Advertisement

Audio Watermarking

  • Mohammad Ali Nematollahi
  • Chalee Vorakulpipat
  • Hamurabi Gamboa Rosales
Chapter
Part of the Springer Topics in Signal Processing book series (STSP, volume 11)

Abstract

Audio watermarking is a well-known technique of hiding data through audio signals. It is also known as audio steganography and has received a wide consideration in the last few years. So far, several techniques for audio watermarking have been discussed in the literature by considering different applications and development positions.

Keywords

Discrete Wavelet Transform Audio Signal Hide Data Phase Code Silence Interval 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Bender, W., et al. 1996. Techniques for data hiding. IBM Systems Journal. 35(3.4): 313–336.Google Scholar
  2. 2.
    Arnold, M. 2000. Audio watermarking: features, applications, and algorithms. In IEEE International Conference on Multimedia and Expo (II). Citeseer.Google Scholar
  3. 3.
    Yeo, I.-K., and H.J. Kim. 2003. Modified patchwork algorithm: A novel audio watermarking scheme. IEEE Transactions on Speech and Audio Processing 11(4): 381–386.CrossRefGoogle Scholar
  4. 4.
    Cox, I.J., et al. 1997. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6(12): 1673–1687.CrossRefGoogle Scholar
  5. 5.
    Xu, C., et al. 1999. Applications of digital watermarking technology in audio signals. Journal of the Audio Engineering Society 47(10): 805–812.Google Scholar
  6. 6.
    Oh, H.O., et al. 2001. New echo embedding technique for robust and imperceptible audio watermarking. In 2001 IEEE international conference on acoustics, speech, and signal processing, 2001. Proceedings. (ICASSP’01). IEEE.Google Scholar
  7. 7.
    Kim, H.J., and Y.H. Choi. 2003. A novel echo-hiding scheme with backward and forward kernels. IEEE Transactions on Circuits and Systems for Video Technology 13(8): 885–889.CrossRefGoogle Scholar
  8. 8.
    Ko, B.-S., R. Nishimura, and Y. Suzuki. 2005. Time-spread echo method for digital audio watermarking. IEEE Transactions on Multimedia 7(2): 212–221.CrossRefGoogle Scholar
  9. 9.
    Chowdhury, R., et al. 2016. A view on LSB based audio steganography. Google Scholar
  10. 10.
    Gopalan, K. 2003. Audio steganography using bit modification. In ICME’03. Proceedings. 2003 International Conference on Multimedia and expo, 2003. IEEE.Google Scholar
  11. 11.
    Cvejic, N., and T. Seppanen. 2002. Increasing the capacity of LSB-based audio steganography. In 2002 IEEE workshop on multimedia signal processing. IEEE.Google Scholar
  12. 12.
    Ahmed, M.A., et al. 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. Journal of Applied Sciences 10(1): 59–64.CrossRefGoogle Scholar
  13. 13.
    Cvejic, N., and T. Seppanen. 2004. Reduced distortion bit-modification for LSB audio steganography. In 2004 7th international conference on signal processing, 2004. Proceedings. ICSP’04. IEEE.Google Scholar
  14. 14.
    Gruhl, D., A. Lu, and W. Bender. 1996. Echo hiding. In Information Hiding. Springer.Google Scholar
  15. 15.
    Erfani, Y., and S. Siahpoush. 2009. Robust audio watermarking using improved TS echo hiding. Digital Signal Processing 19(5): 809–814.CrossRefGoogle Scholar
  16. 16.
    Shirali-Shahreza, S., and M. Shirali-Shahreza. 2008. Steganography in silence intervals of speech. In International conference on intelligent information hiding and multimedia signal processing. IEEE.Google Scholar
  17. 17.
    Shirali-Shahreza, M.H., and S. Shirali-Shahreza. 2010. Real-time and MPEG-1 layer III compression resistant steganography in speech. Information Security, IET 4(1): 1–7.CrossRefGoogle Scholar
  18. 18.
    Kang, G.S., T.M. Moran, and D.A. Heide. 2005. Hiding information under speech. DTIC Document.Google Scholar
  19. 19.
    Li, R., S. Xu, and H. Yang. 2016. Spread spectrum audio watermarking based on perceptual characteristic aware extraction. IET Signal Processing.Google Scholar
  20. 20.
    Kirovski, D., and H.S. Malvar. 2003. Spread-spectrum watermarking of audio signals. IEEE Transactions on Signal Processing 51(4): 1020–1033.MathSciNetCrossRefGoogle Scholar
  21. 21.
    Matsuoka, H. 2006. Spread spectrum audio steganography using sub-band phase shifting. In International conference on intelligent information hiding and multimedia signal processing, 2006. IIH-MSP’06. IEEE.Google Scholar
  22. 22.
