Skip to main content
Log in

MP3 Audio watermarking using calibrated side information features for tamper detection and localization

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Audio contents are frequently stocked up and transmitted in compressed formats. Among the many existing audio compression schemes, MPEG-1 Audio Layer III (MP3) is very popular and still widely spread. Therefore, this paper represents a tamper detection method for MP3 files based on watermarking operating directly in the compression domain using Huffman data and recompression calibration. This method is based on a set of side information features embedded in the MP3 audio file as a watermark and used later to decide if the frame is doubly compressed. The detection of doubly compressed frames or singly compressed frames makes the selection of tampered frames possible. We made experiments on a set of MP3 audio clips to evaluate our method. Experimental results validate the efficiency of our approach compared to other methods from the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Fig. 5
Algorithm 2
Algorithm 3
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Availability of data and codes

We developed our own dataset by obtaining Quranic and various categories of MP3 files from these sources and then preparing them for silence deletion before using them for digital audio watermarking. We’ve also used the MP3 decoder (https://www.mathworks.com/matlabcentral/fileexchange/27303-complete-implementation-of-a-mp3-decoder), and the GitHub code folder (https://github.com/SalmaMasmoudi/MP3tamperdetection.git).

Abbreviations

BER:

Bit Error Rate

CPU:

Process Time

DAE:

Denoising Auto Encoder

DCT:

Discret Cosine Transform

DWT:

Discret Wavelet Transform

HAS:

Human Auditory System

HVS:

Human Visual System

IFPI:

International Federation of Phonographic Industry

LSF:

Line Spectral Frequencies

LWT:

Lifting Wavelet Transform

MD5:

Message Digest

MDCT:

Modified Discret Cosine Transform

MP3:

MPEG1 layer3

MPEG:

Moving Picture Experts Group

NC:

Normalized Cross-correlation

ODG:

Objective Difference Grade

OVSF:

Orthogonal Variable Spreading Factor

PCM:

Pulse Code Modulation

PEAQ:

Perceptual Evaluation of Audio Quality

RDM:

Rational Dither Modulation

RPCA:

Robust Principal Component Analysis

SVD:

Singular Value Decomposition

XOR:

eXclusive OR

References

  1. Awasthi A, Nirmal ML. Multiple image watermarking approach based on anfis for copyright protection and image authentication: A review

  2. Brandenburg K, Stoll G (1994) Iso/mpeg-1 audio: A generic standard for coding of high-quality digital audio. J Audio Eng Soc 42(10):780–792

    Google Scholar 

  3. Bailong Y, Penghui W, Yaque J, Jing M (2013) Lossless and Secure Watermarking Scheme in MP3 Audio by Modifying Redundant Bit in the Frames. In: The Proceedings of the IEEE 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), Vol. 1, Xi’an, China, pp. 154-157

  4. Bianchi T, Rosa AD, Fontani M, Rocciolo G, Piva A (2014) Detection and localization of double compression in MP3 audio tracks. EURASIP J Inf Secur 1:1–14

    Google Scholar 

  5. Charfeddine M, Mezghani E, Masmoudi S, Amar CB, Alhumyani H (2022) Audio Watermarking for Security and Non-Security Applications. IEEE Access 10:12654–12677

    Article  Google Scholar 

  6. Chaabane F, Charfeddine M, Amar CB (2013) A survey on digital tracing traitors schemes. In: 2013 9th International Conference on Information Assurance and Security (IAS) (pp. 85-90). IEEE

  7. Chaabane F, Charfeddine M, Puech W, Amar CB (2015) A QR-code based audio watermarking technique for tracing traitors. In: 2015 23rd European Signal Processing Conference (EUSIPCO) (pp. 51-55). IEEE

  8. Chaabane F, Charfeddine M, Amar CB (2014) A multimedia tracing traitors scheme using multi-level hierarchical structure for tardos fingerprint based audio watermarking. In: 2014 International Conference on Signal Processing and Multimedia Applications (SIGMAP) (pp. 289-296). IEEE

  9. Charte D et al (2017) A practical tutorial on autoencoders for nonlinear feature fusion: Taxonomy, models, software and guidelines. Inf Fusion 44:78–96

    Article  Google Scholar 

  10. Charfeddine M, El’arbi M, Amar CB (2014) A new DCT audio watermarking scheme based on preliminary MP3 study. Multimedia Tools Appl 70(3):1521–1557

    Article  Google Scholar 

  11. Hu Y, Lu W, Ma M, Sun Q, Wei J (2022) A semi fragile watermarking algorithm based on compressed sensing applied for audio tampering detection and recovery. Multimedia Tools Appl 81(13):17729–17746

    Article  Google Scholar 

  12. Hu H, Lee T (2019) Hybrid blind audio watermarking for proprietary protection, tamper proofing, and self-recovery. IEEE Access 7:180395–180408

    Article  Google Scholar 

  13. Li J, Wang R, Yan D, Li Y (2014) A multipurpose audio aggregation watermarking based on multistage vector quantization. Multimedia Tools Appl 68(3):571–593

    Article  Google Scholar 

  14. El’Arbi M, Charfeddine M, Masmoudi S, Koubaa M, Amar CB (2011) Video Watermarking algorithm with BCH error correcting codes hidden in audio channel. proceeding of the third IEEE Symposium Series in computational intelligence CICS. IEEE Symposium on Computational Intelligence in Cyber Security, Paris-France, pp 164–170

    Google Scholar 

  15. Mezghani E, Charfeddine M, Ben Amar C (2013) Audio Silence Deletion before and after MPEG video compression, Computer Applications Technology (ICCAT), 2013 International Conference on. IEEE

  16. Mezghani E, Charfeddine M, Nicolas H, Amar CB (2016) Multifeature speech/music discrimination based on mid-term level statistics and supervised classifiers, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA 2016), Agadir, pp. 1-8. https://doi.org/10.1109/AICCSA.2016.7945728

  17. Mezghani E., Charfeddine M., Amar C. B., Nicolas H (2015) Audiovisual video characterization using audio watermarking scheme. In: 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA) (pp. 213-218). IEEE

  18. Masmoudi S, Charfeddine M, Amar CB (2011) A robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multi-resolution domain. In: Proceedings of the 10th IEEE international symposium on signal processing and information technology ISSPIT, Luxor-Egypt, pp 326-331

  19. Masmoudi S, Charfeddine M, Amar CB (2020) A Semi-Fragile Digital Audio Watermarking Scheme for MP3-Encoded Signals Using Huffman Data. Circ Syst Signal Process 39:3019–3034. https://doi.org/10.1007/s00034-019-01299-4

    Article  Google Scholar 

  20. International Union of Télécommunications (UIT) (2001) Recommendation UIT-R B.S. 1387, Method of Objective Measurement of Perceived Sound Quality

  21. Narla VL, Gulivindala S, Chanamallu SR et al (2021) BCH encoded robust and blind audio watermarking with tamper detection using hash. Multimed Tools Appl 80:32925–32945. https://doi.org/10.1007/s11042-021-11370-5

    Article  Google Scholar 

  22. Nair U, Birajdar GK (2020) Compressed domain secure, robust and high-capacity audio watermarking. Iran J Comput Sci 3:217–232. https://doi.org/10.1007/s42044-020-00059-x

    Article  Google Scholar 

  23. Pan D (1995) A tutorial on MPEG/audio compression. IEEE multimedia 2(2):60–74

    Article  Google Scholar 

  24. Prasad S, Pal AK, Paul S (2022) A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking. Wireless Pers Commun 125:2581–2619. https://doi.org/10.1007/s11277-022-09675-1

    Article  Google Scholar 

  25. Renza D, Lemus C et al (2018) Authenticity verification of audio signals based on fragile watermarking for audio forensics. Expert Syst Appl 91:211–222

    Article  Google Scholar 

  26. Subramanyam AV, Emmanuel S (2012) Audio Watermarking in Partially Compressed-encrypted Domain, 2012 IEEE International Conference on Systems, Man, and Cybernetics, Seoul, Korea, October 14-17

  27. Servetti A, Testa C, De Martin JC (2003) Frequency-selective partial encryption of compressed audio, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings(ICASSP’03), 5:V–668

  28. Steinebach M (2003) Dittmann J (2003) Watermarking based digital audio data authentication. EURASIP J Adv Signal Process 10:1–15

    Google Scholar 

  29. Sharma S, Zou JJ, Fang G (2022) A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities. IEEE Access 10:85677–85700

    Article  Google Scholar 

  30. Tarhouni N, Masmoudi S, Charfeddine M, Amar CB (2023) Fake COVID-19 videos detector based on frames and audio watermarking. Multimedia Syst 29(1):361–375

    Article  Google Scholar 

  31. Tarhouni N, Charfeddine M, Amar CB (2020) Novel and robust image watermarking for copyright protection and integrity control. Circuits, Systems, and Signal Processing 39:5059–5103

    Article  Google Scholar 

  32. Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication 28(3):301–308

    Google Scholar 

  33. Wang Sh, Yuan W, Wang J, Unoki M (2019) Detection of speech tampering using sparse representations and spectral manipulations based information hiding. Speech Commun 112:1–14

    Article  Google Scholar 

  34. Xiang Z, Bestagini P, Tubaro S, Delp EJ (2022) Forensic analysis and localization of multiply compressed mp3 audio using transformers. In: ICASSP 2022, 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 2929-2933. IEEE 2022

  35. Yan D, Wang R, Zhou J, Jin C, Wang Z (2018) Compression history detection for mp3 audio. KSII Transactions on Internet and Information Systems (TIIS) 12(2):662–675

    Google Scholar 

  36. Zhaopin S, Lejie C, Guofu Z, Jianguo J, Feng Y (2017) Window switching strategy based semi-fragile watermarking for MP3 tamper detection. Multimedia Tools Appl 76(7):9363–9386

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salma Masmoudi.

Ethics declarations

Conflict of interest/Competing interests

The authors declare that they have no conflicts of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix A Watermarking Scheme’s Details

Appendix A Watermarking Scheme’s Details

This appendix contains supplementary figures that may be helpful in providing a more comprehensive understanding of the watermarking methodology and different choices of parameters.

Fig. 12
figure 12

NC values after embedding watermark in different region of big value part

Figure 12 argues the selection of Region2.. It shows the computed NC values for extracted marks and inserted ones hidden respectively in region0, region1 and region2.

Fig. 13
figure 13

Attitude of selected Side Information Features after content manipulation attacks

Figure 13 displays the attitude of side information features after some content manipulation attacks. It shows the computed BER (Bit Error Rate) values for the feature under test (embedded as watermark) and the detected one after undergoing different content manipulation attacks.

Fig. 14
figure 14

Features values of a doubly compressed and tampered file

Figure 14 resumes the comparison of the computed measure derived from the distance between the side information feature of the original signal (extracted watermark) and those measured from watermarked signal and the threshold.

Figure 15 displays the different steps to embed watermark in the MP3 input file after selecting the big value region (region2).

Fig. 15
figure 15

Watermark embedding (Bloc A)

Fig. 16
figure 16

Recompression calibration (Bloc C)

Figure 16 summarizes the step of recompression calibration.

Fig. 17
figure 17

Feature extraction (Bloc B)

Figure 17 shows how to extract the side information feature from the input file to construct the watermark.

Fig. 18
figure 18

General scheme of synchronization step

Figure 18 summarizes step by step the synchronization process.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Masmoudi, S., Charfeddine, M. & Ben Amar, C. MP3 Audio watermarking using calibrated side information features for tamper detection and localization. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18202-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11042-024-18202-2

Keywords

Navigation