A Robust Adaptive Digital Audio Watermarking Scheme Against MP3 Compression

Similar documents
â, Đ (Very Long Baseline Interferometry, VLBI)


Pose Determination from a Single Image of a Single Parallelogram

This document has been prepared by Sunder Kidambi with the blessings of

An Example file... log.txt

A Double-objective Rank Level Classifier Fusion Method

Price discount model for coordination of dual-channel supply chain under e-commerce

EXTRACT THE PLASTIC PROPERTIES OF METALS US- ING REVERSE ANALYSIS OF NANOINDENTATION TEST

Adaptive Audio Watermarking via the Optimization. Point of View on the Wavelet-Based Entropy

Ä D C Ã F D {f n } F,

Surface Modification of Nano-Hydroxyapatite with Silane Agent

Vectors. Teaching Learning Point. Ç, where OP. l m n

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

ADVANCES IN MATHEMATICS(CHINA)

Thermal Conductivity of Electric Molding Composites Filled with β-si 3 N 4

2008, hm 2. ( Commodity Bundle) [ 6], 25 4 Vol. 25 No JOURNAL OF NATURAL RESOURCES Apr., , 2, 3, 1, 2 3*,

Audio Zero-Watermarking Based on Discrete Hartley Transform and Non-Negative Matrix Factorization

Ú Bruguieres, A. Virelizier, A. [4] Á «Î µà Monoidal

Planning for Reactive Behaviors in Hide and Seek

F O R SOCI AL WORK RESE ARCH

Digital Image Watermarking Algorithm Based on Wavelet Packet

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking

Application of ICA and PCA to extracting structure from stock return

Framework for functional tree simulation applied to 'golden delicious' apple trees

ETIKA V PROFESII PSYCHOLÓGA

APPARENT AND PHYSICALLY BASED CONSTITUTIVE ANALYSES FOR HOT DEFORMATION OF AUSTENITE IN 35Mn2 STEEL

" #$ P UTS W U X [ZY \ Z _ `a \ dfe ih j mlk n p q sr t u s q e ps s t x q s y i_z { U U z W } y ~ y x t i e l US T { d ƒ ƒ ƒ j s q e uˆ ps i ˆ p q y

General Neoclassical Closure Theory: Diagonalizing the Drift Kinetic Operator

LA PRISE DE CALAIS. çoys, çoys, har - dis. çoys, dis. tons, mantz, tons, Gas. c est. à ce. C est à ce. coup, c est à ce

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Wavelet-based Audio Watermarking Techniques: Robustness and Fast Synchronization

Affine-invariant Shape Recognition Using Grassmann Manifold

$%! & (, -3 / 0 4, 5 6/ 6 +7, 6 8 9/ 5 :/ 5 A BDC EF G H I EJ KL N G H I. ] ^ _ ` _ ^ a b=c o e f p a q i h f i a j k e i l _ ^ m=c n ^

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix

UNIQUE FJORDS AND THE ROYAL CAPITALS UNIQUE FJORDS & THE NORTH CAPE & UNIQUE NORTHERN CAPITALS

Periodic monopoles and difference modules

T T V e g em D e j ) a S D } a o "m ek j g ed b m "d mq m [ d, )

LATTICE VECTOR QUANTIZATION FOR IMAGE CODING USING EXPANSION OF CODEBOOK

Anti-synchronization of a new hyperchaotic system via small-gain theorem

Wavelet Packet Based Digital Image Watermarking

Radiative Electroweak Symmetry Breaking with Neutrino Effects in Supersymmetric SO(10) Unifications

Double Sided Watermark Embedding and Detection with Perceptual Analysis

On the average diameter of directed loop networks

TELEMATICS LINK LEADS

QUESTIONS ON QUARKONIUM PRODUCTION IN NUCLEAR COLLISIONS

Examination paper for TFY4240 Electromagnetic theory

Efficient Estimation for the Partially Linear Models with Random Effects

Max. Input Power (W) Input Current (Arms) Dimming. Enclosure

PART IV LIVESTOCK, POULTRY AND FISH PRODUCTION

An improved algorithm for scheduling two identical machines with batch delivery consideration

Two-stage Pedestrian Detection Based on Multiple Features and Machine Learning

Unit 3. Digital encoding

OC330C. Wiring Diagram. Recommended PKH- P35 / P50 GALH PKA- RP35 / RP50. Remarks (Drawing No.) No. Parts No. Parts Name Specifications

u x + u y = x u . u(x, 0) = e x2 The characteristics satisfy dx dt = 1, dy dt = 1

