65 resultados para Echo watermarking

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

A robust audio watermarking method based on the time-spread (TS) echo hiding scheme is proposed. Compared with existing TS watermarking methods, the approach is more robust as it exploits the characteristics of host signals in the encoding stage. Theoretical analysis and simulation examples demonstrate the effectiveness and advantages of the method.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper deals with the problem of digital audio watermarking using echo hiding. Compared to many other methods for audio watermarking, echo hiding techniques exhibit advantages in terms of relatively simple encoding and decoding, and robustness against common attacks. The low security issue existing in most echo hiding techniques is overcome in the timespread echo method by using pseudonoise (PN) sequence as a secret key. In this paper, we propose a novel sequence, in conjunction with a new decoding function, to improve the imperceptibility and the robustness of time-spread echo based audio watermarking. Theoretical analysis and simulation examples illustrate the effectiveness of the proposed sequence and decoding function.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper, a novel bipolar time-spread (TS) echo hiding based watermarking method is proposed for stereo audio signals, to overcome the low robustness problem in the traditional TS echo hiding method. At the embedding, echo signals with opposite polarities are added to both channels of the host audio signal. This improves the imperceptibility of the watermarking scheme, since added watermarks have similar effects in both channels. Then decoding part is developed, in order to improve the robustness of the watermarking scheme against common attacks. Since these novel embedding and decoding methods utilize the advantage of two channels in stereo audio signals, it significantly reduces the interference of host signal at watermark extraction which is the main reason for error detection in the traditional TS echo hiding based watermarking under closed-loop attack. The effectiveness of the proposed watermarking scheme is theoretically analyzed and verified by simulations under common attacks. The proposed echo hiding method outperforms conventional TS echo hiding based watermarking when their perceptual qualities are similar.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper proposes an effective pseudonoise (PN) sequence and the corresponding decoding function for time-spread echo-based audio watermarking. Different from the traditional PN sequence used in time-spread echo hiding, the proposed PN sequence has two features. Firstly, the echo kernel resulting from the new PN sequence has frequency characteristics with smaller magnitudes in perceptually significant region. This leads to higher perceptual quality. Secondly, the correlation function of the new PN sequence has three times more large peaks than that of the existing PN sequence. Based on this feature, we propose a new decoding function to improve the robustness of time-spread echo-based audio watermarking. The effectiveness of the proposed PN sequence and decoding function is illustrated by theoretical analysis, simulation examples, and listening test.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In audio watermarking, the robustness against pitch-scaling attack, is one of the most challenging problems. In this paper, we propose an algorithm, based on traditional time-spread(TS) echo hiding based audio watermarking to solve this problem. In TS echo hiding based watermarking, pitch-scaling attack shifts the location of pseudonoise (PN) sequence which appears in the cepstrum domain. Thus, position of the peak, which occurs after correlating with PN-sequence changes by an un-known amount and that causes the error. In the proposed scheme, we replace PN-sequence with unit-sample sequence and modify the decoding algorithm in such a way it will not depend on a particular point in cepstrum domain for extraction of watermark. Moreover proposed algorithm is applied to stereo audio signals to further improve the robustness. Experimental results illustrate the effectiveness of the proposed algorithm against pitch-scaling attacks compared to existing methods. In addition to that proposed algorithm also gives better robustness against other conventional signal processing attacks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This work proposes a novel dual-channel time-spread echo method for audio watermarking, aiming to improve robustness and perceptual quality. At the embedding stage, the host audio signal is divided into two subsignals, which are considered to be signals obtained from two virtual audio channels. The watermarks are implanted into the two subsignals simultaneously. Then the subsignals embedded with watermarks are combined to form the watermarked signal. At the decoding stage, the watermarked signal is split up into two watermarked subsignals. The similarity of the cepstra corresponding to the watermarked subsignals is exploited to extract the embedded watermarks. Moreover, if a properly designed colored pseudonoise sequence is used, the large peaks of its auto-correlation function can be utilized to further enhance the performance of watermark extraction. Compared with the existing time-spread echo-based schemes, the proposed method is more robust to attacks and has higher imperceptibility. The effectiveness of our method is demonstrated by simulation results.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In echo-based audio watermarking methods, poor robustness and low embedding capacity are the main problems. In this paper, we propose a novel time-spread echo method for audio watermarking, aiming to improve the robustness and the embedding capacity. To improve the robustness, we design an efficient pseudonoise (PN) sequence and a corresponding decoding function. Compared to the conventional PN sequence used in time-spread echo hiding based method, more large peaks are produced during the autocorrelation of the proposed PN sequence. Our decoding function is designed to utilize these peaks to improve the robustness. To enhance the embedding capacity, multiple watermark bits are embedded into one audio segment. This is achieved by varying the delays of added echo signals. Moreover, the security of the proposed method is further improved by scrambling the watermarks at the embedding stage. Compared with the conventional time-spread echo-based method, the proposed method is more robust to conventional attacks and has higher embedding capacity. The effectiveness of our method is illustrated by simulation results.