Nadeau et al., 2013 - Google Patents
Insertion, deletion robust audio watermarking: a set theoretic, dynamic programming approachNadeau et al., 2013
View PDF- Document ID
- 12877353584019490301
- Author
- Nadeau A
- Sharma G
- Publication year
- Publication venue
- Media Watermarking, Security, and Forensics 2013
External Links
Snippet
Desynchronization vulnerabilities have limited audio watermarking's success in applications such as digital rights management (DRM). Our work extends (blind-detection) spread spectrum (SS) watermarking to withstand time scale desynchronization (insertion/deletions) …
- 238000003780 insertion 0 title abstract description 29
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lie et al. | Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification | |
US7529941B1 (en) | System and method of retrieving a watermark within a signal | |
US8346567B2 (en) | Efficient and secure forensic marking in compressed domain | |
US6674861B1 (en) | Digital audio watermarking using content-adaptive, multiple echo hopping | |
US6738744B2 (en) | Watermark detection via cardinality-scaled correlation | |
Swanson et al. | Robust audio watermarking using perceptual masking | |
US6456726B1 (en) | Methods and apparatus for multi-layer data hiding | |
Renza et al. | Authenticity verification of audio signals based on fragile watermarking for audio forensics | |
US7562228B2 (en) | Forensic for fingerprint detection in multimedia | |
US7035700B2 (en) | Method and apparatus for embedding data in audio signals | |
US7451318B1 (en) | System and method of watermarking a signal | |
Dhar et al. | Blind SVD-based audio watermarking using entropy and log-polar transformation | |
Kirovski et al. | Audio watermark robustness to desynchronization via beat detection | |
Kirovski et al. | Randomizing the replacement attack | |
Schonberg et al. | Fingerprinting and forensic analysis of multimedia | |
CN102222504A (en) | Digital audio multilayer watermark implanting and extracting method | |
KR100560429B1 (en) | Watermarking apparatus and method using nonlinear quantization | |
Nadeau et al. | Insertion, deletion robust audio watermarking: a set theoretic, dynamic programming approach | |
Karnjana et al. | Audio Watermarking Scheme Based on Singular Spectrum Analysis and Psychoacoustic Model with Self‐Synchronization | |
Kirovski et al. | The replacement attack | |
Berchtold et al. | Collusion-secure patchwork embedding for transaction watermarking | |
Hana'a | Content-Based Authentication Using Digital Speech Data | |
Vaitheki et al. | A Havoc proof for secure and robust audio watermarking | |
Patil et al. | Adaptive Spread Spectrum Audio Watermarking. | |
Choi et al. | Digital audio watermarking using moment-preserving thresholding |