An Introduction to Optimal Control Applied to Disease Models

Books. Book Collection Editor. Editor. Name Name Company. Title "SA" A tree pattern. A database instance

2016 xó ADVANCES IN MATHEMATICS(CHINA) xxx., 2016

Spread Spectrum Watermarking. Information Technologies for IPR Protection

I118 Graphs and Automata

Applications of Discrete Mathematics to the Analysis of Algorithms

Quantization Index Modulation using the E 8 lattice

A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones

New method for solving nonlinear sum of ratios problem based on simplicial bisection

A New Quantum Watermarking Based on Quantum Wavelet Transforms


A Study on the Analysis of Measurement Errors of Specific Gravity Meter

ÇÙÐ Ò ½º ÅÙÐ ÔÐ ÔÓÐÝÐÓ Ö Ñ Ò Ú Ö Ð Ú Ö Ð ¾º Ä Ò Ö Ö Ù Ð Ý Ó ËÝÑ ÒÞ ÔÓÐÝÒÓÑ Ð º Ì ÛÓ¹ÐÓÓÔ ÙÒÖ Ö Ô Û Ö Ö ÖÝ Ñ ¹ ÝÓÒ ÑÙÐ ÔÐ ÔÓÐÝÐÓ Ö Ñ

Matrices and Determinants

Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion

h : sh +i F J a n W i m +i F D eh, 1 ; 5 i A cl m i n i sh» si N «q a : 1? ek ser P t r \. e a & im a n alaa p ( M Scanned by CamScanner

Pharmacological and genomic profiling identifies NF-κB targeted treatment strategies for mantle cell lymphoma

arxiv: v1 [astro-ph.im] 25 Apr 2014

ACS AKK R0125 REV B 3AKK R0125 REV B 3AKK R0125 REV C KR Effective : Asea Brown Boveri Ltd.

Singing voice enhancement for monaural music recordings with a cascade two-stage algorithm

Soil-Water Characteristics of Huai-an Expensive Soil

Reduced-Error Constant Correction Truncated Multiplier

On solution of Klein-Gordon equation in scalar and vector potentials

The University of Bath School of Management is one of the oldest established management schools in Britain. It enjoys an international reputation for

Experimental and numerical simulation studies of the squeezing dynamics of the UBVT system with a hole-plug device

Face Recognition Using Global Gabor Filter in Small Sample Case *

hal , version 1-27 Mar 2014

TOPOLOGICAL ENTROPY FOR DIFFERENTIABLE MAPS OF INTERVALS

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security

Evaluation on source rocks and the oil-source correlation in Bayanhushu sag of Hailaer Basin

ARX System identification of a positioning stage based on theoretical modeling and an ARX model WANG Jing-shu 1 GUO Jie 2 ZHU Chang-an 2

Adaptive synchronization of chaotic neural networks with time delays via delayed feedback control

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

B œ c " " ã B œ c 8 8. such that substituting these values for the B 3 's will make all the equations true

This is a repository copy of The effect of quality scalable image compression on robust watermarking.

QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit

Study on form distribution of soil iron in western Jilin and its correlation with soil properties

Finding small factors of integers. Speed of the number-field sieve. D. J. Bernstein University of Illinois at Chicago

A Beamforming Method for Blind Calibration of Time-Interleaved A/D Converters

Laser on-line Thickness Measurement Technology Based on Judgment and Wavelet De-noising

One-way Hash Function Based on Neural Network

Optimal Time and Random Inspection Policies for Computer Systems

Fast and Automatic Watermark Resynchronization based on Zernike. Moments

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm

SCOTT PLUMMER ASHTON ANTONETTI

Transcription:

