Abstract
In this paper, we proposed an adaptive secure client-side digital audio watermarking by choosing an optimal embedding key from numerous available embedding keys for the encryption and joint decryption and watermarking procedure of the specific content. In the proposed scheme, the embedding key will determine not only the client-specific watermark content to be embedded, but also the watermarking embedding position where the watermark will be placed. It is obvious that different region of the host signal featured different characteristics, so where to embed the watermark will impact the equilibrium between two basic requirements, known as inaudibility and robustness, of watermarking development. Consequently, how to choose the embedding key for the particular content to be distributed could be of crucial significance. Simulation results show that the watermark in this scheme can survive robustly after being subjected to various common audio attacks, such as filtering, resample and so on.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Maes, M., et al.: Digital watermarking for DVD video copy protection. IEEE Signal Process Mag. 17(5), 47–57 (2000)
Crowcroft, J., Perkins, C., Brown, I.: A method and apparatus for generating multiple watermarked copies of an information signal. WOPtent/56059 (2000)
Emmanuel, S., Kankanhalli, M.: Copyright protection for MPEG-2 compressed broadcast video. In: ICME 2001, IEEE Int. Conf. on Multimedia and Expo., pp. 203–209 (2001)
Jin, H., Lotspiech, J.: Attacks and forensic analysis for multimedia content protection. In: Proc. of ICME. IEEE Int. Conf. on Multimedia and Expo. (2005)
Anderson, R.J., Manifavas, C.: Chameleon-A new kind of stream cipher. In: Proc. 4th Int. Workshop on Fast Software Encryption, London, U.K, pp. 107–113 (1997)
Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting-Joint fingerprinting and decryption of broadcast messages. In: 11th Australasian Conf. Information Security and Privacy, pp. 136–147 (2006)
Celik, M., et al.: Secure embedding of spread-spectrum watermarks using look-up tables. In: Proc. Int. Conf. Acoustics, Speech and Signal Processing, Honolulu, HI, pp. II-153–II-156 (2007)
Piva, A., Bianchi, T., Rosa, A.D.: Secure Client-Side ST-DM Watermark Embedding. IEEE Trans. on Information Forensics and Security 5(1), 13–26 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jiang, JJ., Pun, CM. (2011). Secure Client-Side Digital Watermarking Using Optimal Key Selection. In: Kim, Th., et al. Communication and Networking. FGCN 2011. Communications in Computer and Information Science, vol 266. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27201-1_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-27201-1_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27200-4
Online ISBN: 978-3-642-27201-1
eBook Packages: Computer ScienceComputer Science (R0)