Skip to main content
Log in

Fragile audio watermarking with perfect restoration capacity based on an adapted integer transform

  • Computer Science
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

We propose a novel audio watermarking scheme which can recover the original audio carrier perfectly if the watermarked audio is modified. Besides, we can adjust the maximum tampered rate allowed and the quality of watermarked audio flexibly as required. In the scheme, an efficient generalized integer transform is improved to embed watermark data which are composed of least significant bits(LSBs) of averages in each patch, reference-bits and check-bits. LSBs are needed in the inverse transform. Then, by comparing the extracted check-bits and calculated ones, the modified area can be localized. Finally, reliable reference-bits and samples data help us reconstruct the original audio without errors. The efficiency of the proposed method is theoretically and experimentally verified.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding—A survey [J]. Proceedings of the IEEE, 1999, 87(7): 1062–1078.

    Article  Google Scholar 

  2. Vleeschouwer C D, Delaigle J F, Macq B. Invisibility and application functionalities inperceptual watermarking: an overview [J]. Proceedings of the IEEE, 2002, 90(1): 64–77.

    Article  Google Scholar 

  3. Tai W L, Yeh C M, Chang C C. Reversible data hiding based on histogram modification of pixel differences [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009, 19(6): 906–910.

    Article  Google Scholar 

  4. Chang C C, Kieu T D. A reversible data hiding scheme using complementary embedding strategy [J]. Information Sciences, 2010, 180(16): 3045–3058.

    Article  Google Scholar 

  5. Liu S H, Yao H X, Gao W, et al. An image fragile water-mark scheme based on chaotic image pattern and pixel-pairs [J]. Applied Mathematics and Computation, 2007, 185: 869–882.

    Article  Google Scholar 

  6. Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification [J]. IEEE Transactions on Image Processing, 2001, 10(10): 1593–1601.

    Article  CAS  PubMed  Google Scholar 

  7. Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security [J]. Pattern Recognition Letters, 2004, 25(16): 1893–1903.

    Article  Google Scholar 

  8. Yang H, Kot A C. Binary image authentication with tampering localization by embedding cryptographic signature and block identifier [J]. IEEE Signal Processing Letters, 2006, 13(12): 741–744.

    Article  Google Scholar 

  9. Zhu H F, Zhao C H, Tang C M.A fragile watermarking scheme for tamper detection and recovery of image [C]// Proceedings of the 6th World Congress Intelligent Control and Automation. Piscataway N J: IEEE Press, 2006: 9748–9751.

    Google Scholar 

  10. Erturkler Metin, Tatar Yetkin. A novelfragile watermarking technique with high accuracy tamper localization [C]//Signal Processing and Communications Applications. Piscataway N J: IEEE Press, 2006: 1–4.

    Google Scholar 

  11. Lin P L, Hsieh C K, Huang P W. A hierarchical digital watermarking method for image tamper detection and recovery [J]. Pattern Recognition, 2005, 38(12): 2519–2529.

    Article  Google Scholar 

  12. Lee T Y, Lin S D. Dual watermark for image tamper detection and recovery [J]. Pattern Recognition, 2008,41(11): 3497–3506.

    Article  Google Scholar 

  13. He H J, Zhang J S, Chen F. A self-recovery fragile watermarking scheme for image authentication with superior localization [J]. Science in China Series F: Information Sciences, 2008, 51(10): 1487–1507.

    Article  Google Scholar 

  14. Lin P L, Huang P W, Peng A W. A fragile watermarking scheme for image authentication with localization and recovery[C]// Proceedings of Multimedia Software Engineering. Piscataway N J: IEEE Press, 2004: 146–153.

    Google Scholar 

  15. Zhang X P, Wang S Z. Fragile watermarking with error-Free restoration capability [J]. IEEE Transactions on Multimedia, 2008, 10(8): 1490–1499.

    Article  Google Scholar 

  16. Chen F, He H G, Wang H X. A fragile watermarking scheme for audio detection and recovery [C]// Proceedings of Image and Signal Processing. Piscataway N J: IEEE Press, 2008: 135–138.

    Google Scholar 

  17. Waleed Fakhr Mohamed. Sparse watermark embedding and recovery using compressed sensing framework for audio signals[C]// International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover. Piscataway N J: IEEE Press, 2012: 535–539.

    Google Scholar 

  18. Wang X, Li X L, Yang B, et al. Efficient generalized integer transform for reversible watermarking[J]. IEEE Signal Processing Letters, 2010, 17(6): 567–570.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shijun Xiang.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (61272414), the Science and Technology Project of Guangzhou of China (2012J4100108), and the Jinan University’s Scientific Research Creativeness Cultivation Project for Outstanding Undergraduates Recommended for Postgraduate Study

Biography: LUO Xinrong, male, Master candidate, research direction: information hiding.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, X., Xiang, S. Fragile audio watermarking with perfect restoration capacity based on an adapted integer transform. Wuhan Univ. J. Nat. Sci. 19, 497–504 (2014). https://doi.org/10.1007/s11859-014-1044-y

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-014-1044-y

Key words

CLC number

Navigation