Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 249))

  • 2556 Accesses

Abstract

Authentication of song signal is one of the assessments to detect the originality in ease of alteration of its content. In this paper, DCT transform has been applied to song signal to extract a unique key for a particular song and which itself represents the characteristics of whole song signal. Comparing song signal with computed and extracted unique keyword unauthorized ownership can be verified. A comparative study has been made with similar existing techniques to compare its characteristics which show better performances. Computed characteristics are also supported through mathematical formula based on Microsoft WAVE (”.wav”) stereo sound file.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mondal, U.K., Mandal, J.K.: A Novel Technique to Protect Piracy of Quality Songs through Amplitude Manipulation (PPAM). In: International Symposium on Electronic System Design (ISED 2010), pp. 246–250 (2010)

    Google Scholar 

  2. Blackledge, J.M., et al.: Multi-Channel Audio Information Hiding. In: Proc. of the 15th Int. Conference on Digital Audio Effects (DAFx 2012), York, UK, September 17-21, pp. 1–8 (2012)

    Google Scholar 

  3. Erten, G., Salam, F.: Voice Output Extraction by Signal Separation. In: ISCAS 1998, vol. 3, pp. 5–8 (1998) ISBN 07803-4455-3

    Google Scholar 

  4. Dong, X., Bocko, M.F., Ignjatovic, Z.: Data Hiding Via Phase Manipulation of Audio Signals. In: Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2004), vol. 5, pp. 377–380 (2004) ISBN 0-7803-8484-9

    Google Scholar 

  5. Mondal, U.K., Mandal, J.K.: Song Authentication Technique Through Concealment of Secret Song (SATCon). Presented at IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011, June 3-5, pp. 145–150. MIT, Anna University, Chennai (2011)

    Google Scholar 

  6. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding –A Survey. Proc. the IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  7. Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. Proc. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998)

    Article  Google Scholar 

  8. Doddington, G.R.: Speaker Recognition- Identifying People by their Voices. Proc. of the IEEE 73(11), 1651–1665 (1985)

    Article  Google Scholar 

  9. Suzuki, H., Zen, H., Nunkuku, Y., Miyajima, C., Tokuda, K., Kitumuru, I.: Proc. Speech Recognition Using Voice- Characteristic Dependent Acoustic Models, ICASSP 2003, vol. 3, pp. 740–743 (2003)

    Google Scholar 

  10. Lin, K.S., Frantz, G.A.: Proc. Voice Characteristics Conversion, IEEE Transactions on Consumer Electronics CE-30(4), 598–603 (1984)

    Google Scholar 

  11. Arnold, M.: Audio watermarking: Features, applications and algorithms. In: IEEE International Conference on Multimedia and Expo (2000)

    Google Scholar 

  12. https://en.wikipedia.org/wiki/Discrete_cosine_transform#DCT-II (last accessed on July 30, 2013)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Uttam Kr. Mondal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Mondal, U.K., Mandal, J.K. (2014). Unique Key Based Authentication of Song Signal through DCT Transform (UKASDT). In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II. Advances in Intelligent Systems and Computing, vol 249. Springer, Cham. https://doi.org/10.1007/978-3-319-03095-1_61

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03095-1_61

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03094-4

  • Online ISBN: 978-3-319-03095-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics