blind audio watermarking
Recently Published Documents


TOTAL DOCUMENTS

63
(FIVE YEARS 9)

H-INDEX

9
(FIVE YEARS 1)

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Qiuling Wu ◽  
Aiyan Qu ◽  
Dandan Huang ◽  
Lejun Ma

In order to protect the copyright of audio media in cyberspace, a robust and blind audio watermarking scheme based on the genetic algorithm (GA) is proposed in a dual transform domain. A formula for calculating the embedding depth is developed, and two embedding depths with different values are used to represent the “1” and “0” states of the binary watermark, respectively. In the extracting process, the embedding depth in each audio fragment will be calculated and compared with the average embedding depth to determine the watermark bit by bit, so this scheme can blindly extract the watermark without the original audio. GA will be applied to optimize the algorithm parameters for meeting the performance requirements in different applications. Besides, the embedding rule is further optimized to enhance the transparency based on the principle of minimal modification to the audio. Experimental results prove that the payload capacity reaches 172.27 bps, the bit error rate (BER) is 0.1% under the premise that its transparency is higher than 25 dB, and its robustness is strong against many attacks. Significantly, this scheme can adaptively select the algorithm parameters to satisfy the specific performance requirements.


Author(s):  
Venkata Lalitha Narla ◽  
Suresh Gulivindala ◽  
Srinivasa Rao Chanamallu ◽  
D P Gangwar

2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Qiuling Wu ◽  
Aiyan Qu ◽  
Dandan Huang

How to effectively resist synchronization attacks is the most challenging topic in the research of robust watermarking algorithms. A robust and blind audio watermarking algorithm for overcoming synchronization attacks is proposed in dual domain by considering time domain and transform domain. Based on analysing the characteristics of synchronization attacks, an implicit synchronization mechanism (ISM) is developed in the time domain, which can effectively track the appropriate region for embedding and extracting watermarks. The data in this region will be subjected to discrete cosine transform (DCT) and singular value decomposition (SVD) in turn to obtain the eigenvalue that can be utilized to carry watermarks. In order to extract the watermark blindly, the eigenvalue will be quantized. Genetic algorithm (GA) is utilized to optimize the quantization step to balance both transparency and robustness. The experimental results confirm that the proposed algorithm not only withstands various conventional signal processing operations but also resists malicious synchronization attacks, such as time scale modification (TSM), pitch-shifting modification (PSM), jittering, and random cropping. Especially, it can overcome TSM with strength from −30% to +30%, which is much higher than the standard of the International Federation of the Phonographic Industry (IFPI) and far superior to the other algorithms in related papers.


2020 ◽  
Author(s):  
Ali Joudaki ◽  
Marjan Abdeyazdan ◽  
Mohammad Mosleh

Abstract Digital watermarking is one of the best solutions again the copyright infringement, duplicates, verifies data and illegal distribution of digital media. Recently, the protection of digital audio signals is one of the attracting and interesting topics for scientific and researchers. In this paper we propose a blind audio watermarking mechanism in which it has high capacity, transparency and resistance simultaneously based on digital wavelet transform (DWT) algorithm. The key principle of this work is that in the DWT procedure, using two filters; break down the original audio signal into several sub-bands and transform them on a specific frequency range. It should be noted that the 8 bits of watermarked signal is selected and transform to the original signal. In order to increase the watermarking resistance, framing the high frequency coefficients of the third level of the wavelet and calculate the frames average and place them in the frame memory prime. Moreover, TLBO algorithm used to determination of embedding and extraction coefficients in order to increase the SNR ratio in the embedding process and decrease the bit error rate (BER) in the extraction process. This method increases the embedding payload capacity while the audio SNR and extracted image BER have good qualify. Moreover, experimental results shown that this method has 13kbs hiding rate,ascendency imperceptibility, good payload capacity and intense robustness when resisting against various attacks such as MP3 compression, re-quantization, low-pass filtering, amplitude scaling, re-sampling, echo addition and noise corruption.


2020 ◽  
Vol 5 (1) ◽  
pp. 18-32
Author(s):  
Hwai-Tsu Hu ◽  
Ying-Hsiang Lu

This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partitioned into frames for watermarking. To suit different purposes of the watermarking applications, binary information is packed into two groups: frame-related data are embedded in the approximation subband using rational dither modulation; the source-channel coded bit sequence of the host audio is hidden inside the 2nd and 3rd -detail subbands using 2N-ary adaptive quantization index modulation. The frame-related data consists of a synchronization code used for frame alignment and a composite message gathered from four adjacent frames for content authentication. To endow the proposed watermarking scheme with a self-recovering capability, we resort to hashing comparison to identify tampered frames and adopt a Reed–Solomon code to correct symbol errors. The experiment results indicate that the proposed watermarking scheme can accurately locate and recover the tampered regions of the audio signal. The incorporation of the frame synchronization mechanism enables the proposed scheme to resist against cropping and replacement attacks, all of which were unsolvable by previous watermarking schemes. Furthermore, as revealed by the perceptual evaluation of audio quality measures, the quality degradation caused by watermark embedding is merely minor. With all the aforementioned merits, the proposed scheme can find various applications for ownership protection and content authentication.


Sign in / Sign up

Export Citation Format

Share Document