½ 33 ½ 3 Þ Vol. 33, No. 3 7 3 ACTA AUTOMATICA SINICA March, 7 è ¹ MP3 ß å 1, Ä 1 1 ý  Åè ó ó ß Ì ß ñ1) Ä Ǒ ² ÂÔÅ þíò) û Ð (Discrete wavelet transform, DWT) Ð ßÙ (Discrete cosine transform, DCT) Í Í Å Âò3) ¹ ó ùþđ ÂÔÅ Đ ò4) Ý Đ Ǒ ÝÅ Ù å Ä Â ß Đ Þ Í á Ð þ Ç» Ì ß Ù Ǒ MP3 þ Ö ¹ Í (ðô ³ ) ³ MP3 ÞĐ TP391 A Robust Adaptive Digital Audio Watermarking Scheme Against MP3 Compression WANG Xiang-Yang 1, YANG Hong-Ying 1 ZHAO Hong 1 Abstract In this paper, a robust adaptive digital audio watermarking scheme in the hybrid domain is presented. The features of the proposed algorithm are as follows: 1)More robust synchronization codes and a new embedded strategy are adopted to resist the attack effectively. )The multi-resolution characteristics of discrete wavelet transform(dwt) and the energy-compression characteristics of discrete cosine transform(dct) are combined to improve the transparency of digital watermark. 3)The adaptive quantization steps are identified according to human auditory masking. 4)The algorithm can extract the watermark without the help of the original digital audio signal. Experimental results show that the proposed watermarking algorithm is imperceptible and robust against various signal processings such as re-sampling, re-quantifying, noising adding, low pass filtering and cropping. Especially, our audio watermarking scheme is remarkably effective in resisting MP3 compression. Key words Digital watermarking, digital audio, MP3 compression, quantization step 1 Ý ß Ǒ þú 5-9- þ ÍÚ 6-6-3 Received September, 5; in revised form June 3, 6 Û (31) ü ² ÒÁ û ( ) Ñè (53), ù (6J3JH), Ç ² Ò û ( ) Ñèáà (KJS6), ä Ò ä ² û (À ) Ñè (ZK514) á Support by the Natural Science Foundation of Liaoning Province of P.R.China (31), the Open Foundation of State Key Laboratory of Vision and Auditory Information Processing (Beijing University, 53), the Natural Science Foundation of Dalian City of P. R. China (6J3JH), the Open Foundation of Jiangsu Province Key Laboratory for Computer Information Processing Technology (Soochow University, KJS6), the Open Foundation of Key Laboratory of Image Processing and Image Communication (Nanjing University of Posts and Communications, ZK514) 1. Ûã Ç ² 1169. ü ² ÒÁ û 1871 1. School of Computer and Information Technique, Liaoning Normal University, Dalian 1169. State Key Laboratory of Vision and Auditory Information Processing, Beijing University, Beijing 1871 DOI: 1.136/aas-7-48 [1] èñ àß àß àß Å¾ ǑÅÙî DCT Í (Í ) Þ []  ² DCT Ù ùþ à ß Đ æ èí Ä î ðùóæ MPEG4 Á Ç Å Ô ü [3 7] Ý ß À ¹ ë Í Ö ( ÇðÔ ³ ) Þ [8]  Åè ß Ì ßÍÅ MP3 ÃǑ ² èùå Â Å Ö ë Í Đ Úñ1)  ² îá ² Ù Ë ò) ß Ó Ã (p,ε,q,d) Á ½ «ò3) ù ÃǑÅ Đ ò4) á Ð þí

3 å ñè ¹ MP3 ß 49  Åè ó ó ß Ì ßü Ǒ 16 Ò Ǒ ÁÈ û Ä Í Ç î ¹ ó Þ ² ó Ë Ǒñ èñ Ë ² ó (DCT DWT) Ë ² ² Ǒ A = {a(i), i < Length} Length Ǒ a(i) {,1,,,( p 1)} ð½ i p ǑÄ Þ ³ äǒ W = {w(i,j), i < M, j < N} w(i,j) {,1} ãä ä ½ i ½ ½ j ä Ǒ F = {f(i), i < Lsyn} f(i) {,1} (Ǒ Å Ù Ô Ò ½ß +1, 1 1) Lsyn Ǒ Đ Ã ó ó Ä (³ ù).1 Ò ǑÅî ä ä èñ ³ Â Ô Ë Í è Í ù» ä ½è ç Ǒ Arnold ä W è ç ǑË Å W 1 W 1 = {w 1 (i,j), i < M, j < N} Ǒ èâô¹ Ð þí ûä Í Ý Ù ß ² ½ Ò ¾ Þ Đ ĐǑ L 1 L û Ç ² ½ i Ä Ǒ A(i) = {a(il + k), k < L}( i < Length / L ) Ô L = L 1 + L, L 1 = Lsyn n, L = M N H+1, H Ǒ n Ǒ ( ü Ǒ 5) Ǒ A (ĐǑ L 1 L Ǒ A 1 A ) à ² Ä. ǑÅ Ý Đ Í (n ) àß ² Ç ÆùǑñ 1) A 1 Í Đ Lsyn Lsyn Þ è PA 1(m) õ n PA 1 (m) = { pa 1 (m)(i) = a 1 (i + m n), i < n, m < Lsyn} ) Ç PA 1(m) PA 1(m) = 1 n 1 pa n 1(m)(i),( m < Lsyn) i= 3) Þàß Þè PA 1(m) Í PA 1(m) è Í Ǒ pa 1 (m)(i) = pa 1(m)(i) + (PA 1 (m) PA 1(m)) (m)(i), i < n} Ǒ Í 1 = {pa 1 (m)(i), i < n} Ǒ Í PA 1 (m) = {pa 1 PA PA 1 ( (m) = IQ(PA 1 (m)) S 1 + S 1/,  Q(PA 1 (m)) = f(m) IQ(PA 1 (m)) S1 S 1/,  Q(PA 1 (m)) f(m) IQ(PA 1 (m)) = PA 1 (m). S 1 Q(PA 1 (m)) = mod(iq(pa 1 (m)),) mod Ǒ S 1 ǑÞĐ.3 ² 1) ( ) DWT Þ A ½ H û A H,DH,DH 1,,D 1 A H Ǒ A ½ H Õ D 1,,D H 1,D ÇǑ H A ½ 1 H ) Õ DCT Đ Õ ÍÅ ¹ä Ôü H Õ A H ½ DCT A HC = DCT(A H ) = {a (t) HC, t < L / H } 3) ² Ǒ Ý Đ ¹ Þ ² DCT ÞÆë M N DCT A HC A HC = { a (t)hc, t < M N a (t) HC, M N t < L / H

