11th International Conference on, p

Similar documents
DWT based high capacity audio watermarking

An Improvement for Hiding Data in Audio Using Echo Modulation

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code

23rd European Signal Processing Conference (EUSIPCO) ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio

Introduction to Audio Watermarking Schemes

High capacity robust audio watermarking scheme based on DWT transform

Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates

Audio Compression using the MLT and SPIHT

Acoustic Communication System Using Mobile Terminal Microphones

Audio Data Verification and Authentication using Frequency Modulation Based Watermarking

PAPER Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification

FPGA implementation of DWT for Audio Watermarking Application

Audio Watermarking Scheme in MDCT Domain

Chapter 2 Audio Watermarking

Localized Robust Audio Watermarking in Regions of Interest

RECOMMENDATION ITU-R BS

Performance Analysis of Parallel Acoustic Communication in OFDM-based System

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

A Modified Multicarrier Modulation Binary Data Embedding in Audio File

Data Hiding in Digital Audio by Frequency Domain Dithering

A Modified Multicarrier Modulation Binary Data Embedding in Audio File

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT

Performance Improving LSB Audio Steganography Technique

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection

Time-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING

Signal Processing for Speech Applications - Part 2-1. Signal Processing For Speech Applications - Part 2

Audio Watermark Detection Improvement by Using Noise Modelling

High Capacity Audio Watermarking Based on Fibonacci Series

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

I D I A P R E S E A R C H R E P O R T. June published in Interspeech 2008

IT is well known that digital watermarking( WM) is an

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF

Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Communications Theory and Engineering

Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

An Enhanced Least Significant Bit Steganography Technique

Digital Image Watermarking by Spread Spectrum method

A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression

Cepstrum alanysis of speech signals

A Phase Modulation Audio Watermarking Technique

Abstract. 1. Need for evaluation. 2. Evaluation tool Methodology Need for third party Requirements

Spectral estimation using higher-lag autocorrelation coefficients with applications to speech recognition

Adaptive Selection of Embedding. Spread Spectrum Watermarking of Compressed Audio

NOISE SHAPING IN AN ITU-T G.711-INTEROPERABLE EMBEDDED CODEC

Testing of Objective Audio Quality Assessment Models on Archive Recordings Artifacts

Different Approaches of Spectral Subtraction Method for Speech Enhancement

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing

Colour image watermarking in real life

Topic. Spectrogram Chromagram Cesptrogram. Bryan Pardo, 2008, Northwestern University EECS 352: Machine Perception of Music and Audio

A High-Rate Data Hiding Technique for Uncompressed Audio Signals

Audio Fingerprinting using Fractional Fourier Transform

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Comparative study of digital audio steganography techniques

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

Audio watermarking robust against D/A and A/D conversions

Audio Watermarking Based on Fibonacci Numbers

A SYSTEMATIC APPROACH TO AUTHENTICATE SONG SIGNAL WITHOUT DISTORTION OF GRANULARITY OF AUDIBLE INFORMATION (ASSDGAI)

Overview of Code Excited Linear Predictive Coder

Analytical Analysis of Disturbed Radio Broadcast

The main object of all types of watermarking algorithm is to

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Data Hiding In Audio Signals

B.Tech III Year II Semester (R13) Regular & Supplementary Examinations May/June 2017 DIGITAL SIGNAL PROCESSING (Common to ECE and EIE)

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Digital Speech Processing and Coding

Journal of mathematics and computer science 11 (2014),

Ninad Bhatt Yogeshwar Kosta

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST On the Use of Masking Models for Image and Audio Watermarking

Reduction of Musical Residual Noise Using Harmonic- Adapted-Median Filter

Mel Spectrum Analysis of Speech Recognition using Single Microphone

Nonuniform multi level crossing for signal reconstruction

CH 5. Air Interface of the IS-95A CDMA System

Digital Watermarking and its Influence on Audio Quality

Speech Synthesis using Mel-Cepstral Coefficient Feature

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Enhanced Waveform Interpolative Coding at 4 kbps

Sound is the human ear s perceived effect of pressure changes in the ambient air. Sound can be modeled as a function of time.

