Abstract

We propose a new intelligent audio watermarking method based on the characteristics of the HAS and the techniques of neural networks in the DCT domain. The method makes the watermark imperceptible by using the audio masking characteristics of the HAS. Moreover, the method exploits a neural network for memorizing the relationships between the original audio signals and the watermarked audio signals. Therefore, the method is capable of extracting watermarks without original audio signals. Finally, the experimental results are also included to illustrate that the method significantly possesses robustness to be immune against common attacks for the copyright protection of digital audio.

Highlights

  • The maturity of networking and data-compression techniques promotes an efficient distribution for digital products

  • Illegal reproduction and distribution of digital audio products become much easier by using the digital technology with lossless data duplication

  • The watermark technique could be applied to establish the ownership of digital audio for copyright protection and authentication

Read more

Summary

INTRODUCTION

The maturity of networking and data-compression techniques promotes an efficient distribution for digital products. The techniques of conventional cryptography protect the content from anyone without private decrypted keys They are useful in protecting an audio from being intercepted during data transmission [1]. An audio watermarking method has been proposed in [4] to effectively protect the copyright of audio. Swanson’s method requires the original audio for the watermark extraction. This kind of watermarking methods fails to identify the owner copyright of audio due to the ambiguity of ownerships. On the basis of the characteristics of the human auditory system (HAS) and the techniques of neural networks, this paper presents a new audio watermarking method without the original audio for the watermark extraction.

FREQUENCY-MASKING
WATERMARK EMBEDDING
WATERMARK EXTRACTION
EXPERIMENTAL RESULTS
Attack free
Robustness to filtering
Robustness to multiple attacks
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.