Abstract

Recently, several ownership protection schemes which combine encryption and secret sharing technology have been proposed. To reveal the original message, however, they exploited XOR operation which is similar to a one-time pad. It is fairly losing the reconstruction simplicity due to the human visual system (HVS). It should be noted that it is completely different from the original concept of visual cryptography proposed by Naor and Shamir. To decrypt the secret message, Naor and Shamir’s concept stacked k transparencies together. The operation solely does a visual OR of the shares rather than XOR, the way HVS does. In this paper, we, consequently, adopt Naor and Shamir’s concept to apply correct theory of visual cryptography. Furthermore, audio copyright protection schemes which exploit chaotic modulation or watermark integration into frequency components have been widely proposed. Nevertheless, security issue against intentional distortions has not been addressed yet. In this paper, we aim to construct a resilient audio ownership protection scheme to enhance the security by integrating the discrete wavelet transform and discrete cosine transform, visual cryptography, and digital timestamps. In the proposed scheme, the watermark does not require to be embedded within the original audio but is used to generate a secret image and a public image. The watermark is then acquired by performing OR between the secret and public image. We can alleviate the trade-off expenses between the capacity of data payload and two other important properties such as imperceptibility and robustness without modifying the original audio signals. The experiments against a variety of audio signals processing provided by StirMark confirm superior robustness of the proposed scheme. We also demonstrate the intentional distortion by modifying the original content via experiments, it reveals comparable reliability. The proposed scheme can be widely applied to the area of audio ownership protection.

Highlights

  • 1.1 Background Protection of an intellectual property has become a major problem in the digital age

  • 1.4 Contribution This paper proposes a novel audio watermarking based on visual cryptography that can be exploited in ownership protection area

  • 4 Conclusions This paper investigates the problem of constructing an audio ownership protection scheme in order to resist against both intentional and incidental distortions

Read more

Summary

Introduction

1.1 Background Protection of an intellectual property has become a major problem in the digital age. It is possible to duplicate digital information a million-fold and distribute it over the entire world in seconds through the Internet. The watermark is regarded as a code, which is impossible or very difficult to detect and/or remove, and it can be used to. Most audio watermark algorithms insert the information as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The embedded information is hidden and linked inseparably with the source data structure. For the optimal watermarking application trade-offs among competing criteria such as robustness, non-perceptibility, capacity, nondetectability, and security have to be considered. There is always trade-off between capacity and other two important properties, non-perceptibility and robustness. A higher capacity is always obtained at the expense of either robustness or non-perceptibility (or both) [3]. Some audio quality degradations inevitably occur due to the embedding process

Objectives
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.