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet

Speech Enhancement Based On Noise Reduction

Sound/Audio. Slides courtesy of Tay Vaughan Making Multimedia Work

True Peak Measurement

SGN Audio and Speech Processing

CDMA Technology. Pr. S.Flament Pr. Dr. W.Skupin On line Course on CDMA Technology

Attack restoration in low bit-rate audio coding, using an algebraic detector for attack localization

Proceedings of Meetings on Acoustics

CH 4. Air Interface of the IS-95A CDMA System

NCCF ACF. cepstrum coef. error signal > samples

Evaluation of clipping-noise suppression of stationary-noisy speech based on spectral compensation

Voice Transmission --Basic Concepts--

Speech/Music Discrimination via Energy Density Analysis

MPEG-4 Structured Audio Systems

TIMA Lab. Research Reports

In this lecture. System Model Power Penalty Analog transmission Digital transmission

COMB-FILTER FREE AUDIO MIXING USING STFT MAGNITUDE SPECTRA AND PHASE ESTIMATION

Separation and Recognition of multiple sound source using Pulsed Neuron Model

Transcription:

NAOSITE: Nagasaki University's Ac Title Audible secret keying for Time-spre Author(s) Citation Matsumoto, Tatsuya; Sonoda, Kotaro Intelligent Information Hiding and 11th International Conference on, p Issue Date 215 URL Right http://hdl.handle.net/169/36582 215 IEEE. Personal use of this m IEEE must be obtained for all other including reprinting/republishing t promotional purposes, creating new redistribution to servers or lists, this work in other works. This document is downloaded http://naosite.lb.nagasaki-u.ac.jp

Audible secret keying for Time-spread-echo based Audio watermarking Tatsuya MATSUMOTO Department of Engineering, Nagasaki University, Nagasaki, Japan Kotaro SONODA Division of Electrical Engineering and Computer Science, Graduate School of Engineering, Nagasaki University Nagasaki, Japan, sonoda-iihmsp15@cis.nagasaki-u.ac.jp Abstract This paper deals with the pseudo noise (PN) generating method for digital audio watermarking using time-spread echo hiding. In time-spread echo based audio watermarking, the secret payload is embedded in the form of multiple echoes spread by a pseudo noise sequence and the pseudo noise sequence is used as secret key. Generally, the pseudo noise sequence is required to be uncorrelated with other sequence and therefore typically generated by an M-sequence generator. In this paper, we propose a key sequence generating method which generates a key sequence from an audio signal. By using the new key sequence generated from an audio signal instead of an M-sequence, the key information users have to remember is their secret audio signal but not a complicated random PN key. Therefore, the availability of digital audio watermarking would be improved. After introducing the new key generation method, we evaluated the proposed key sequence. The result shows it can detect a secret payload similar to use of a conventional M-sequence and does not deteriorate inaudibility of the embedded watermark. Index Terms time-spread echo hiding; audio watermarking; I. INTRODUCTION In the secure watermarking process of embedding and detection, key information which is shared only with limited entity is required. The time-spread echo based audio watermarking technique[1] represents the watermarked secret bit information as added multiple echoes of a host signal and pseudo noise (PN) is used in the echo generation kernel. The pseudo noise sequence used is required to share the process of embedding and detection as the key information. To detect the embedded secret payload from the stego signal, the time-spread echo method distinguishes the watermark bit payload from a correlation between the echo components in the cepstrum of the stego signal and the shared pseudo noise sequence. Increased the randomness of the pseudo noise sequence increases robustness against disturbances and increases security against a fake key sequence. Conventionally, therefore, pseudo noise that has a low correlation with the other in certain period length, e.g. M-sequence and Gold sequence, being used as key sequences. However, such pseudo noise is difficult to remember. In this paper, we use an audio signal as a watermarking key sequence instead of pseudo random noise sequences. The audio signal used as the watermarking key is available for two reasons. Firstly, what users have to remember is only which audio signal is used as the watermarking key. And secondly, the key is difficult for pirates to be noticed as the watermarking key. In section II, the conventional time-spread echo method is introduced. The proposed method for generating watermarking key by using an audio signal is described in section III. Then we evaluate the message detection property in the case of using the proposed watermarking key in sections IV and V. Section VI presents the resulting conclusion. II. TIME-SPREAD ECHO HIDING The diagram of the time-spread echo hiding is basically similar to the echo hiding[2]; adding echoes started at time delay τ w corresponded with a watermark bit, w i, to the segmented host signal x i (n). The echo adding kernel, k w (n), w {, 1}, is defined as following equation (1), and the watermarked stego signal segment y i (n) is produced by convolution of x i (n) with k w (n). k w (n) = δ(n) + βp(n τ w ) (1) In equation (1), δ(n) is Kronecker delta δ n,, β is the gain of echoes, and p(n) is the echo transfer function. τ w is the delay time where adding echoes started and it is corresponded with watermark bit w. In the case of conventional echo hiding, the p(n) is also Kronecker delta δ n,. In the case of the spreadecho hiding, the p(n) is made of random binary sequence (Pseudo noise sequence; PN sequence) and a convolution process with the p(n) works to spread single-echo to multiechoes. During the watermark detection process, it takes advantage of that the cepstrum of observed stego signal ŷ(n) repesents the echo kernel in lower qefrencies. Its crosscorrelation with p(n) has a peak at certain lag point. By comparing the lag point with the delay τ w, the corresponding watermark bit w is identified. III. PN-LIKE KEY GENERATION FROM AUDIBLE SIGNAL In spread-echo hiding, the process to cross correlate between the cepstrum of the stego signal ŷ(n) and spread-echoes p(n) is equivalent to despreading of the echo kernel. Therefore, p(n) is required have a low correlation with other sequences of certain lengthes and therefore M-sequence or Gold-sequence is often used as p(n). However, such pseudo noise is difficult to remember. In this paper, we use an audio signal as a watermarking key sequence instead of such pseudo random noise sequences.

