[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3007669.3007698acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimcsConference Proceedingsconference-collections
research-article

Novel Robust Audio Watermarking Scheme against Synchronization Attacks

Published: 19 August 2016 Publication History

Abstract

In this paper, a new robust watermarking scheme is described. In this scheme, two complementary watermarking algorithms are used to resist different attacks. First, the largest singular value of every frame is calculated after discrete wavelet transform (DWT) and segment. After single value decomposition (SVD), the watermark sequences are embedded several times, for redundancy, by adjusting the largest singular values of the frames according to the pre-set rule. This watermarking algorithm works well in the case of common signal processing. The second watermarking algorithm based on the histogram is utilized to resist synchronization attacks. In the process of image extraction, two types of watermarking images are extracted using two different methods. Then, an appropriate judgment is enforced to determine the final watermark image. In this way, though each of the two watermarking algorithms is not robust enough to withstand all attacks, they have complementary advantages. In other words, by embedding two types of watermarks, the whole watermarking scheme displays great robustness when facing both common signal processing and synchronization attacks.

References

[1]
Sobha, R. V. and M. Sucharitha. 2015. Secure transmission of data using audio watermarking with protection on synchronization attack. Global Conference on Communication Technologies (Thuckalay, 2015), 592--597.
[2]
Xiang. Y, Natgunanathan. I., Rong. Y., and Guo. S. 2015. Spread Spectrum-Based High Embedding Capacity Watermarking Method for Audio Signals. IEEE/ACM Transactions on Audio, Speech, and Language Processing (Dec. 2015), 2228--2237.
[3]
Pandey. M. K., Parmar. G., and Gupta. R. 2015. Audio watermarking by spreading echo in time domain using pseudo noise gray sequence. International Conference on Industrial Instrumentation and Control(Pune, 2015), 740--743.
[4]
Sencar H. T., Ramkumar. M., Akansu. A. N., and Sukerkar. A. 2007. Improved utilization of embedding distortion in scalar quantization based data hiding techniques. EURASIP Signal Process. (May 2007), 877--890.
[5]
Dhavale. S. V., Deodhar. R. S., Pradhan. D., and Patnaik. L. 2013. M.Robust multiple stereo audio watermarking for copyright protection and integrity checking.International Conference on Computational Intelligence and Information Technology (Mumbai, 2013), 9--16.
[6]
Kaur. A., Dutta. M. K., Soni. K. M. and Taneja. N. 2013. A Blind Audio Watermarking Algorithm Robust Against Synchronization Attacks.IEEE International Conference onSignal Processing, Computing and Control (Solan, Sept. 2013) 1--6.
[7]
Hao. F., Jiang W., Huang X., Jing X. 2010. Robust audio watermarking algorithm against TSM. International Conference on Intelligent Computing and Integrated Systems (Guilin, Oct. 2010), 76--78.
[8]
El bahi. A., Khalil. M. and Adib.A. 2013. A dual audio watermarking system based on Spread Spectrum and QIM technique. International Conference on Intelligent Systems: Theories and Applications (Rebat, 2013) 1--4.
[9]
S. Xiang and J. Huang. 2007. Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks.IEEE Transactions on Multimedia (Nov. 2007), 1357--1372.
[10]
W. Qi, D. Xu and X. Chen. 2015. A self-synchronization digital audio watermarking based on support vector regression. International Conference on Intelligent Control and Information Processing(wuhan, 2015), 511--516.

Cited By

View all
  • (2021)Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient ModificationIEEE/ACM Transactions on Audio, Speech and Language Processing10.1109/TASLP.2021.309255529(2282-2295)Online publication date: 29-Jun-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMCS'16: Proceedings of the International Conference on Internet Multimedia Computing and Service
August 2016
360 pages
ISBN:9781450348508
DOI:10.1145/3007669
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Xidian University

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 August 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Digital audio watermarking
  2. Dual watermarking
  3. Synchronization attack

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • the National Natural Science Foundation of China
  • the Fundamental Research Funds for the Central Universities

Conference

ICIMCS'16

Acceptance Rates

ICIMCS'16 Paper Acceptance Rate 77 of 118 submissions, 65%;
Overall Acceptance Rate 163 of 456 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient ModificationIEEE/ACM Transactions on Audio, Speech and Language Processing10.1109/TASLP.2021.309255529(2282-2295)Online publication date: 29-Jun-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media