Abstract
We propose a novel audio watermarking scheme which can recover the original audio carrier perfectly if the watermarked audio is modified. Besides, we can adjust the maximum tampered rate allowed and the quality of watermarked audio flexibly as required. In the scheme, an efficient generalized integer transform is improved to embed watermark data which are composed of least significant bits(LSBs) of averages in each patch, reference-bits and check-bits. LSBs are needed in the inverse transform. Then, by comparing the extracted check-bits and calculated ones, the modified area can be localized. Finally, reliable reference-bits and samples data help us reconstruct the original audio without errors. The efficiency of the proposed method is theoretically and experimentally verified.
Similar content being viewed by others
References
Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding—A survey [J]. Proceedings of the IEEE, 1999, 87(7): 1062–1078.
Vleeschouwer C D, Delaigle J F, Macq B. Invisibility and application functionalities inperceptual watermarking: an overview [J]. Proceedings of the IEEE, 2002, 90(1): 64–77.
Tai W L, Yeh C M, Chang C C. Reversible data hiding based on histogram modification of pixel differences [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2009, 19(6): 906–910.
Chang C C, Kieu T D. A reversible data hiding scheme using complementary embedding strategy [J]. Information Sciences, 2010, 180(16): 3045–3058.
Liu S H, Yao H X, Gao W, et al. An image fragile water-mark scheme based on chaotic image pattern and pixel-pairs [J]. Applied Mathematics and Computation, 2007, 185: 869–882.
Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification [J]. IEEE Transactions on Image Processing, 2001, 10(10): 1593–1601.
Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security [J]. Pattern Recognition Letters, 2004, 25(16): 1893–1903.
Yang H, Kot A C. Binary image authentication with tampering localization by embedding cryptographic signature and block identifier [J]. IEEE Signal Processing Letters, 2006, 13(12): 741–744.
Zhu H F, Zhao C H, Tang C M.A fragile watermarking scheme for tamper detection and recovery of image [C]// Proceedings of the 6th World Congress Intelligent Control and Automation. Piscataway N J: IEEE Press, 2006: 9748–9751.
Erturkler Metin, Tatar Yetkin. A novelfragile watermarking technique with high accuracy tamper localization [C]//Signal Processing and Communications Applications. Piscataway N J: IEEE Press, 2006: 1–4.
Lin P L, Hsieh C K, Huang P W. A hierarchical digital watermarking method for image tamper detection and recovery [J]. Pattern Recognition, 2005, 38(12): 2519–2529.
Lee T Y, Lin S D. Dual watermark for image tamper detection and recovery [J]. Pattern Recognition, 2008,41(11): 3497–3506.
He H J, Zhang J S, Chen F. A self-recovery fragile watermarking scheme for image authentication with superior localization [J]. Science in China Series F: Information Sciences, 2008, 51(10): 1487–1507.
Lin P L, Huang P W, Peng A W. A fragile watermarking scheme for image authentication with localization and recovery[C]// Proceedings of Multimedia Software Engineering. Piscataway N J: IEEE Press, 2004: 146–153.
Zhang X P, Wang S Z. Fragile watermarking with error-Free restoration capability [J]. IEEE Transactions on Multimedia, 2008, 10(8): 1490–1499.
Chen F, He H G, Wang H X. A fragile watermarking scheme for audio detection and recovery [C]// Proceedings of Image and Signal Processing. Piscataway N J: IEEE Press, 2008: 135–138.
Waleed Fakhr Mohamed. Sparse watermark embedding and recovery using compressed sensing framework for audio signals[C]// International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover. Piscataway N J: IEEE Press, 2012: 535–539.
Wang X, Li X L, Yang B, et al. Efficient generalized integer transform for reversible watermarking[J]. IEEE Signal Processing Letters, 2010, 17(6): 567–570.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (61272414), the Science and Technology Project of Guangzhou of China (2012J4100108), and the Jinan University’s Scientific Research Creativeness Cultivation Project for Outstanding Undergraduates Recommended for Postgraduate Study
Biography: LUO Xinrong, male, Master candidate, research direction: information hiding.
Rights and permissions
About this article
Cite this article
Luo, X., Xiang, S. Fragile audio watermarking with perfect restoration capacity based on an adapted integer transform. Wuhan Univ. J. Nat. Sci. 19, 497–504 (2014). https://doi.org/10.1007/s11859-014-1044-y
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-014-1044-y