3:30, MMEDIA-P1.1
SPREAD SPECTRUM SIGNALING FOR SPEECH WATERMARKING
J. SORENSEN, Q. CHENG
The technique of
embedding a digital signal into an audio recording or image
using techniques that render the signal imperceptible has
received significant attention. Embedding an imperceptible,
cryptographically secure signal, or watermark, is seen as a potential
mechanism that may be used to prove ownership or detect tampering.
While there has been a considerable amount of attention devoted to the
techniques of spread-spectrum signaling for use in image and audio
watermarking applications, there has only been a limited study for
embedding data signals in speech. Speech is an uncharacteristically
narrow band signal given the perceptual capabilities of the human hearing
system. However, using speech analysis techniques, one may design an
effective data signal that can be used to hide an arbitrary message in
a speech signal. Also included are experiments demonstrating the
subliminal channel capacity of the speech data embedding technique
developed here.
3:30, MMEDIA-P1.2
ROBUST SPREAD-SPECTRUM AUDIO WATERMARKING
D. KIROVSKI, H. MALVAR
We present several mechanisms that enable effective spread-spectrum audio watermarking systems: prevention against detec-tion desynchronization, cepstrum filtering, and chess watermarks. We have incorporated those techniques them into a system capa-ble of reliably detecting a watermark in an audio clip that has been modified using a composition of attacks that degrade the original audio characteristics well beyond the limit of acceptable quality. Such attacks include: fluctuating scaling in the time and frequency domains, compression, addition and multiplication of noise, resampling, requantization, normalization, filtering, and random cutting and pasting of signal samples.
3:30, MMEDIA-P1.3
NEXT GENERATION TECHNIQUES FOR ROBUST AND IMPERCEPTIBLE AUDIO DATA HIDING
J. CHOU, K. RAMCHANDRAN, A. ORTEGA
In this work, we combine recent theoertical and algorithmic advances
in the area of information-hiding with the current mature knowledge-base in
the human audio perception system to propose a novel audio data-hiding
technique that significantly pushes the state-of-the-art in the field.
Our work is based on a combination of advances in two disjoint fields:
information-hiding and human auditory masking. The field of
information-hiding has recently seen a resurgence due to advances in
the understanding of fundamental bounds from information theory.
By integrating this with the human perceptual system knowledge that has
been successfully exploited for several years in the audio compression
community, we derive a new and improved audio data-hiding technique
that finds application in a number of exciting scenarios like music
enhancement and digital communications over analog data channels.
Our preliminary results show that we can embed data at an order of
magnitude higher rate than existing audio data hiding systems, while
being robust to channel noise.
3:30, MMEDIA-P1.4
AUDIO WATERMARKING BY TIME-SCALE MODIFICATION
M. MANSOUR, A. TEWFIK
A new algorithm for audio watermarking is proposed. The basic idea of the algorithm is to change the length of the intervals between salient points of the audio signal to embed data. We propose several novel ideas for practical implementations that can be used by other watermarking schemes as well. The algorithm is robust to common audio processing operations e.g. mp3 lossy compression, low pass filtering, and time-scale modification. The watermarked signal has very high perceptual quality and is indistinguishable from the original signal.
3:30, MMEDIA-P1.5
INFORMED AUDIO WATERMARKING SCHEME USING DIGITAL CHAOTIC SIGNALS
G. SILVESTRE, N. HURLEY, G. HANAU, W. DOWLING
In this paper, an informed audio watermarking scheme using chaotic waveforms is proposed. The watermark consists of an attenuated signal embedded in the original audio signal. A modulation scheme based on vector quantization is used to achieve blind detection of the watermark signal. A method for self-synchronization of the watermark detector is proposed using chaotic orthogonal waveforms. A perceptual model is employed to ensure inaudibility of the embedded signal that is shaped to the spectrum of the host signal. High robustness to external noise is achieved by spreading the watermark data over a period of time and this is assessed by computer simulations.
3:30, MMEDIA-P1.6
MP3 RESISTANT OBLIVIOUS STEGANOGRAPHY
L. GANG, M. RAMKUMAR, A. AKANSU
Robustness to compression is a basic requirement forany data hiding schemes. In this paper, we concentrate on MP3 resistant oblivious data hiding. First MP3 compression algorithm is briefly introduced. In the second part, we propose three effective data hiding schemes, where the message is embedded in amplitude, DFT phase domain and noisy components, respectively. All these schemes demonstrate robusness to MP3 compression.
3:30, MMEDIA-P1.7
ANALYSIS OF ATTACKS ON SDMI AUDIO WATERMARKS
M. WU, S. CRAVER, E. FELTEN, B. LIU
This paper explains and analyzes successful attacks submitted by the authors on four audio watermark proposals during a 3-week SDMI public challenge. Our analysis points out some weaknesses in the watermark techniques currently under SDMI consideration and suggests directions for further improvement. The paper also discusses the framework and strategies for analyzing the robustness and security of watermarking systems as well as the difficulty, uniqueness, and unrealistic expectations of the attack setup.
[Keywords] audio watermark, data hiding, SDMI, attack analysis.
[Websites] (1) http://www.cs.princeton.edu/sip/sdmi/
(2) http://www.ee.princeton.edu/~minwu/sdmi/rsch_sdmi.html
(3) http://www.ee.princeton.edu/~sacraver/pubs.html
3:30, MMEDIA-P1.8
NEW ECHO EMBEDDING TECHNIQUE FOR ROBUST AND IMPERCEPTIBLE AUDIO WATERMARKING
H. OH, J. SEOK, J. HONG, D. YOUN
Conventional echo watermarking techniques often exhibit inherent trade-offs between imperceptibility and robustness. In this paper, a new echo embedding technique is proposed. The proposed method enables one to embed high energy echoes while the host audio quality is not deteriorated, so that it is robust to common signal processing modifications and resistant to tampering. It is possible due to echo kernels that are designed based on psychoacoustic analyses. Subjective and objective evaluations confirmed that the proposed method could improve the robustness without perceptible distortion.
3:30, MMEDIA-P1.9
ROBUST ALGORITHM FOR WATERMARK RECOVERY FROM CROPPED SPEECH
A. GURIJALA, J. DELLER
ROBUST ALGORITHM FOR WATERMARK RECOVERY FROM CROPPED SPEECH
ABSTRACT
Most digital watermarking techniques are susceptible to damage by data cropping. Although the effects of cropping might not be perceptible, watermark recovery may be rendered difficult or impossible due to the desynchronization of the recovery process. The transform encryption coding (TEC) based watermarking algorithm was presented at ICASSP 2000 [2]. The present paper investigates the performance of TEC watermarking in the presence of cropping, and presents an algorithm that identifies cropped samples and recovers watermarks from the damaged record. Implementation details and experimental results under different environmental conditions are presented.