Authentication of Audio Signals in Frequency Domain (AASF)

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 381)

Abstract

In this paper, an approach has been made to authenticate an audio song in a collection of a similar one. Generating a unique signature with the help of another short length audio signal that will not be directly embedded into the original song but its encoded lower magnitude values will embed into the original song as a prime identity. Encoding hidden audio into lower magnitude values followed by embedding lower magnitude values into specified locations of magnitude values of original song in a predefined way that is not affected by its audible quality carries a secret authenticating message for quickly identifying it from similar signals. A comparative study has been made with similar existing techniques and experimental results are supported with mathematical formula based on Microsoft WAVE (“.wav”) stereo sound file.

Keywords

Authentication Audio encoding Audible quality Authenticating message Frequency domain 

References

  1. 1.
    Mondal, U.Kr., Mandal, J.K.: A novel technique to protect piracy of quality songs through amplitude manipulation (PPAM). International Symposium on Electronic System Design (ISED 2010), ISBN 978-0-7695-4294-2, pp. 246–250 (2010)Google Scholar
  2. 2.
    Erten, G., Salam, F.: Voice output extraction by signal separation. ISCAS ’98, ISBN 07803-4455-3 3, 5–8 (1998)Google Scholar
  3. 3.
    Mondal, U.Kr., Mandal, J.K.: A practical approach of embedding secret key to authenticate Tagore songs (ESKATS). In: 2nd International Conference on Wireless Information Networks & Business information System (WINBIS 09), ISSN: 2091–0266, pp. 67–74 (2010)Google Scholar
  4. 4.
    Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, ISBN 978-1-58053-035-4(2000)Google Scholar
  5. 5.
    Xiaoxiao, D., Mark, F., Bocko, Z.I.: Data hiding via phase manipulation of audio signals. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. 377–380 (ICASSP 2004), ISBN 0-7803-8484-9 (2004)Google Scholar
  6. 6.
    Blackledge et al., J.M.: Multi-channel audio information hiding. Proceedings of the 15th International Conference on Digital Audio Effects (DAFx-12), York, Sept 17–21 2012Google Scholar
  7. 7.
    Arnold, M.: Audio watermarking: features, applications and algorithms, In: IEEE International Conference on Multimedia and Expo, New York, 2, 1013–1016 (2000)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Department of Computer ScienceVidyasagar UniversityMidnapurIndia
  2. 2.Department of CSEUniversity of KalyaniNadiaIndia

Personalised recommendations