Survey of imperceptible and robust digital audio watermarking systems

被引:0
作者
Salah E. [1 ]
Narima Z. [2 ]
Khaldi A. [1 ]
Redouane K.M. [3 ]
机构
[1] Computer Science Department, Faculty of Sciences and Technology, Artificial Intelligence and Information Technology Laboratory (LINATI), University of Kasdi Merbah, Ouargla
[2] Electronics Department, Faculty of Engineering Sciences, Laboratories of Automation and Signals of Annaba (LASA), Badji Mokhtar Annaba University, Annaba
[3] Department of Electronics, Faculty of Sciences and Technology, Electrical Engineering Laboratory, University of Kasdi Merbah, Ouargla
基金
英国科研创新办公室;
关键词
Advanced attacks; Audio watermarking; Basic attacks; Capacity; Imperceptibility; Objective perceptual measures; Robustness; Subjective measures; Time domain; Transform domain;
D O I
10.1007/s11042-024-18969-4
中图分类号
学科分类号
摘要
Robustness, imperceptibility and embedding capacity are the preliminary requirements of any digital audio watermarking technique. However, research has concluded that these requirements are difficult to achieve at the same time. Thus, the watermarking technique is closely dependent on the solution that manages the robustness / imperceptibility trade-off. A large majority of research work has been devoted to improving this trade-off by implementing increasingly advanced techniques. For conciseness and efficiency, the comprehensive review reported in this paper mainly considers the following aspects imperceptibility and robustness among the criteria, as they determine the key performance of most existing audio watermarking systems. In this paper we have introduce the basic concepts of digital audio watermarking, the performance characteristics, and a classification of digital audio watermarking systems according to the extraction/detection process or to human perception. We have also presented various digital audio watermarking applications. Further, we have presented classifications of unintentional and intentional attacks that can be performed on audio watermarking systems and we have highlighted the impact of these attacks on the watermarked audio quality. We have presented two classifications made by researchers, the first one categorizes these attacks into basic and advanced attacks, while the second one classifies the attacks by group according to the process performed on the watermarked audio file. Furthermore, after presenting an overview of the properties of the Human Auditory System (HAS), we have presented several evaluation aspects of audio watermarking systems and we have reviewed various recent robust and imperceptible audio watermarking methods in the spatial, transform and hybrid domains. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
引用
收藏
页码:3635 / 3681
页数:46
相关论文
共 108 条
  • [31] Lin Y., Abdulla W.H., Audio watermarking techniques, Audio Watermark a Comprehensive Foundation Using MATLAB, (2015)
  • [32] Liew P., Armand M., Inaudible watermarking via phase manipulation of random frequencies, Multimed Tools Appl, 353, pp. 357-377, (2007)
  • [33] Bender W., Gruhl D., Morimoto N., Lu A., Techniques for data hiding, IBM Syst J, 35, pp. 313-336, (1996)
  • [34] Zwicker E., Fastl H., Psychoacoustics: facts and models, (1990)
  • [35] Herre J., Dick S., Psychoacoustic models for perceptual audio coding—a tutorial review, Appl Sci, 9, 14, (2019)
  • [36] Xiang Y., Hua G., Yan B., Human auditory system and perceptual quality measurement, Digital Audio Watermarking. Springerbriefs in Electrical and Computer Engineering, (2017)
  • [37] Bs R.I., 1387-1 - Method for Objective Measurements of Perceived Audio Quality, (2002)
  • [38] Xian Y., Peng D., Natgunanathan I., Zhou W., Effective pseudonoise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo-based audio watermarking, IEEE Trans Multimed, 131, pp. 2-13, (2011)
  • [39] Ko B.-S., Nishimura R., Suzuki Y., Time-spread echo method for digital audio watermarking, IEEE Trans Multimed, 7, 2, pp. 212-221, (2005)
  • [40] Lu Z.-M., Yan B., Sun S.-H., Watermarking combined with CELP speech coding for authentication, IEICE Trans Inf Syst, E88-D, 2, pp. 330-334, (2005)