An efficient watermarking method for MP3 audio files

被引:0
作者
Koukopoulos, D [1 ]
Stamatiou, Y [1 ]
机构
[1] Res & Acad Comp Technol Inst, Patras 26110, Greece
来源
ENFORMATIKA, VOL 7: IEC 2005 PROCEEDINGS | 2005年
关键词
audio watermarking; mpeg audio layer 3; hard instance generation; NP-completeness;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this work, we present for the first time in our perception an efficient digital watermarking scheme for mpeg audio layer 3 files that operates directly in the compressed data domain, while manipulating the time and subband/channel domain. In addition, it does not need the original signal to detect the watermark. Our scheme was implemented taking special care for the efficient usage of the two limited resources of computer systems: time and space. It offers to the industrial user the capability of watermark embedding and detection in time immediately comparable to the real music time of the original audio file that depends on the mpeg compression, while the end user/audience does not face any artifacts or delays hearing the watermarked audio file. Furthermore, it overcomes the disadvantage of algorithms operating in the PCM-Data domain to be vulnerable to compression/recompression attacks, as it places the watermark in the scale factors domain and not in the digitized sound audio data. The strength of our scheme, that allows it to be used with success in both authentication and copyright protection, relies on the fact that it gives to the users the enhanced capability their ownership of the audio file not to be accomplished simply by detecting the bit pattern that comprises the watermark itself, but by showing that the legal owner knows a hard to compute property of the watermark.
引用
收藏
页码:154 / 159
页数:6
相关论文
共 14 条
  • [1] [Anonymous], 1998, MP3STEGO
  • [2] [Anonymous], 1979, Computers and Intractablity: A Guide to the Theoryof NP-Completeness
  • [3] ARMENI S, 2001, 8 PANH C INF NIC CYP
  • [4] ARNOLD M, 1999, DFG VIIDII WAT WORKS
  • [5] Robust audio watermarking in the time domain
    Bassia, P
    Pitas, I
    Nikolaidis, N
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2001, 3 (02) : 232 - 241
  • [6] Techniques for data hiding
    Bender, W
    Gruhl, D
    Morimoto, N
    Lu, A
    [J]. IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 313 - 336
  • [7] Digital watermarks for audio signals
    Boney, L
    Tewfik, AH
    Hamdy, KN
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, 1996, : 473 - 480
  • [8] Cheeseman P., 1991, PROC 12 IJCAI, P331, DOI [DOI 10.5555/1631171.1631221, 10.5555/1631171.1631221]
  • [9] DITTMANN J, 1999, MULT SEC WORKSH ACM
  • [10] HAYES B, 1997, COMPUTING SCI CANT G