Robust audio watermarking using frequency-selective spread spectrum

نویسندگان

  • Hafiz Malik
  • Rashid Ansari
  • Ashfaq A. Khokhar
چکیده

A novel audio watermarking scheme based on frequency-selective spread spectrum (FSSS) technique is presented. Unlike most of the existing spread spectrum (SS) watermarking schemes that use the entire audible frequency range for watermark embedding, the proposed scheme randomly selects subband(s) signal(s) of the host audio signal for watermark embedding. The proposed FSSS scheme provides a natural mechanism to exploit the band-dependent frequency-masking characteristics of the human auditory system to ensure the fidelity of the host audio signal and the robustness of the embedded information. Key attributes of the proposed scheme include reduced host interference in watermark detection, better fidelity, secure embedding and improved multiple watermark embedding capability. To detect the embedded watermark, two blind watermark detection methods are examined, one based on normalised correlation and the other based on estimation correlation. Extensive simulation results are presented to analyse the performance of the proposed scheme for various signal manipulations and standard benchmark attacks. A comparison with the existing fullband SS-based schemes is also provided to show the improved performance of the proposed scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling

This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image using a generated pseudo-random sequence. Unlike the conventional signal modeling, we suppose that both signal and noise are distributed with Laplacian distribution, because the ...

متن کامل

Peak Detection based Spread Spectrum Audio Watermarking using Discrete Wavelet Transform

This paper proposes a robust spread spectrum based audio watermarking scheme using Discrete wavelet transform (DWT). Here we use a peak detection algorithm to obtain high robustness. In this watermarking scheme, watermarks are embedded into the peak value of detail coefficients of, transformed audio signal. It is a blind watermarking technique which is used for providing copyright protection an...

متن کامل

Peak Detection based Spread Spectrum Audi Watermarking using Discrete Wavelet Transform

This paper proposes a robust spread spectrum based audio watermarking scheme using Discrete wavelet transform (DWT). Here we use a peak detection algorithm to obtain high robustness. In this watermarking scheme, watermarks are embedded into the peak value of detail coefficients of, transformed audio signal. It is a blind watermarking technique which is used for providing copyright protection an...

متن کامل

Robust Covert Communication over a Public Audio Channel Using Spread Spectrum

We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum for prevention against desynchronization attacks and (ii) psycho-acoustic frequency masking (PAFM). We show that PAFM impacts the balance of “ones” and “zeros” in the part of the spreadspectrum sequence used for waterma...

متن کامل

Spread spectrum audio watermarking using frequency hopping and attack characterization

In this paper, we present a novel audio watermarking scheme that uses attack characterization to obtain high robustness against standard watermark attacks. The watermark embedding and detection are based on the frequency hopping method in the spectral domain. Perceptual transparency of the algorithm, achieved using frequency masking property of the human auditory system, was con5rmed throughout...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IET Information Security

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2008