Spread Spectrum for Digital Audio Watermarking

Author(s):  
Xing He

This chapter is a comprehensive presentation of spread spectrum-based digital audio watermarking methods. The problem is viewed as the realization of a basic communications system, where the host signal presents the available channel and the watermark presents the transmitted information that needs to survive and be recovered in conditions that include noise distortion, signal transformation, standard compression, and deliberate attacks. Basic spread spectrum theory as it relates to audio watermarking is introduced followed by state-of-the-art improvements. The important synchronization problem is analyzed in detail, existing techniques are presented and a novel, precise synchronization method is included. Finally, the role of psychoacoustics in effective watermarking is emphasized and an enhanced psychoacoustic model based on the discrete wavelet packet transform (DWPT), which ensures efficiency and transparency is included.

2008 ◽  
Vol 2008 ◽  
pp. 1-5 ◽  
Author(s):  
Xing He ◽  
Michael S. Scordilis

This paper presents an audio watermarking scheme which is based on an efficiently synchronized spread-spectrum technique and a new psychoacoustic model computed using the discrete wavelet packet transform. The psychoacoustic model takes advantage of the multiresolution analysis of a wavelet transform, which closely approximates the standard critical band partition. The goal of this model is to include an accurate time-frequency analysis and to calculate both the frequency and temporal masking thresholds directly in the wavelet domain. Experimental results show that this watermarking scheme can successfully embed watermarks into digital audio without introducing audible distortion. Several common watermark attacks were applied and the results indicate that the method is very robust to those attacks.


2011 ◽  
Vol 219-220 ◽  
pp. 1121-1125 ◽  
Author(s):  
Rui Chen ◽  
Yu Lin Lan ◽  
Reza Asharif Mohammad

This paper proposed a digital audio watermarking scheme based on independent component analysis (ICA) in DWT domain. The embedding process make full use of the multi-resolution characteristic of discrete wavelet transform (DWT), performing 3-level DWT. Selecting the low frequency coefficient appropriately as the embed location to make sure of the balance between the transparency and robustness. Then constructing the ICA model to embed the watermarking. The extraction process is similar with ICA’s goal, it’s used in extraction makes the scheme simple for implementation. The experiment results show that the proposed scheme has good robustness against common attacks, as well as transparency.


Author(s):  
Aree Ali Mohammed

Transform-domain digital audio watermarking has a performance advantage over time-domain watermarking by virtue of the fact that frequency  transforms offer better exploitation of the human auditory system (HAS). In this research paper an adaptive audio watermarking is proposed based on the low and high wavelet frequencies band (LF, HF). The embedded watermark can be of any types of signal (text, audio and image). The insertion of the watermark data is performing in a frequency domain after applying discrete wavelet transformation on the cover audio segments. The normalize correlation and the signal to noise ratio metrics are used to test the performance of the proposed method in terms of the robustness and imperceptibility. Test results show that an improvement of the robustness against some type of attacks when the watermark is adaptively embedded in a different wavelet bands.


2012 ◽  
Vol 459 ◽  
pp. 469-473
Author(s):  
Rui Chen ◽  
Yu Lin Lan ◽  
Mohammad Reza Asharif

This paper proposed a digital audio watermarking scheme based on independent component analysis (ICA) in stereo sound. In order to make full use of the multi-channel characteristic of stereo sound, The watermarking embedded into the two channel, half respectively. Also using the multi-resolution characteristic of discrete wavelet transform, performing 3-level DWT in each channel. Selecting the low frequency coefficient appropriately as the embed location to make sure of the balance between the transparency and robustness. The extraction process is similar with ICA’ s goal, it’s used in extraction makes the scheme simple for implementation. The experiment results show that the proposed scheme has good robustness against common attacks, as well as transparency


2014 ◽  
Vol 2 (1) ◽  
pp. 6-9 ◽  
Author(s):  
Yekta Said Can ◽  
Fatih Alagoz ◽  
Melih Evren Burus

Sign in / Sign up

Export Citation Format

Share Document