CFP last date
20 December 2024
Reseach Article

Survey on Different Level of Audio Watermarking Techniques

by Shweta Sharma, Jitendra Rajpurohit, Sunil Dhankar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 10
Year of Publication: 2012
Authors: Shweta Sharma, Jitendra Rajpurohit, Sunil Dhankar
10.5120/7666-0783

Shweta Sharma, Jitendra Rajpurohit, Sunil Dhankar . Survey on Different Level of Audio Watermarking Techniques. International Journal of Computer Applications. 49, 10 ( July 2012), 41-48. DOI=10.5120/7666-0783

@article{ 10.5120/7666-0783,
author = { Shweta Sharma, Jitendra Rajpurohit, Sunil Dhankar },
title = { Survey on Different Level of Audio Watermarking Techniques },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 10 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 41-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number10/7666-0783/ },
doi = { 10.5120/7666-0783 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:45:57.733674+05:30
%A Shweta Sharma
%A Jitendra Rajpurohit
%A Sunil Dhankar
%T Survey on Different Level of Audio Watermarking Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 10
%P 41-48
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Audio Watermarking is useful technique for audio systems. This technique can work on different domains like frequency and time. By using the different scheme of watermarking at different levels of audio, it can be secure from many types of attacks. This paper shows some techniques which can be used to secure the audio system from attacks and survey on various transformation techniques for embedding or extracting watermark.

References
  1. Hong, Z. , Wu M. , Wang, Z. & Liu, K. 2003, Non linear collusion attacks on independent fingerprints for multimedia. In: Proc. IEEE Computer Society Conference on Multimedia and Expo, Baltimore, MD, p 613–616.
  2. Goresky, M. , Klapper, A. M. , Fibonacci and Galois 2002, Representations of Feedback-With-Carry Shift Registers, IEEE Transaction on Information Theory, Vol. 48, No. 11, pp. 2826-2836.
  3. Shoemaker, C. 2002, Hidden bits: A survey of techniques for digital watermarking, Independent study, EER 290, spring.
  4. Bloom, J. , Cox, I. , Kalker, T. , Linnartz, J. , Miller, M. , and Traw, C. 1999, Copy protection for DVD video, Proceedings of the IEEE, vo. 7, Issue 87, pp. 1267- 1276.
  5. Zwicker, E. , and Fast, H. , Psychoacoustics 1999. Springer Verlag, Berlin, Germany.
  6. Hernandez, J. , Rodriguez, J. & Perez-Gonzalez, F. 2001 Improving the performance of spatial watermarking of images using channel coding. Signal Processing 80(7): p 1261–1279.
  7. Polikar, R. , Home page - Dr. RobiPolikar, Jan 2001. [Online]. Available: http://users. rowan. edu/~polikar /WAVELETS/WTtutorial. html. Accessed: July 21, 2010.
  8. Kennedy, J. , IFPI Digital Music Report 2010. [Online]. Available: http://www. ifpi. org/content/library/DMR2010. pdf. Accessed: Aug 8, 2010.
  9. Khayam, S. A. 2003, The Discrete Cosine Transform (DCT): Theory and Application, Information Theory and Coding, Seminar 1 – The Discrete Cosine Transform: Theory and Application, March 10.
  10. Salomonsen, K. 1997, Design and Implementation of an MPEG/Audio Layer III Bit stream Processor, Master´s thesis, Aalborg University, Denmark.
  11. Voyatzis, G. and Pitas, I. 1996, Applications of toral automorphisms in image watermarking, Proceedings of International Conference on Image Processing, vol. 1, pp. 237– 240.
  12. SDMI 2000. Call for Proposals for Phase II Screening Technology Version 1. 0, [Online]. Available: http://www. sdmi. org/download/FRWG00033102-AMD1. htm [Accessed July 15. 2010].
  13. Steinebach, M. , Petitcolas, F. , Raynal, F. , Dittmann, J. , Fontaine, C. , Seibel, S. , et al. , Stirmark benchmark: Audio watermarking attacks, Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 49-54, 2001, Las Vegas, Nevada.
  14. Wang, X. and Zhao, H. 2005, A Blind Audio Watermarking Robust Against Synchronization Attacks, CIS 2005, Part II, LNAI 3802, pp. 617-622.
  15. Katzenbeisser, S. and Petitcolas, F. A. P. 2000, Information hiding techniques for steganography and digital watermarking, Artech House Publishers.
  16. Arnold, M. , Schmucker, M. and Wolthusen, S. D. 2003, Techniques and Applications of Digital Watermarking and Content Protection. Boston, London: Artech House, INC.
  17. Kumar, M. N. 2004, Watermarking Using Decimal Sequences, M. S. thesis, Louisiana State University, Baton Rouge, LA, USA.
  18. Cvejic, N. & Seppanen, T. 2003, Robust audio watermarking in wavelet domain using frequency hopping and modified patchwork method. In: Proc. International Symposium on Image and Signal Processing and Analysis, Rome, Italy, p 251–255.
  19. Petitcolas, F. 2000, Watermarking schemes evaluation, IEEE Signal Processing Magazine 17(5): p 58–64.
  20. Steinebach, M. , Petitcolas, F. , Raynal, F. , Dittmann, J. , Fontaine, C. , Seibel, S. , Fates, N. & Ferri, L. 2001 Stirmark benchmark: Audio watermarking attacks, In: Proc. International Conference on Information Technology: Coding and Computing, Las Vegas, NV, p 49–54.
  21. Voloshynovski, S. , Pereira, S. , Iquise, V. & Pun, T. 2001, Attack modelling: towards a secondgeneration watermarking benchmark, Signal Processing 81(6): p 1177–1214.
  22. Miller, M, Dorr, G. & Cox, I. 2002, Dirty-paper trellis codes for watermarking, In: Proc. IEEE International Conference on Image Processing, Rochester, NY, p 129–132.
  23. Petitcolas, F. A. P. 2000, Watermarking schemes evaluation, IEEE Signal Processing Magazine [Online], Volume 17, Issue 5, pp. 58-64.
Index Terms

Computer Science
Information Sciences

Keywords

Discrete Cosine Transformation(DCT) Inverse Discrete Cosine Transformation(IDCT) Chaos Geometric invariants