5 Þ 33 Þ Ã ñ a (t) HC = ( IQ(a (t) HC ) S + S /, ÂQ(a (t) HC ) = w 1(i, j) IQ(a (t) HC ) S S /, ÂQ(a (t) HC ) w 1(i, j) t = (i 1) N + j i < M j < N S ǑÞĐ j IQ(a (t) HC ) = (a (t) HC ) k S Q(a (t) HC ) = mod(iq(a (t) HC ),) Ô mod ð 4) DCT A HC DCT A H = IDCT(A HC ) 5) DWT A H ãç A H û ½ H DWT õ ² A 3 ÞĐ ó ü ÙÞ à Þ Đ ü æ³ ǑÞĐ Ö ç ³ ÞĐ Đ Í ( îǒ Æð ä) ü ùþđ û Đ ü ¹ Ý à [4] À Å Þ è ÞĐ ÂÞĐ Ã ÃǑ þ ò ÂÞĐ Ã ïá ÃǑ ½Æ à ÞĐ Í ³  ǑÅ Þ Đ Ú îó ß Ë ( Þ ùè ÞĐ Ç ) î Ë ËÆ ùþđ S 1 Ë ËÆ ùþđ S î ¹ ù ÞĐ S 1 ( Ù ) S 1 = log sa ( Ǒå ø ), s a = A s a = A Ä A ( ô ) ¹ ó ùþđ S ( Ù ² ) ÆùǑ 1) A (A õþ ) DWT A ½ H û A H,D H,D H 1,,D 1 A H Ǒ A ½ H Õ D H,DH 1,,D ÇǑ 1 A ½ 1 H ) Õ DCT Ôü H Õ A H ½ DCT A HC = DCT(A H ) = {a (t)hc, t < L / H } 3) ÞĐ S ó ü Ù ² DCT M N Ë ǑÅ Â Ä ÍÅ Ç ÞĐ ËÆû DCT M N ó ùþđ S S = log s b ( Ǒå ø ), s b = ÂHC = L / H 1 t=m N a (t) HC M N 4  ó ó ß Ù ß Ù ² î Á ½Æ 4.1 Ù Ô Ù ð ÙÁí ( Ǒ L 1 ) Ëð õ ² ùǒñ 1) Í ½ 3 ù ó ù Þ Đ S 1 ) Í ½. ù ÇÇ ( Áí ) n m PA (m) PA (m) PA (m) = {pa (m)(i) = a (i + m n), i < n, m < Lsyn} 3)  ² F  Ǒ F = {f (m) = PA (m). S1 mod, m < Lsyn} 4) ǑÅ í ÝæÙµ Å ² Ú ³ àß ù   F F ÃǑ Ù ² 4. ² Â Ô ²  ð Ð (¹Ì Ǒ A ĐǑ L ) Ë ² ùǒñ