Fig. 1. signal key audio signal segmentation in frame length L fr liftering and extracting LPN samples cepstrum calculating normalizing key sequence Blockdiagram for key generation procedure from secret key audio The watermarking key sequence we must generate is a key sequence of length L P N made from an audio signal s(n) of length L sig. In this paper, as the simplest case, we generate the key sequence by the cepstrum. A key sequence p(n) is made by averaging the cepstrum coefficients of L fr samples with a window shifting L shift samples on an audio signal s(n), extracting the L P N coefficients from the low quefrency range and making the standard deviation of them to one. The cepstrum (power cepstrum) c(τ) is defined by c(τ) = F 1 [log S ω ] (2) where S ω is the amplitude spectrum of the time-domain signal s(n) given by S ω = F[s(n)] (3) In Fig. 1, the blockdiagram for the proposed key generation procedure from key audio signal is shown. We compute totally N = L shift L sig L fr cepstra from an audio signal s(n) of length L sig with a frame length L fr and a shifting length L shift. Then our watermarking key sequence p(n) is generated by p(n) = Norm [ 1 N ] N c m (n q th ) m=1 where q th is cut-off delay and the function Norm[ ] makes standard deviation of the sequence to one. Figure 2 shows an example of the generated key sequence and the base music signal. A. embeddable bits IV. EVALUATION OF GENERATED KEY The generated key sequences are evaluated in terms of the embeddable bits. Both the audio signals utilized in generating the key sequence and the host signals are picked from SQAM[3] which is provided by EBU. Table I shows the audio file list for generating the key sequence and table II shows that for host signal. All of them are sampled in 44.1 khz, (4) music signal.15.1.5.5.1.15.2 5 1 15 time [s] generated key sequence 8 6 4 2 2 4 6 1 2 3 4 5 6 7 8 9 1 Fig. 2. Generated key sequence and the base music signal TABLE I KEY SIGNALS Track Genre 39 Grand Piano 48 Quartet 55 Trumpet 6 Piano 61 Soprano TABLE II HOST SIGNALS Track Genre 27 Castanets 32 Triangles 35 Glockenspiel 4 Harpsichord 65 Orchestra 66 Wind Orchestra 69 ABBA 7 Eddie Rabbit 16 bit-pcm stereo. The key audio signals are the 1 second s length from 5 seconds of each signals. To generate 123 key length sequence from 1 seconds (441 samples), we set a frame length L fr of 492 samples. The parameters of the watermarking process are summarized in Table III. As a result of the evaluation, Figure 3 shows the ratio of the successfully embedded bits against host signals for the tested key signals and a conventional PN sequence. From Fig. 3, all stego signals watermarked by five key signals are embedded in almost the same ratios compared with a case of watermarked by a conventional PN sequence. The results of some tested host signal show the low bit ratios of successfully embedded in both case of our keys and the conventional key, because the host signal have many silent frames or much pre-echoed frames. B. Detection by fake key signal In this subsection, we tried to detect the watermark by using fake key signals. The host signal is #4. After generating stego signals by using the true key signal, the watermark bits were detected by using fake key signals. In Fig. 4, bit error rates in case of using fake key signals are depicted. Counted amount

