Browse > Article
http://dx.doi.org/10.3745/KIPSTB.2012.19B.1.009

Interval-based Audio Integrity Authentication Algorithm using Reversible Watermarking  

Yeo, Dong-Gyu (국립금오공과대학교 모바일연구소)
Lee, Hae-Yeoun (국립금오공과대학교 컴퓨터소프트웨어공학과)
Abstract
Many audio watermarking researches which have been adapted to authenticate contents can not recover the original media after watermark removal. Therefore, reversible watermarking can be regarded as an effective method to ensure the integrity of audio data in the applications requiring high-confidential audio contents. Reversible watermarking inserts watermark into digital media in such a way that perceptual transparency is preserved, which enables the restoration of the original media from the watermarked one without any loss of media quality. This paper presents a new interval-based audio integrity authentication algorithm which can detect malicious tampering. To provide complete reversibility, we used differential histogram-based reversible watermarking. To authenticate audio in parts, not the entire audio at once, the proposed algorithm processes audio by dividing into intervals and the confirmation of the authentication is carried out in each interval. Through experiments using multiple kinds of test data, we prove that the presented algorithm provides over 99% authenticating rate, complete reversibility, and higher perceptual quality, while maintaining the induced-distortion low.
Keywords
Audio Authentication; Audio Watermarking; Reversible Watermarking;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 R. Tachibana, "Improving audio watermark robustness using stretched patterns against geometric distortion," Proc. PCM Adv. Multimedia Inf. Process., Vol.2532, pp.647-654, 2002.
2 M. Mansour and A. Tewfik, "Audio watermarking by time-scale modification,"in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Vol.3, pp.1353-1356, May, 2001.
3 M. Mansour and A. Tewfik, "Data embedding in audio using time-scale modification," IEEE Trans. Speech Audio Process., Vol.13, No.3, pp.432-440, May, 2005.   DOI   ScienceOn
4 W. Li, X. Xue, and P. Lu, "Localized audio watermarking technique robust against time-scale modification," IEEE Trans. Multimedia, Vol.8, No.1, pp.60-69, Feb., 2006.   DOI   ScienceOn
5 S. Xiang and J. Huang, "Histogram-based audio watermarking against time-scale modifications and cropping attacks," IEEE Trans. Multimedia, Vol.9, No.7, pp.1357-1372, Nov., 2007.   DOI   ScienceOn
6 X. Zhang, D. Chang, W. Yang, Q. Huang, W. Guo and Y. Zhao, "An Audio Digital Watermarking Algorithm Transmitted via Air Channel in Double DCT Domain," 2011 International Conference on Multimedia Technology (ICMT), pp.2926-2930, Jul., 2011.
7 X. Huang, I. Echizen, and A. Nishimura, "A new approach of reversible acoustic steganography for tampering detection," Proc. of Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2010), pp.538-542, Nov., 2010.
8 여동규, 이해연, "차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘", 정보처리학회논문지 Vol.18B, No.6, Dec., 2011.
9 I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, "Digital Watermarking and Steganography," Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
10 J. Fridrich, J. Goljan and R. Du, "Invertible authentication," Proc. of the SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, Vol.4314, pp.197-208, Jan., 2001.
11 F. Mintzer, J. Lotspiech and N. Morimoto, "Safeguarding digital library contents and users: digital watermarking," D-Lib Magazine, Dec., 1997.
12 S. Katzenbeisser and F. A. P. Peticolas, Eds., Information Hiding Techniques for Steganography and Digital Watermarking. Norwell, MA: Artech House, 2000.
13 R. Tachibana, S. Shimizu, T. Nakamura, and S. Kobayashi, "An audio watermarking method robust against time- and frequency-fluctuation,"in Proc. SPIE Security and Watermarking of Multimedia Contents III, San Jose, CA, Vol.4314, pp.104-115, 2001.
14 H. T. Sencar, M. Ramkumar, A. N. Akansu, and A. Sukerkar, "Improved utilization of embedding distortion in scalar quantization based data hiding techniques," EURASIP Signal Process. J. (Elsevier), Vol.87, pp.877-890, May, 2007.   DOI   ScienceOn
15 J. Haitsma, T. Kalker, and F. Bruekers, "Audio watermarking for monitoring and copy protection," in Proc. 8th ACM Multimedia Workshop, Los Angeles, CA, pp.119-122, 2000.
16 D. Kirovski and H. S. Malvar, "Spread-spectrum watermarking of audio signals," IEEE Trans. Signal Process., Vol.51, No.4, pp.1020-1033, Apr., 2003.   DOI   ScienceOn