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research presented improved watermarking methods for mono and stereo audio signals. To enhance the performance, novel methods are developed using echo hiding techniques and patchwork-based algorithms. The superior performances of the proposed methods are demonstrated by theoretical analysis and simulation examples, in comparison with the existing methods.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a patchwork-based audio watermarking method to resist de-synchronization attacks such as pitch-scaling, time-scaling, and jitter attacks. At the embedding stage, the watermarks are embedded into the host audio signal in the discrete cosine transform (DCT) domain. Then, a set of synchronization bits are implanted into the watermarked signal in the logarithmic DCT (LDCT) domain. At the decoding stage, we analyze the received audio signal in the LDCT domain to find the scaling factor imposed by an attack. Then, we modify the received signal to remove the scaling effect, together with the embedded synchronization bits. After that, watermarks are extracted from the modified signal. Simulation results show that at the embedding rate of 10 bps, the proposed method achieves 98.9% detection rate on average under the considered de-synchronization attacks. At the embedding rate of 16 bps, it can still obtain 94.7% detection rate on average. So, the proposed method is much more robust to de-synchronization attacks than other patchwork watermarking methods. Compared with the audio watermarking methods designed for tackling de-synchronization attacks, our method has much higher embedding capacity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Owners and vendors are increasingly publishing their materials in digital form. Because such materials can be exactly copied, a mechanism is required that will protect the legitimate owners of these works, by providing proof of original ownership. Digital watermarking has now become one accepted method of establishing ownership of digital materials. The owner of a work embeds a pattern, called a digital watermark, in the content. This embedded watermark is normally undetectable, but its presence can be demonstrated by the owner of the work or his agent, thereby proving ownership. Digital watermarking has been used for many types of multimedia content, primarily audio, video and flat images. Recently, interest has been shown in applying digital watermarking schemes to 3D surfaces, in various formats. In this paper, we examine a method whereby a digital watermark can be embedded in a Bezier surface. A prototype watermarking method for such surfaces is presented, with some experimental results, and a discussion of directions for future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Piva et al's watermarking scheme for electronic copyright management system (ECMS), authors were considered trusted potentially, so a dishonest author could authorize more than one distributor to sell her one document, named "One Document to Multi-distributor" problem, which would damage the benefit of the distributors. To resolve the problem, in this paper, we propose an enhanced watermarking protocol based on Piva et al's scheme by introducing document nature code (DNC) and register records table. In addition, our protocol offers the distributor an efficient means to verify his right to an authorized digital document.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Content based image retrieval (CBIR) is a technique to search for images relevant to the user’s query from an image collection.In last decade, most attention has been paid to improve the retrieval performance. However, there is no significant effort to investigate the security concerning in CBIR. Under the query by example (QBE) paradigm, the user supplies an image as a query and the system returns a set of retrieved results. If the query image includes user’s private information, an untrusted server provider of CBIR may distribute it illegally, which leads to the user’s right problem. In this paper, we propose an interactive watermarking protocol to address this problem. A watermark is inserted into the query image by the user in encrypted domain without knowing the exact content. The server provider of CBIR will get the watermarked query image and uses it to perform image retrieval. In case where the user finds an unauthorized copy, a watermark in the unauthorized copy will be used as evidence to prove that the user’s legal right is infringed by the server provider.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Watermarking technique enables to hide an imperceptible watermark into a multimedia content for copyright protection. However, in most conventional watermarking schemes, the watermark is embedded solely by the seller, and both the seller and the buyer know the watermarked copy, which causes unsettled dispute at the phase of arbitration. To solve this problem, many watermarking protocols have been proposed using watermarking scheme in the encrypted domain. In this paper, we firstly discuss many security aspects in the encrypted domain, and then propose a new method of homomorphism conversion for probabilistic public key cryptosystem with homomorphic property. Based on our previous work, a new secure watermarking scheme for watermarking protocol is presented using a new embedding strategy in the encrypted domain. We employ an El Gamal variant cryptosystem with additive homomorphic property to reduce the computing overload of watermark embedding in the encrypted domain, and RA code to improve the robustness of the watermarked image against many moderate attacks after decryption. Security analysis and experiment demonstrate that the secure watermarking scheme is more suitable for implementing the existing watermarking protocols.

Relevância:

20.00% 20.00%

Publicador: