Digital Audio Watermarking Techniques and Technologies
Latest Publications


TOTAL DOCUMENTS

14
(FIVE YEARS 0)

H-INDEX

3
(FIVE YEARS 0)

Published By IGI Global

9781599045139, 9781599045153

Author(s):  
Wen-Chih Wu ◽  
Oscal Chen

In this chapter, detailed explanations would be given on the role of echo hiding playing in audio watermarking, in terms of background, functions and applications. Additionally, a section is dedicated to discuss the various approaches proposed in the past to solve the flaws of echo hiding. Lastly, the proposed analysis-by-synthesis echo watermarking scheme based on interlaced kernels is introduced. Comparisons in audio quality and robustness performance are also looked at the proposed and conventional echo watermarking schemes.


Author(s):  
Nikos Nikolaidis ◽  
Alexia Giannoula

Digital rights management of audio signals through robust watermarking has received significant attention during the last years. Two approaches for blind robust watermarking of audio signals are presented in this chapter. Both approaches use chaotic maps for the generation of the watermark signals and a correlation-based watermark detection procedure. The first method is a zero-bit method that embeds high-frequency chaotic watermarks in the low frequencies of the Discrete Fourier Transform (DFT) domain, thus achieving reliable detection and robustness to a number of attacks. The second method operates on the temporal domain and robustly embeds multiple bits of information in the host signal. Experimental results are provided to demonstrate the performance of the two methods.


Author(s):  
Aparna Gurijala

The main objective of the chapter is to provide an overview of existing speech watermarking technology and to demonstrate the importance of speech processing concepts for the design and evaluation of watermarking algorithms. This chapter describes the factors to be considered while designing speech watermarking algorithms, including the choice of the domain and speech features for watermarking, watermarked signal fidelity, watermark robustness, data payload, security, and watermarking applications. The chapter presents several state-of-the-art robust and fragile speech watermarking algorithms and discusses their advantages and disadvantages.


Author(s):  
Sridhar Krishnan ◽  
Behnaz Ghoraani

In this book chapter, we present an overview of our time-frequency (TF) based audio watermarking methods. First, a motivation on the necessity of data authentication, and an introduction in Digital Rights Management (DRM) to protect digital multimedia contents is presented. TF techniques provide flexible means to analyze non-stationary audio signals. We have explained the joint TF domain for watermark representation, and have employed pattern recognition schemes for watermark detection. In this chapter; we introduce two watermarking methods; embedding non-linear and linear TF signatures as watermarking signatures. Robustness of the proposed methods against common signal manipulations is also studied in this chapter.


Author(s):  
Hyoung-Joong Kim ◽  
Shijun Xiang ◽  
In-Kwon Yeo

The patchwork watermarking scheme is investigated in this chapter. The performance of this algorithm in terms of imperceptibility, robustness and security has been shown to be satisfactory. Robustness of the patchwork algorithm to the curve-fitting attack and blind multiple-embedding attack is presented also in this chapter. Robustness against jitter attack which is a natural enemy of this watermarking al-gorithm is also studied.


Author(s):  
Yi-Wen Liu

This chapter promotes the use of parametric synthesis models in digital audio watermarking. It argues that, because human auditory perception is not a linear process, the optimal hiding of binary data in digital audio signals should consider parametric transforms that are generally nonlinear. To support this argument, an audio watermarking algorithm based on aligning frequencies of spectral peaks to grid points is presented as a case study; its robustness is evaluated and benefits are discussed. Toward the end, research directions are suggested, including watermark-aided sound source segregation, cocktail watermarking, and counter-measure against arithmetic collusive attacks.


Author(s):  
Nedeljko Cvejic ◽  
Tapio Seppänen

This chapter gives a general overview of the audio watermarking fundamental definitions. Audio watermarking algorithms are characterized by five essential properties, namely: perceptual transparency, watermark bit rate, robustness, blind/informed watermark detection and security. Chapter also reviews the most common signal processing manipulations that are frequently applied to the watermarked audio in order to prevent detection of the embedded watermark. Finally, several application areas for digital audio watermarking are presented and advantages of digital watermarking over standard technologies examined.


Author(s):  
Teddy Furon ◽  
François Cayre ◽  
Caroline Fontaine

Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive experimental assessments. Some key events in this quest are the use of spread spectrum, the invention of resynchronization schemes, the discovery of side information channel, and the formulation of the embedding and attacking strategies as a game. On the contrary, security received little attention in the watermarking community. This chapter presents a comprehensive overview of this recent concept. We list the typical applications which require a secure watermarking technique. For each context, a threat analysis is purposed. This presentation allows us to illustrate all the certainties the community has on the subject, browsing all key papers. The end of the paper is devoted to what remains not clear, intuitions and future trends.


Author(s):  
Michael Arnold

Methods for evaluating the quality of watermarked objects are detailed in this chapter. It will provide an overview of subjective and objective methods usable in order to judge the influence of watermark embedding on the quality of audio tracks. The problem associated with the quality evaluation of watermarked audio data will be presented. This is followed by a presentation of subjective evaluation standards used in testing the transparency of marked audio tracks as well as the evaluation of marked items with intermediate quality. Since subjective listening tests are expensive and dependent on many not easily controllable parameters, objective quality measurement methods are discussed in section Objective Evaluation Standards. Section Implementation of a Quality Evaluation presents the whole process of testing the quality taking into account the methods discussed in this chapter. Special emphasis is devoted to a detailed description of the test setup, item selection and the practical limitations. The last section summarizes the chapter.


Author(s):  
Say Wei Foo

Based on the requirement of watermark recovery, watermarking techniques may be classified under one of three schemes: non-blind watermarking scheme, blind watermarking schemes with and without synchronization information. For the non-blind watermarking scheme, the original signal is required for extracting the watermark and hence only the owner of the original signal will be able to perform the task. For the blind watermarking schemes, the embedded watermark can be extracted even if the original signal is not readily available. Thus, the owner does not have to keep a copy of the original signal. In this chapter, three audio watermarking techniques are described to illustrate the three different schemes. The time-frequency technique belongs to the non-blind watermarking scheme; the multiple-echo hiding technique and the peak-point extraction technique fall under the blind watermarking schemes with and without synchronization information respectively.


Sign in / Sign up

Export Citation Format

Share Document