Abstract
Audio contents are frequently stocked up and transmitted in compressed formats. Among the many existing audio compression schemes, MPEG-1 Audio Layer III (MP3) is very popular and still widely spread. Therefore, this paper represents a tamper detection method for MP3 files based on watermarking operating directly in the compression domain using Huffman data and recompression calibration. This method is based on a set of side information features embedded in the MP3 audio file as a watermark and used later to decide if the frame is doubly compressed. The detection of doubly compressed frames or singly compressed frames makes the selection of tampered frames possible. We made experiments on a set of MP3 audio clips to evaluate our method. Experimental results validate the efficiency of our approach compared to other methods from the literature.
Similar content being viewed by others
Availability of data and codes
We developed our own dataset by obtaining Quranic and various categories of MP3 files from these sources and then preparing them for silence deletion before using them for digital audio watermarking. We’ve also used the MP3 decoder (https://www.mathworks.com/matlabcentral/fileexchange/27303-complete-implementation-of-a-mp3-decoder), and the GitHub code folder (https://github.com/SalmaMasmoudi/MP3tamperdetection.git).
Abbreviations
- BER:
-
Bit Error Rate
- CPU:
-
Process Time
- DAE:
-
Denoising Auto Encoder
- DCT:
-
Discret Cosine Transform
- DWT:
-
Discret Wavelet Transform
- HAS:
-
Human Auditory System
- HVS:
-
Human Visual System
- IFPI:
-
International Federation of Phonographic Industry
- LSF:
-
Line Spectral Frequencies
- LWT:
-
Lifting Wavelet Transform
- MD5:
-
Message Digest
- MDCT:
-
Modified Discret Cosine Transform
- MP3:
-
MPEG1 layer3
- MPEG:
-
Moving Picture Experts Group
- NC:
-
Normalized Cross-correlation
- ODG:
-
Objective Difference Grade
- OVSF:
-
Orthogonal Variable Spreading Factor
- PCM:
-
Pulse Code Modulation
- PEAQ:
-
Perceptual Evaluation of Audio Quality
- RDM:
-
Rational Dither Modulation
- RPCA:
-
Robust Principal Component Analysis
- SVD:
-
Singular Value Decomposition
- XOR:
-
eXclusive OR
References
Awasthi A, Nirmal ML. Multiple image watermarking approach based on anfis for copyright protection and image authentication: A review
Brandenburg K, Stoll G (1994) Iso/mpeg-1 audio: A generic standard for coding of high-quality digital audio. J Audio Eng Soc 42(10):780–792
Bailong Y, Penghui W, Yaque J, Jing M (2013) Lossless and Secure Watermarking Scheme in MP3 Audio by Modifying Redundant Bit in the Frames. In: The Proceedings of the IEEE 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), Vol. 1, Xi’an, China, pp. 154-157
Bianchi T, Rosa AD, Fontani M, Rocciolo G, Piva A (2014) Detection and localization of double compression in MP3 audio tracks. EURASIP J Inf Secur 1:1–14
Charfeddine M, Mezghani E, Masmoudi S, Amar CB, Alhumyani H (2022) Audio Watermarking for Security and Non-Security Applications. IEEE Access 10:12654–12677
Chaabane F, Charfeddine M, Amar CB (2013) A survey on digital tracing traitors schemes. In: 2013 9th International Conference on Information Assurance and Security (IAS) (pp. 85-90). IEEE
Chaabane F, Charfeddine M, Puech W, Amar CB (2015) A QR-code based audio watermarking technique for tracing traitors. In: 2015 23rd European Signal Processing Conference (EUSIPCO) (pp. 51-55). IEEE
Chaabane F, Charfeddine M, Amar CB (2014) A multimedia tracing traitors scheme using multi-level hierarchical structure for tardos fingerprint based audio watermarking. In: 2014 International Conference on Signal Processing and Multimedia Applications (SIGMAP) (pp. 289-296). IEEE
Charte D et al (2017) A practical tutorial on autoencoders for nonlinear feature fusion: Taxonomy, models, software and guidelines. Inf Fusion 44:78–96
Charfeddine M, El’arbi M, Amar CB (2014) A new DCT audio watermarking scheme based on preliminary MP3 study. Multimedia Tools Appl 70(3):1521–1557
Hu Y, Lu W, Ma M, Sun Q, Wei J (2022) A semi fragile watermarking algorithm based on compressed sensing applied for audio tampering detection and recovery. Multimedia Tools Appl 81(13):17729–17746
Hu H, Lee T (2019) Hybrid blind audio watermarking for proprietary protection, tamper proofing, and self-recovery. IEEE Access 7:180395–180408
Li J, Wang R, Yan D, Li Y (2014) A multipurpose audio aggregation watermarking based on multistage vector quantization. Multimedia Tools Appl 68(3):571–593
El’Arbi M, Charfeddine M, Masmoudi S, Koubaa M, Amar CB (2011) Video Watermarking algorithm with BCH error correcting codes hidden in audio channel. proceeding of the third IEEE Symposium Series in computational intelligence CICS. IEEE Symposium on Computational Intelligence in Cyber Security, Paris-France, pp 164–170
Mezghani E, Charfeddine M, Ben Amar C (2013) Audio Silence Deletion before and after MPEG video compression, Computer Applications Technology (ICCAT), 2013 International Conference on. IEEE
Mezghani E, Charfeddine M, Nicolas H, Amar CB (2016) Multifeature speech/music discrimination based on mid-term level statistics and supervised classifiers, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA 2016), Agadir, pp. 1-8. https://doi.org/10.1109/AICCSA.2016.7945728
