Abstract
Authentication of song signal is one of the assessments to detect the originality in ease of alteration of its content. In this paper, DCT transform has been applied to song signal to extract a unique key for a particular song and which itself represents the characteristics of whole song signal. Comparing song signal with computed and extracted unique keyword unauthorized ownership can be verified. A comparative study has been made with similar existing techniques to compare its characteristics which show better performances. Computed characteristics are also supported through mathematical formula based on Microsoft WAVE (”.wav”) stereo sound file.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mondal, U.K., Mandal, J.K.: A Novel Technique to Protect Piracy of Quality Songs through Amplitude Manipulation (PPAM). In: International Symposium on Electronic System Design (ISED 2010), pp. 246–250 (2010)
Blackledge, J.M., et al.: Multi-Channel Audio Information Hiding. In: Proc. of the 15th Int. Conference on Digital Audio Effects (DAFx 2012), York, UK, September 17-21, pp. 1–8 (2012)
Erten, G., Salam, F.: Voice Output Extraction by Signal Separation. In: ISCAS 1998, vol. 3, pp. 5–8 (1998) ISBN 07803-4455-3
Dong, X., Bocko, M.F., Ignjatovic, Z.: Data Hiding Via Phase Manipulation of Audio Signals. In: Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2004), vol. 5, pp. 377–380 (2004) ISBN 0-7803-8484-9
Mondal, U.K., Mandal, J.K.: Song Authentication Technique Through Concealment of Secret Song (SATCon). Presented at IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011, June 3-5, pp. 145–150. MIT, Anna University, Chennai (2011)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding –A Survey. Proc. the IEEE 87(7), 1062–1078 (1999)
Anderson, R.J., Petitcolas, F.A.P.: On the Limits of Steganography. Proc. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998)
Doddington, G.R.: Speaker Recognition- Identifying People by their Voices. Proc. of the IEEE 73(11), 1651–1665 (1985)
Suzuki, H., Zen, H., Nunkuku, Y., Miyajima, C., Tokuda, K., Kitumuru, I.: Proc. Speech Recognition Using Voice- Characteristic Dependent Acoustic Models, ICASSP 2003, vol. 3, pp. 740–743 (2003)
Lin, K.S., Frantz, G.A.: Proc. Voice Characteristics Conversion, IEEE Transactions on Consumer Electronics CE-30(4), 598–603 (1984)
Arnold, M.: Audio watermarking: Features, applications and algorithms. In: IEEE International Conference on Multimedia and Expo (2000)
https://en.wikipedia.org/wiki/Discrete_cosine_transform#DCT-II (last accessed on July 30, 2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Mondal, U.K., Mandal, J.K. (2014). Unique Key Based Authentication of Song Signal through DCT Transform (UKASDT). In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II. Advances in Intelligent Systems and Computing, vol 249. Springer, Cham. https://doi.org/10.1007/978-3-319-03095-1_61
Download citation
DOI: https://doi.org/10.1007/978-3-319-03095-1_61
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03094-4
Online ISBN: 978-3-319-03095-1
eBook Packages: EngineeringEngineering (R0)