The ratio of successfully embedded [%] 1 9 8 7 6 5 4 3 2 1 TABLE III PARAMETER SETUPS FOR WATERMARKING Echo gain β.6 Length of PN sequence L P N 123 Delay of Echo τ 1 ms(44 points) 2 ms(88 points) Embedding Bit rate 5.38 bps #27 #32 #35 #4 #65 #66 #69 #7 Host signal s track No. Fig. 3. Bit ratios of successfully embedded #39 #48 #55 #6 #61 PN of bits are number of successfully embedded bits in previous subsection. Figure 4 shows that the cases using fake key signals results in higher than 5% BER. Then the proposed key sequence generated from a music signal is sufficiently secure compared with a conventional PN sequence. V. EVALUATION OF TIME-SPREAD ECHO METHOD USING AUDIBLE SECRET KEY To evaluate the detection robustness and the sound quality of the watermarked signal with the key generated from music signal, we carried out two experiments. In our experiments, eight host signals from a SQAM database (Track No. 27, 32, 35, 4, 65, 66, 69, and 7) were used. The all host signals had a 44.1 khz sampling rate, 16 bit quantization, and monaural. The key is generated by using the 1 seconds length of SQAM track No.6. The watermark embedding settings are the same as before and are shown in Table. III. Their evaluation criteria, attacking manipulations and host signal sources are based on Information Hiding Criteria version.3 [4]. Our proposed method is almost same watermarking technique with original time-spread echo watermarking[1] except for the introduction of the key sequence generated from music signal. Bit error rate [%] 1 9 8 7 6 5 4 3 2 1 #39 #48 #55 #6 #61 Key signal s Track No. Fig. 4. Bit error rates: Detection by fake keys A. Robustness against attacks #39 #48 #55 #6 #61 First test evaluates the robustness against signal manipulation attacks. Watermarked stego signals were manipulated by attacks listed in Table. IV. Their listed attacks are the recommended manipurations which the stego files should be tested about the robustness by Information Hiding Criteria Committee[4]. The results of the robustness tests are shown in Fig. 5. From the results in Fig. 5, while the BERs on detection for Track No.27 and 66 are high (about 2%), the BERs on almost other tracks are lower than 1 % against the attacks. The result shows that the watermarking method introducted our new music key sequence has the robustness against the typical manipulations. B. Objective evaluation of audio quality The second test evaluates the sound quality of the watermarked stego signals. In our experiment, we conducted objective tests using PEAQ (the perceptual evaluation of audio quality)[5]. The PEAQ measures the deterioration of the signal from another signal and scores the deterioration on a scale called ODG (objective difference grade), from -4 (Very annoying) to (Imperceptible) as shown in Table V. The scored ODG of the stego signals are shown in Table. VI. The results show that the stego signals are scored higher than -1.7 and the deterioration was perceptible, but not annoying. VI. CONCLUSION This paper presented the evaluation of the key generated from a secret music signal for the well-known time-spread echo based audio watermarking method. In this paper, the key sequence is generated by taking the lower quefrency range in averaged cepstrum of the secret music signal. From our experiment, the generated key sequence has almost as same detection performance as the conventional PN sequence. Furthermore, the stego signal watermarked with our key sequence is robust against many attacks and satisfies inaudibility.

TABLE IV ATTACK CONDITIONS FOR EVALUATION [4] attack conditions abbreviation at Fig 5 MP3 compression 128 kbps const. rates mp3o noise addition S/N = 36dB wgn bandpass filtering 1 Hz 6 khz, -12 db/oct. bapf pitch stretching w/o invariant duration (1) +4% tsmp pitch stretching w/o invariant duration (2) -4% tsmm time stretching (1) +1% spep time stretching (2) -1% spem echo addition 1 ms, -6 db echo two times MP3 compression 128kbps const. rates mp3t PSJH NQP XHO CBQG UTNQ UTNN TQFQ #JU&SSPS3BUFT<> TQFN FDIP NQU BWH )PTUTJHOBMT5SBDL/P Fig. 5. results of the robustness tests: Bit error rates of stego signals against manipulation attacks TABLE V ODG SCORES AND DESCRIPTION IN PEAQ ODG score description Imperceptible -1 Perceptible, but not annoying -2 Slightly annoying -3 Annoying -4 Very annoying As furture work, we aim to utilize a personal voice as the key. A method to generate the key from a voice securely and conviniently is required. REFERENCES [1] B.-S. Ko, R. Nishimura, and Y. Suzuki, Time-spread echo method for digital audio watermarking, IEEE Transactions on Multimedia, vol. 7, no. 2, pp. 212 221, 25. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic3/wrapper.htm?arnumber=147894 [2] D. Gruhl, A. Lu, and W. R. Bender, Echo hiding, in Information Hiding, 1996, pp. 293-315. [3] Europian Broadcasting Union (EBU). (28) Sound quality assessment material. [Online]. Available: http://tech.ebu.ch/publications/sqamcd TABLE VI SCORED ODGS FOR THE STEGO SIGNALS Stego signal s Track No Scored ODG No.27-1.56 No.32 -.86 No.35 -.97 No.4-1.2 No.65-1.74 No.66-1.71 No.69-1.58 No.7-1.51 Average -1.39 [4] Information Hiding Committee Audio Group, IHC Evaluation Criteria and Competition: Watermark Criteria for Audio (ver. 3), 214. [Online]. Available: http://www.ieice.org/iss/emm/ihc/ihc criteriaver3.pdf [5] International Telecommunication Union, ITU Recommendation: Method for Objective Measurements of Perceived Audio Quality (PEAQ), 21, no. ITU-R BS 1387-1.