[go: up one dir, main page]

Nadeau et al., 2013 - Google Patents

Insertion, deletion robust audio watermarking: a set theoretic, dynamic programming approach

Nadeau et al., 2013

View PDF
Document ID
12877353584019490301
Author
Nadeau A
Sharma G
Publication year
Publication venue
Media Watermarking, Security, and Forensics 2013

External Links

Snippet

Desynchronization vulnerabilities have limited audio watermarking's success in applications such as digital rights management (DRM). Our work extends (blind-detection) spread spectrum (SS) watermarking to withstand time scale desynchronization (insertion/deletions) …
Continue reading at hajim.rochester.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain

Similar Documents

Publication Publication Date Title
Lie et al. Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification
US7529941B1 (en) System and method of retrieving a watermark within a signal
US8346567B2 (en) Efficient and secure forensic marking in compressed domain
US6674861B1 (en) Digital audio watermarking using content-adaptive, multiple echo hopping
US6738744B2 (en) Watermark detection via cardinality-scaled correlation
Swanson et al. Robust audio watermarking using perceptual masking
US6456726B1 (en) Methods and apparatus for multi-layer data hiding
Renza et al. Authenticity verification of audio signals based on fragile watermarking for audio forensics
US7562228B2 (en) Forensic for fingerprint detection in multimedia
US7035700B2 (en) Method and apparatus for embedding data in audio signals
US7451318B1 (en) System and method of watermarking a signal
Dhar et al. Blind SVD-based audio watermarking using entropy and log-polar transformation
Kirovski et al. Audio watermark robustness to desynchronization via beat detection
Kirovski et al. Randomizing the replacement attack
Schonberg et al. Fingerprinting and forensic analysis of multimedia
CN102222504A (en) Digital audio multilayer watermark implanting and extracting method
KR100560429B1 (en) Watermarking apparatus and method using nonlinear quantization
Nadeau et al. Insertion, deletion robust audio watermarking: a set theoretic, dynamic programming approach
Karnjana et al. Audio Watermarking Scheme Based on Singular Spectrum Analysis and Psychoacoustic Model with Self‐Synchronization
Kirovski et al. The replacement attack
Berchtold et al. Collusion-secure patchwork embedding for transaction watermarking
Hana'a Content-Based Authentication Using Digital Speech Data
Vaitheki et al. A Havoc proof for secure and robust audio watermarking
Patil et al. Adaptive Spread Spectrum Audio Watermarking.
Choi et al. Digital audio watermarking using moment-preserving thresholding