16 research outputs found

    Spread Spectrum Based High Embedding Capacity Watermarking Method for Audio Signals

    Get PDF
    Audio watermarking is a promising technology for copyright protection of audio data. Built upon the concept of spread spectrum (SS), many SS-based audio watermarking methods have been developed, where a pseudonoise (PN) sequence is usually used to introduce security. A major drawback of the existing SS-based audio watermarking methods is their low embedding capacity. In this paper, we propose a new SS-based audio watermarking method which possesses much higher embedding capacity while ensuring satisfactory imperceptibility and robustness. The high embedding capacity is achieved through a set of mechanisms: embedding multiple watermark bits in one audio segment, reducing host signal interference on watermark extraction, and adaptively adjusting PN sequence amplitude in watermark embedding based on the property of audio segments. The effectiveness of the proposed audio watermarking method is demonstrated by simulation examples

    Histogram shape-based robust image watermarking method

    Full text link
    Developing a watermarking method that is robust to cropping attack and random bending attacks (RBAs) is a challenging task in image watermarking. In this paper, we propose a histogram-based image watermarking method to tackle with both cropping attack and RBAs. In this method first the gray levels are divided into groups. Secondly the groups for watermark embedding are selected according to the number of pixels in them, which makes this method fully based on the histogram shape of the original image and adaptive to different images. Then the watermark bits are embedded by modifying the histogram of the selected groups. Since histogram shape is insensitive to cropping and independent from pixel positions, the proposed method is robust to cropping attack and RBAs. Besides, it also has high robustness against other common attacks. Experimental results demonstrate the effectiveness of the proposed method. © 2014 IEEE

    A new interpolation error expansion based reversible watermarking algorithm considering the human visual system

    Full text link
    Reversible watermarking has merged over the past few years as a promising solution for copyright protection, especially for applications like remote sensing, medical imaging and military applications which require lossless recovery of the host media. In this paper, we aim to extend the additive interpolation error expansion technique in [16]. We will consider the human visual system (HVS) to improve the embedding rate while maintaining the image visual quality. To this end, the just noticeable difference (JND) is used to embed more watermark bits. The experimental results show that the proposed algorithm can improve the embedding rate while preserving the image visual quality. © 2014 IEEE

    Robustness enhancement of quantization based audio watermarking method using adaptive safe-band

    Full text link
    This paper presents a novel adaptive safe-band for quantization based audio watermarking methods, aiming to improve robustness. Considerable number of audio watermarking methods have been developed using quantization based techniques. These techniques are generally vulnerable to signal processing attacks. For these conventional quantization based techniques, robustness can be marginally improved by choosing larger step sizes at the cost of significant perceptual quality degradation. We first introduce fixed size safe-band between two quantization steps to improve robustness. This safe-band will act as a buffer to withstand certain types of attacks. Then we further improve the robustness by adaptively changing the size of the safe-band based on the audio signal feature used for watermarking. Compared with conventional quantization based method and the fixed size safe-band based method, the proposed adaptive safe-band based quantization method is more robust to attacks. The effectiveness of the proposed technique is demonstrated by simulation results. © 2014 IEEE

    Location privacy protection in smart health care system

    Full text link
    © 2014 IEEE. In a smart health system, patients' location information is periodically sent to hospitals and this information helps hospitals to provide improved health care services. The location information together with time stamp alone can reveal a patient's private information, such as person's life style, places frequently visited by the person, and personal interests. Thus, it is important to protect the location privacy of a patient. In the existing privacy protection mechanisms, trusted third party (TTP) and location perturbation techniques are used. However, in TTP-based mechanism, an adversary who illegally gets access to TTP server will have access to the private location information. On the other hand, in location perturbation technique, utility of the location information is significantly compromised. In this paper, we propose a location privacy protection mechanism in which location privacy is protected while maintaining the utility of the location data. In the proposed mechanism, a main processing unit attached to a patient's body generates the perturbed location by considering the distance between the patient's location and the preidentified patient's sensitive locations. This adaptive generation of perturbed location, removes the necessity to trust other parties while preserving the privacy and utility of the location data. The validity of the proposed mechanism is demonstrated by simulation results

    Spread Spectrum Audio Watermarking Using Multiple Orthogonal PN Sequences and Variable Embedding Strengths and Polarities

    Full text link
    Copyright protection of audio data is a serious problem and spread spectrum (SS) based audio watermarking is a promising technology to tackle this problem. Although a number of SS-based audio watermarking methods have been reported in the literature, they cannot achieve high robustness and embedding capacity at the same time. In this paper, we propose a novel SS-based audio watermarking method that can embed a large number of watermark bits into an audio signal without compromising the robustness against common attacks. Compared with the existing audio watermarking methods, the proposed one is especially robust against severe noise addition and compression attacks, while achieving high embedding capacity. Moreover, the new audio watermarking method is computationally efficient. The validity of the proposed SS-based audio watermarking method is demonstrated by simulation results

    Patchwork-based audio watermarking method robust to de-synchronization attacks

    Full text link
    This paper presents a patchwork-based audio watermarking method to resist de-synchronization attacks such as pitch-scaling, time-scaling, and jitter attacks. At the embedding stage, the watermarks are embedded into the host audio signal in the discrete cosine transform (DCT) domain. Then, a set of synchronization bits are implanted into the watermarked signal in the logarithmic DCT (LDCT) domain. At the decoding stage, we analyze the received audio signal in the LDCT domain to find the scaling factor imposed by an attack. Then, we modify the received signal to remove the scaling effect, together with the embedded synchronization bits. After that, watermarks are extracted from the modified signal. Simulation results show that at the embedding rate of 10 bps, the proposed method achieves 98.9% detection rate on average under the considered de-synchronization attacks. At the embedding rate of 16 bps, it can still obtain 94.7% detection rate on average. So, the proposed method is much more robust to de-synchronization attacks than other patchwork watermarking methods. Compared with the audio watermarking methods designed for tackling de-synchronization attacks, our method has much higher embedding capacity

    Non-Linear-Echo Based Anti-Collusion Mechanism for Audio Signals

    Full text link
    Collusion attacks are considered to be challenging attacks in audio copyright protection. The traditional watermarking algorithms cannot identify the traitors when other attacks, such as desynchronization attacks, are applied with a collusion attack. Instead of tracing the traitors, in this paper we aim to tackle collusion attacks by removing the commercial value from the colluded copy, which will demotivate the attackers from launching collusion attacks. Since the commercial value of an audio signal is directly reflected by its perceptual quality, we propose a novel non-linear-echo generation (NLEG) based algorithm to significantly degrade the perceptual quality of the colluded copy by embedding a time delay sequence into the host signal. The proposed NLEG is also designed to be resilient to common signal processing attacks and desynchronization attacks. Furthermore, the proposed NLEG can be combined with other digital watermarking techniques to enhance its performance on protecting the copyright information. Experimental results show the validity of the proposed NLEG
    corecore