Loading…
Inaudible watermarking via phase manipulation of random frequencies
Watermarking technology can be beneficial in digital rights protection. However, the industry's acceptance of the technology has been lukewarm as experts have been able to hear audible artifacts introduced during the watermarking process. In this paper, we present what we believe to be a truly...
Saved in:
Published in: | Multimedia tools and applications 2007-12, Vol.35 (3), p.357-377 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Watermarking technology can be beneficial in digital rights protection. However, the industry's acceptance of the technology has been lukewarm as experts have been able to hear audible artifacts introduced during the watermarking process. In this paper, we present what we believe to be a truly inaudible solution to this problem. Our proposed watermarking technique embeds the watermark signal in the phase of an audio signal, with secrecy as to which frequency components carry the watermark bits, achieved via a pseudorandom generator. Inaudibility is realized by exploiting the human auditory system's insensitivity to absolute phase. Further, our algorithm includes a novel mechanism for segmenting an audio signal into variable frame-lengths to provide robustness against de-synchronization attacks such as jitter and time-scaling. It uses a short-time Fourier transform to first characterize local changes in the frequency content of an audio signal, from which, pairs of frequencies satisfying specified conditions are identified, to mark the start and end of a segment. The insertion of synchronization marks adds further robustness against such attacks. Robustness against other common attacks may be further enhanced through the use of concatenated error-control codes which enable the correction of random and/or burst errors, which may be introduced during an attack.[PUBLICATION ABSTRACT] |
---|---|
ISSN: | 1380-7501 1573-7721 |
DOI: | 10.1007/s11042-007-0133-8 |