skip to main content
10.1145/2381716.2381858acmotherconferencesArticle/Chapter ViewAbstractPublication PagescubeConference Proceedingsconference-collections
research-article

Schur decomposition and dither modulation: an efficient and robust audio watermarking technique

Published:03 September 2012Publication History

ABSTRACT

To protect the copyright for providing ownership in audio signal watermarking techniques are requisite. In this paper, a new robust audio watermarking algorithm is proposed, which is based on Schur decomposition and Dither modulation. In the Schur decomposition and Dither modulation based technique, watermark embedding is done using Dither modulation quantization which has a good performance in terms of imperceptibility, robustness and speed etc. Schur decomposition and Dither modulation is a blind audio watermarking technique which is robust against various attacks such as Additive White Gaussian Noise (AWGN), cropping, echoing, low pass filtering, requantization, resampling etc. The proposed technique has shown efficient and stable performance against various attacks and it is computationally faster.

References

  1. I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalke, Digital Watermarking and Steganography, second Ed., Morgan Kaufmann, Burlington, MA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Chang C-Y, Shen W-C, Wang H-J (2006) Using counter-propagation neural network for robust digital audio watermarking in DWT domain. In: IEEE International conference on systems, man and cybernetics, (SMC'06), Vol 2, pp 1214--1219.Google ScholarGoogle ScholarCross RefCross Ref
  3. Vivekananda Bhat K, Indranil Sengupta, Abhijit Das. An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. V. Bhat K et al./Digital Signal Processing 20 (2010) 1547--1558. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. X. Wang, and H. Zhao, "A Blind Audio Watermarking Robust Against Synchronization Attacks," CIS 2005, Part II, LNAI 3802, pp. 617--622, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Nedeljko, "Algorithms For Audio Watermarking And Steganography", Academic Dissertation, University of Oulu, public discussion in Kuusamonsali (Auditorium YB210), Linnanmaa, Finland, 2004.Google ScholarGoogle Scholar
  6. R. Polikar, "Home page - Dr. Robi Polikar," Jan 2001. {Online}.http://users.rowan.edu/~polikar/WAVELETS/WTtutorial.html. Accessed: July 21, 2010.Google ScholarGoogle Scholar
  7. Wu S, Huang J, Huang D, Shi YQ (2005) efficiently self-synchronized audio watermarking for based audio data transmission. IEEE Trans Broadcast 51 (1): 69--76.Google ScholarGoogle ScholarCross RefCross Ref
  8. Fan M, Wang H (2009) Chaos-based discrete fractional Sine transform domain audio watermarking scheme. Comput Electr Eng 35 (3): 506--516 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Chandra Mohan and K. Veera Swamy. On the use of Schur Decomposition for Copyright Protection of Digital Images. International Journal of Computer and Electrical Engineering, Vol. 2, No. 4, August, 2010 1793--8163.Google ScholarGoogle Scholar
  10. Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47 (4): 1423--1443. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. N. Christian, H. Jurgen, Digital watermarking and its influence on audio quality, in: Proceeding of the 105th AES Convention, 1998 preprint 4823.Google ScholarGoogle Scholar

Index Terms

  1. Schur decomposition and dither modulation: an efficient and robust audio watermarking technique

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CUBE '12: Proceedings of the CUBE International Information Technology Conference
      September 2012
      879 pages
      ISBN:9781450311854
      DOI:10.1145/2381716

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 September 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader