Localized audio watermarking technique robust against time-scale modification

被引:106
|
作者
Li, W [1 ]
Xue, XY [1 ]
Lu, PZ [1 ]
机构
[1] Fudan Univ, Dept Comp Sci & Engn, Shanghai 200433, Peoples R China
基金
中国国家自然科学基金;
关键词
localized watermarking; music content analysis; time-scale modification (TSM);
D O I
10.1109/TMM.2005.861291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
dSynchronization attacks like random cropping andtime-scale modification are very challenging problems to audio watermarking techniques. To combat these attacks, a novel content-dependent localized robust audio watermarking scheme is proposed. The basic idea is to first select steady high-energy local regions that represent music edges like note attacks, transitions or drum sounds by using different methods, then embed the watermark in these regions. Such regions are of great importance to the understanding of music and will not be changed much for maintaining high auditory quality. In this way, the embedded watermark has the potential to escape all kinds of distortions. Experimental results show strong robustness against common audio signal processing, time-domain synchronization attacks, and most distortions introduced in Stirmark for Audio.
引用
收藏
页码:60 / 69
页数:10
相关论文
共 50 条
  • [31] Audio watermarking robust against D/A and A/D conversions
    Shijun Xiang
    EURASIP Journal on Advances in Signal Processing, 2011
  • [32] Time-scale modification of speech signals
    Ninness, Brett
    Henriksen, Soren John
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2008, 56 (04) : 1479 - 1488
  • [33] Speech Time-Scale Modification With GANs
    Cohen, Eyal
    Kreuk, Felix
    Keshet, Joseph
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1067 - 1071
  • [34] Frequency Dependent Time-Scale Modification
    Roberts, Timothy
    Paliwal, Kuldip K.
    2018 12TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2018,
  • [35] Time-scale modification of music signals
    Grofit, S
    Lavner, Y
    22ND CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, PROCEEDINGS, 2002, : 254 - 256
  • [36] New echo embedding technique for robust and imperceptible audio watermarking
    Oh, HO
    Seok, JW
    Hong, JW
    Youn, DH
    2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS: VOL I: SPEECH PROCESSING 1; VOL II: SPEECH PROCESSING 2 IND TECHNOL TRACK DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS NEURALNETWORKS FOR SIGNAL PROCESSING; VOL III: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING - VOL IV: SIGNAL PROCESSING FOR COMMUNICATIONS; VOL V: SIGNAL PROCESSING EDUCATION SENSOR ARRAY & MULTICHANNEL SIGNAL PROCESSING AUDIO & ELECTROACOUSTICS; VOL VI: SIGNAL PROCESSING THEORY & METHODS STUDENT FORUM, 2001, : 1341 - 1344
  • [37] New echo embedding technique for robust and imperceptible audio watermarking
    Oh, H
    Seok, J
    Hong, J
    Youn, D
    2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS: VOL I: SPEECH PROCESSING 1; VOL II: SPEECH PROCESSING 2 IND TECHNOL TRACK DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS NEURALNETWORKS FOR SIGNAL PROCESSING; VOL III: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING - VOL IV: SIGNAL PROCESSING FOR COMMUNICATIONS; VOL V: SIGNAL PROCESSING EDUCATION SENSOR ARRAY & MULTICHANNEL SIGNAL PROCESSING AUDIO & ELECTROACOUSTICS; VOL VI: SIGNAL PROCESSING THEORY & METHODS STUDENT FORUM, 2001, : 4029 - 4029
  • [38] A novel audio watermarking algorithm robust against recapturing attacks
    He, Junjie
    Liu, Zhenghui
    Lin, Kejia
    Qian, Qing
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (12) : 18599 - 18616
  • [39] A novel audio watermarking algorithm robust against recapturing attacks
    Junjie He
    Zhenghui Liu
    Kejia Lin
    Qing Qian
    Multimedia Tools and Applications, 2023, 82 : 18599 - 18616
  • [40] A blind audio watermarking algorithm robust against synchronization attack
    Wang, XY
    Zhao, H
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 617 - 622