    Li, X., and H.H. Yu. 2000. Transparent and robust audio data hiding in subband domain. In International conference on information technology: coding and computing, 2000. Proceedings. IEEE.Google Scholar
  23. 23.
    Cvejic, N., and T. Seppänen. 2002. A wavelet domain LSB insertion algorithm for high capacity audio steganography. In Proceedings of 2002 IEEE 10th digital signal processing workshop, 2002 and the 2nd signal processing education workshop. IEEE.Google Scholar
  24. 24.
    Delforouzi, A., and M. Pooyan. 2008. Adaptive digital audio steganography based on integer wavelet transform. Circuits, Systems and Signal Processing 27(2): 247–259.MathSciNetCrossRefGoogle Scholar
  25. 25.
    Shirali-Shahreza, S., and M. Manzuri-Shalmani. 2008. High capacity error free wavelet domain speech steganography. In IEEE international conference on acoustics, speech and signal processing, 2008. ICASSP 2008. IEEE.Google Scholar
  26. 26.
    Gopalan, K., and S. Wenndt. 2004. Audio steganography for covert data transmission by imperceptible tone insertion. In Proceedings of the IASTED international conference on communication systems and applications (CSA 2004), Banff, Canada.Google Scholar
  27. 27.
    Ngo, N.M., and M. Unoki. 2016. Method of audio watermarking based on adaptive phase modulation. IEICE transactions on information and systems 99(1): 92–101.Google Scholar
  28. 28.
    Djebbar, F., et al. 2012. Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech, and Music Processing 2012(1): 1–16.CrossRefGoogle Scholar
  29. 29.
    Dong, X., M.F. Bocko, and Z. Ignjatovic. 2004. Data hiding via phase manipulation of audio signals. In IEEE international conference on acoustics, speech, and signal processing, 2004. Proceedings.(ICASSP’04). IEEE.Google Scholar
  30. 30.
    Guerchi, D., et al. 2008. Speech secrecy: an FFT-based approach. International Journal of Mathematics and Computer Science 3(2): 1–19.MathSciNetMATHGoogle Scholar
  31. 31.
    Li, X., and H.H. Yu. 2000. Transparent and robust audio data hiding in cepstrum domain. In 2000 IEEE international conference on multimedia and expo, 2000. ICME 2000. IEEE.Google Scholar
  32. 32.
    Gopalan, K. 2005. Audio steganography by cepstrum modification. In IEEE international conference on acoustics, speech, and signal processing, 2005. Proceedings.(ICASSP’05). 2005. IEEE.Google Scholar
  33. 33.
    Gopalan, K. 2009. A unified audio and image steganography by spectrum modification. In IEEE international conference on industrial technology, 2009. ICIT 2009. IEEE.Google Scholar
  34. 34.
    Ansari, R., H. Malik, and A. Khokhar. 2004. Data-hiding in audio using frequency-selective phase alteration. In IEEE international conference on acoustics, speech, and signal processing, 2004. Proceedings. (ICASSP’04). IEEE.Google Scholar
  35. 35.
    Malik, H., R. Ansari, and A.A. Khokhar. 2007. Robust data hiding in audio using allpass filters. IEEE Transactions on Audio, Speech, and Language Processing 15(4): 1296–1304.CrossRefGoogle Scholar
  36. 36.
    Nishimura, A. 2008. Data hiding for audio signals that are robust with respect to air transmission and a speech codec. In IIHMSP’08 international conference on intelligent information hiding and multimedia signal processing, 2008. IEEE.Google Scholar
  37. 37.
    Hofbauer, K., and G. Kubin. 2006. High-rate data embedding in unvoiced speech. In INTERSPEECH.Google Scholar
  38. 38.
    Geiser, B., and P. Vary. 2008. High rate data hiding in ACELP speech codecs. In IEEE international conference on acoustics, speech and signal processing, 2008. ICASSP 2008. IEEE.Google Scholar
  39. 39.
    Aoki, N. 2008. A technique of lossless steganography for G. 711 telephony speech. In International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE.Google Scholar
  40. 40.
    Aoki, N. 2010. A semi-lossless steganography technique for G. 711 telephony speech. In 2010 sixth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP). IEEE.Google Scholar
  41. 41.
    Huang, Y.F., S. Tang, and J. Yuan. 2011. Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Transactions on Information Forensics and Security 6(2): 296–306.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Singapore 2017

Authors and Affiliations

  • Mohammad Ali Nematollahi
    • 1
  • Chalee Vorakulpipat
    • 1
  • Hamurabi Gamboa Rosales
    • 2
  1. 1.National Electronics and Computer Technology Center (NECTEC)PathumthaniThailand
  2. 2.Universidad Autónoma de ZacatecasZacatecasMexico

Personalised recommendations