. 6, June 2004Google ScholarGoogle Scholar
  14. D.D.Rife, J.Vanderkooy, Transfer-Function Measurement with Maximum-Length Sequences, JAES, Vol. 37, June 1989Google ScholarGoogle Scholar
  15. Secret Rabbit Code (aka libsamplerate), http://www.mega-nerd.com/SRC/, 2004Google ScholarGoogle Scholar
  16. SoundTouch Sound Processing Library, http://sky.prohosting.com/oparviai/soundtouch/, 2004Google ScholarGoogle Scholar
  17. SQAM - Sound Quality Assessment Material, http://sound.media.mit.edu/mpeg4/audio/sqam/, 2004Google ScholarGoogle Scholar
  18. Steven W. Smith, The Scientist and Engineer's Guide to Digital Processing, California Technical Publishing, ISBN 0 9660176 3 3, 1997 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Thiede, W. C. treurniet, R. Bitto, C. Schmidmer, T. Sporer, J. G. Beerends, C. Colomes, M. Keyhl, G. Stoll, K. Brandeburg, B. Feiten, PEAQ -- The ITU Standard for Objective Measurement of Perceived Audio Quality, J. Audio Eng. Soc., vol. 48, pp. 3--29, Jan-Feb. 2000Google ScholarGoogle Scholar
  20. Visit Audacity, Inc, http://www.audacity.com/, 2004Google ScholarGoogle Scholar
  21. Thomas Vogel, Jana Dittmann, Illustration Watermarking: An Object Based Approach for Digital Images, to appear in SPIE 2005, San JoseGoogle ScholarGoogle Scholar
  22. X Multimedia System, http://www.xmms.com/, 2004Google ScholarGoogle Scholar
  23. Eberhard Zwicker, Hugo Fastl, Psychoacoustics. Facts and Models, Springer, Berlin, November 2001, ISBN 3 540 65063 6Google ScholarGoogle Scholar

Index Terms

  1. Audio watermark attacks: from single to profile attacks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          MM&Sec '05: Proceedings of the 7th workshop on Multimedia and security
          August 2005
          164 pages
          ISBN:1595930329
          DOI:10.1145/1073170

          Copyright © 2005 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 August 2005

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate128of318submissions,40%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader