Skip to main content
Log in

A Semi-Fragile Digital Audio Watermarking Scheme for MP3-Encoded Signals Using Huffman Data

  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

Dynamic development in the field of information technologies, storage and sharing a large amount of data via Internet, raises the following question: How to ensure and protect a multimedia document against illegal distribution, reproduction and copying? One of the proposed solutions is digital watermarking which is an approach that embeds imperceptible information into digital data. Although most of the known algorithms operate in the uncompressed or linear domain, few are able to embed watermarks in the compressed domain. This paper describes an audio watermarking scheme that operates directly in the compressed domain. It inserts watermark in MP3 bit streams. Our scheme uses Huffman data mainly big values region and recompression calibration to hide secret information. Furthermore, it allows blind retrieval of an embedded watermark which does not need the original audio. Experimental results prove the imperceptibility of the proposed method and the robustness against several attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. K. Aniruddha, A. Gnanasekaran, A blind audio watermarking scheme employing DCT-HT-SD technique. Circuits Syst. Signal Process. 38(8), 3697–3714 (2018)

    Google Scholar 

  2. T. Bouchrika, M. Zaied, O. Jemai, C. Ben Amar, Ordering computers by hand gestures recognition based on wavelet networks, in Proceedings of the 2nd International Conference on Communications Computing and Control Applications, Marseilles, France (2012). pp. 1–6. https://doi.org/10. 1109/CCCA

  3. H. Boughrara, M. Chtourou, C. Ben Amar, MLP neural network based face recognition system using constructive training algorithm, in Proceedings of the 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, Tangier, Morocco (2012), pp. 233–238

  4. M. Charfeddine, M. El’Arbi, C. Ben Amar, A new DCT audio watermarking scheme based on preliminary MP3 study. Multimed. Tools Appl. 70(3), 1521–1557 (2012)

    Article  Google Scholar 

  5. F. Chaabane, M. Charfeddine, C. Ben Amar, A multimedia tracing traitors scheme using multi-level hierarchical structure for tardos fingerprint based audio watermarking, in Proceedings of the 2014 IEEE International Conference on Signal Processing and Multimedia Applications (SIGMAP), Vienna, Austria (2014), pp. 289–296

  6. F. Chaabane, M. Charfeddine, C. Ben Amar, A survey on digital tracing traitors schemes, in Proceedings of the IEEE 9th International Conference on Information Assurance and Security (IAS), Gammarth, Tunisia (2013), pp. 85–90

  7. N. Cvejic, T. Seppänen, Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks (Information Science Reference, Hershey, 2008)

    Book  Google Scholar 

  8. M. El’Arbi, M. Charfeddine, S. Masmoudi, M. Koubaa, C. Ben Amar, Video watermarking algorithm with BCH error correcting codes hidden in audio channel, in Proceedings of the, IEEE Symposium Series in Computational Intelligence. Paris (2011), pp. 164–17

  9. M. El’Arbi, C. Ben Amar, H. Nicolas, Video watermarking based on neural networks, in Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, Toronto, Canada (2006), pp. 1577–1580

  10. M. Guedri, M. Zaied, C. Ben Amar, Indexing and images retrieval by content, in Proceedings of the 2011 International Conference on High Performance Computing and Simulation, HPCS 2011, Istanbul, Turkey (2011), pp. 369–375

  11. International Organization for Standardization/International Electrotechnical Commission, Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit/s, ISO/IEC 11172 (1993)

  12. M. Koubaa, M. El’Arbi, C. Ben Amar, H. Nicolas, H. Collusion, MPEG4 compression and frame dropping resistant video watermarking. Multimed. Tools Appl. 56(2), 281–301 (2012)

    Article  Google Scholar 

  13. A. Lang, et al., Audio watermark attacks: from single to profile attacks, in Proceedings of the 7th Workshop on Multimedia and Security (ACM), New York, NY, USA (2005), pp. 39–50

  14. E. Mezghani, M. Charfeddine, C. Ben Amar, Audio silence deletion before and after MPEG video compression, in Proceedings of the 2013 IEEE International Conference on Computer Applications Technology (ICCAT), Sousse, Tunisia (2013), pp. 1–5

  15. M. Mejdoub, L. Fonteles, C. Ben Amar, M. Antonini, Fast indexing method for image retrieval using tree-structured lattices, in Proceedings of the 2008 International Workshop on Content-Based Multimedia Indexing, CBMI 2008, London, UK (2008), pp. 365–372

  16. S. Masmoudi, M. Charfeddine, C. Ben Amar, Robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multiresolution domain, in Proceedings of the, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). Luxor, Egypt (2010), pp. 326–331

  17. M. Othmani, W. Bellil, C. Ben Amar, A.M. Alimi, A new structure and training procedure for multi-mother wavelet networks. Int. J. Wavelets Multiresolut. Inf. Process. 8(1), 149–175 (2010)

    Article  MathSciNet  Google Scholar 

  18. R. Raissi, The theory behind MP3. MP3’Tech (2002)

  19. A.V. Subramanyam, S. Emmanuel, Audio watermarking in partially compressed-encrypted domain, in Proceedings of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, South Korea (2012), pp. 2867–2872

  20. I. Teyeb, O. Jemai M. Zaied, C. Ben Amar, A novel approach for drowsy driver detection using head posture estimation and eyes recognition system based on wavelet network, in Proceedings of the 5th International Conference on Information, Intelligence, Systems and Applications, Chania, Greece (2014), pp. 379–384

  21. Union Internationale des Télécommunications (UIT) . Recommandation B.S. 1387 . Méthode de mesure objective de la qualité du son perçu (2001)

  22. A. Wali, N. Ben Aoun, H. Karray, C. Ben Amar, A.M. Alimi, A New System for Event Detection from Video Surveillance Sequences, Lecture Notes in Computer Science, 6475 LNCS (PART 2) (Springer, Berlin, 2010), pp. 110–120

    Google Scholar 

  23. B. Yang, et al., Lossless and secure watermarking scheme in MP3 audio by modifying redundant bit in the frames, in The Proceedings of the IEEE 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), Vol. 1, Xi’an, China (2013), pp. 154–157

  24. S. Zhaopin et al., Window switching strategy based semi-fragile watermarking for MP3 tamper detection. Multimed. Tools Appl. 76(7), 9363–9386 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank Professor Mohamed Adel ALIMI from REGIM (REsearch Group on Intelligent Machines) laboratory for his advice and the fruitful discussions elaborated with him. The research leading to these results received funding from the Ministry of Higher Education and Scientific Research of Tunisia under the grant agreement number LR11ES48.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salma Masmoudi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Masmoudi, S., Charfeddine, M. & Ben Amar, C. A Semi-Fragile Digital Audio Watermarking Scheme for MP3-Encoded Signals Using Huffman Data. Circuits Syst Signal Process 39, 3019–3034 (2020). https://doi.org/10.1007/s00034-019-01299-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-019-01299-4

Keywords

Navigation