Mezghani E., Charfeddine M., Amar C. B., Nicolas H (2015) Audiovisual video characterization using audio watermarking scheme. In: 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA) (pp. 213-218). IEEE
Masmoudi S, Charfeddine M, Amar CB (2011) A robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multi-resolution domain. In: Proceedings of the 10th IEEE international symposium on signal processing and information technology ISSPIT, Luxor-Egypt, pp 326-331
Masmoudi S, Charfeddine M, Amar CB (2020) A Semi-Fragile Digital Audio Watermarking Scheme for MP3-Encoded Signals Using Huffman Data. Circ Syst Signal Process 39:3019–3034. https://doi.org/10.1007/s00034-019-01299-4
International Union of Télécommunications (UIT) (2001) Recommendation UIT-R B.S. 1387, Method of Objective Measurement of Perceived Sound Quality
Narla VL, Gulivindala S, Chanamallu SR et al (2021) BCH encoded robust and blind audio watermarking with tamper detection using hash. Multimed Tools Appl 80:32925–32945. https://doi.org/10.1007/s11042-021-11370-5
Nair U, Birajdar GK (2020) Compressed domain secure, robust and high-capacity audio watermarking. Iran J Comput Sci 3:217–232. https://doi.org/10.1007/s42044-020-00059-x
Pan D (1995) A tutorial on MPEG/audio compression. IEEE multimedia 2(2):60–74
Prasad S, Pal AK, Paul S (2022) A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking. Wireless Pers Commun 125:2581–2619. https://doi.org/10.1007/s11277-022-09675-1
Renza D, Lemus C et al (2018) Authenticity verification of audio signals based on fragile watermarking for audio forensics. Expert Syst Appl 91:211–222
Subramanyam AV, Emmanuel S (2012) Audio Watermarking in Partially Compressed-encrypted Domain, 2012 IEEE International Conference on Systems, Man, and Cybernetics, Seoul, Korea, October 14-17
Servetti A, Testa C, De Martin JC (2003) Frequency-selective partial encryption of compressed audio, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings(ICASSP’03), 5:V–668
Steinebach M (2003) Dittmann J (2003) Watermarking based digital audio data authentication. EURASIP J Adv Signal Process 10:1–15
Sharma S, Zou JJ, Fang G (2022) A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities. IEEE Access 10:85677–85700
Tarhouni N, Masmoudi S, Charfeddine M, Amar CB (2023) Fake COVID-19 videos detector based on frames and audio watermarking. Multimedia Syst 29(1):361–375
Tarhouni N, Charfeddine M, Amar CB (2020) Novel and robust image watermarking for copyright protection and integrity control. Circuits, Systems, and Signal Processing 39:5059–5103
Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication 28(3):301–308
Wang Sh, Yuan W, Wang J, Unoki M (2019) Detection of speech tampering using sparse representations and spectral manipulations based information hiding. Speech Commun 112:1–14
Xiang Z, Bestagini P, Tubaro S, Delp EJ (2022) Forensic analysis and localization of multiply compressed mp3 audio using transformers. In: ICASSP 2022, 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 2929-2933. IEEE 2022
Yan D, Wang R, Zhou J, Jin C, Wang Z (2018) Compression history detection for mp3 audio. KSII Transactions on Internet and Information Systems (TIIS) 12(2):662–675
Zhaopin S, Lejie C, Guofu Z, Jianguo J, Feng Y (2017) Window switching strategy based semi-fragile watermarking for MP3 tamper detection. Multimedia Tools Appl 76(7):9363–9386
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest/Competing interests
The authors declare that they have no conflicts of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix A Watermarking Scheme’s Details
Appendix A Watermarking Scheme’s Details
This appendix contains supplementary figures that may be helpful in providing a more comprehensive understanding of the watermarking methodology and different choices of parameters.
Figure 12 argues the selection of Region2.. It shows the computed NC values for extracted marks and inserted ones hidden respectively in region0, region1 and region2.
Figure 13 displays the attitude of side information features after some content manipulation attacks. It shows the computed BER (Bit Error Rate) values for the feature under test (embedded as watermark) and the detected one after undergoing different content manipulation attacks.
Figure 14 resumes the comparison of the computed measure derived from the distance between the side information feature of the original signal (extracted watermark) and those measured from watermarked signal and the threshold.
Figure 15 displays the different steps to embed watermark in the MP3 input file after selecting the big value region (region2).
Figure 16 summarizes the step of recompression calibration.
Figure 17 shows how to extract the side information feature from the input file to construct the watermark.
Figure 18 summarizes step by step the synchronization process.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Masmoudi, S., Charfeddine, M. & Ben Amar, C. MP3 Audio watermarking using calibrated side information features for tamper detection and localization. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18202-2
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-18202-2