3 å ñè ¹ MP3 ß 51 1) Í ½ 3 ù A ËÆ ó ù ÞĐ S ) A ½ H DWT A HC H H 1,D,D,,D A H 3) Õ A H DCT H = DCT(A ) = {a (t) HC, t < / L H} 4)  ²  Ǒ W = w (i,j) = ŵ (i,j) = a (t) HC / S 1 mod Ô w r(i,j) W r, ŵ (i,j) Ŵ 5  { 1 Âwr (i,j) è ( õè ) Ǒ 1 à ǑÅ Ý ß Ô ½ÅÙ Íý þíý û Þ [8] ß ½Å ³ ü ½Æð Ǒ 44.1 khz Ǒ 16 ³ ĐǑ 9.75 ² Å Daubechies-1 ü Ǒ H = ûü Å ĐǑ 16 Ò 11111111111 Ǒ ² Ù ð ü  ² Æð Ç Ä 1 Å ß Þ [8] ß þ Í Â (íµ Â ä èþ ³ NC ä BER ( i < M, j < N,t = (i 1) N + j) 5)  ² W ½ è ç ä W = {w (i,j), i < M, j < N} Á ð Ù ² Å ÙÄ Â ä Wr Á èí Ã Ç Ŵ Ä 1 þ ¹ Í Table 1 The watermark detection results for various attacks (r = 1,,,R) Ǒ (r = 1,,,R) ô ² ³ PSNR)  Åè ó ó ß Ì ßÍÅ Äü Ǒ 16 Ò Ǒ ÁÈ ËÆ ó ù ÞĐ Ç æ ² ó Ë Ë î å Ä Â ß Đ Í Þ á Ð Ò þ Ç» Ì ß Ù Ǒ MP3 þ Ö ¹ Í ( ðô ³ ) ß Ç ß Æð Ý îá ½Æ ÇÖÅ Ù MP3 Ï Ó éþ Þ Ô Ð Ð Ñ Mp3 Mp3 Mp3 Mp3 Mp3 Mp3.5kHz 11.5kHz 8kHz 1% 1% 3k 56k 11k 64k 48k 3k Þ NC 1..9996.3733.3773.37.9161.3851.3739 1. 1..9948.3619.3638.3667 [8] BER..4983.4939.4954.435.4833.4817.9.51.493.515 ß PSNR 37.5415 37.349 37.585.8633.8454 7.9397 13.9636.7441 37.318 37.317 36.8539 36.3864 35.3564 35.848 NC 1. 1. 1..93.8978.961 1. 1. 1. 1. 1..958.9748.934 ß BER.645.1414.443.73.144.57 PSNR 37.8174 37.4785 37.6815.8996.86 8.767 13.9789.7483 37.7747 37.9777 36.9516 36.5663 35.7669 35.871

5 Þ 33 References 1 Kim H J. Audio watermarking techniques. In: Proceedings of Pacific Rim Workshop on Digital Steganography, Kyushu Institute of Technology, Kitakyushu, Japan, July 3 4, 3 Lie W N, Chang L C. Robust and high-quality time-domain audio watermarking subject to psycho acoustic masking. In: Proceedings of the IEEE International Symposium on Circuits and Systems. Arizona, USA,. : 45 48 3 Yeo Kwon, Kim H J. Modified patchwork algorithm: A novel audio watermarking scheme. IEEE Transactions on Speech and Audio Processing, 3, 11(6): 381 386 4 Li Wei, Yuan Yi-Qun, Li Xiao-Qiang, Xue Xiang-Yang, Lu Pei-Zhong. Overview of digital audio watermarking. Journal on Communications, 5, 6(): 1 111 (Óå, è, Ó Ö, å, ö. Ò. ², 5, 6(): 1 111 ) 5 Xu C, Wu J, Sun Q, Xin K. Applications of digital watermarking technology in audio signals. Journal of the Audio Engineering Society, 1999, 47(1): 85 81 6 Swanson D., Zhu B., Tewfik H. Robust audio watermarking using perceptual masking. Signal Processing, 1998, 66(6): 337 355 7 Zhao Chun-Hui, Li Fu-Chang. A blind audio watermark algorithm based on DWT and DCT. Journal of Electronics & Information Technology, 3, 5(11): 157 1574 ( ËÞ, Ó. è DWT DCT ß. ², 3, 5(11): 157 1574) 8 Megías D, Herrera-joancomartí J, Minguillón J. A robust audio watermarking scheme based on MPEG 1 layer ¼ compression. Communications and Multimedia Security - CMS 3, Springer-Verlag, LNCS 963: 6 38. 3 å Ûã Ç ² íµ ² Ë ÜƲ Ò. ². E-mail: wxy37@63.net (WANG Xiang-Yang Professor. His research interest covers information security and multimedia processing. Corresponding author of this paper.) Ä Ûã Ç ² íµ Ü Æ Ç. (YANG Hong-Ying Associate professor. Her research interest covers multimedia technique and CAI.) Ûã Ç ² µ íµ². (ZHAO Hong Master student at Liaoning Normal University. Her research interest covers information security and digital watermarking.)