Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1073170.1073179acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Audio watermark attacks: from single to profile attacks

Published: 01 August 2005 Publication History

Abstract

A wide range of watermarking evaluation approaches and especially image benchmarking suites have been described in the literature. Our paper sets the main focus on the evaluation of digital audio watermarking with StirMark Benchmark for Audio (SMBA). Here we describe the currently implemented single geometric attacks in detail and introduce our so-called attack profiles. Profiles reflect an application oriented point of view ranging from the normal usage of audio content like internet radio or music shops up to typical attacker scenarios. In particular we present a definition of an extended profile which is composed of three basic profiles specific for annotation watermarks. Furthermore, we demonstrate how SMBA attacks can be used to evaluate the transparency of digital watermarking algorithms regarding the embedding strength. Test results based on an example audio watermarking algorithm and the measurement of transparency and capacity are presented.

References

[1]
Emmanuel C. Ifeachor, Barrie W. Jervis, Digital Signal Processing, Prentice Hall, ISBN 0201 59619 9, 2002
[2]
Nedeljko Cvejic, Algorithms for Audio Watermarking and Steganography, Department of Electrical and Information Engineering, Information Processing Laboratory, University of Oulu, 2004
[3]
Jana Dittmann, Martin Steinebach, Andreas Lang, Sascha Zmudzinsky, Advanced audio watermarking benchmarking, San Jose, CA, USA Bellingham, Washington, USA, SPIE 2004, vol. 5306
[4]
EAQUAL, http://home.wanadoo.nl/~w.speek/eaqual.htm, 2004
[5]
Zaid Ghazal, Umsetzung und Vergleich von digitalen Audio Wasserzeichenalgorithmen, diploma thesis at Otto-von-Guericke University of Magdeburg, 2005
[6]
ITU-R Recommendation BS.1387, Method for Objective Measurements of Perceived Audio Quality, Dec. 1998
[7]
F.Y. Duan, I. King, A Short Summary of Digital Watermarking Techniques for Multimedia Data, Department of Computer Science and Engineering, Chinese University of Hong Kong, Shatin, N.T., Hong Kong, China
[8]
M. Kutter, F.A.P. Petitcolas, A fair benchmark for image watermarking system, In SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, Vol. 3657, San Jose, CA, USA, 25-27 January 1999
[9]
M. Kutter, S. Voloshynovskiy and A. Herrigel, Watermark copy attack, In Ping Wah Wong and Edward J. Delp eds., IS&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, Vol. 3971 of SPIE Proceedings, San Jose, California USA, 23-28 January 2000
[10]
Andreas Lang, Jana Dittmann, StirMark and profiles: from high end up to preview scenarios, Reviewed Paper, IFIP/GI Workshop on Virtual Goods, Ilmenau (Germany), 28-29 May 2004, online publication available from http://virtualgoods.tu-ilmenau.de/2004/program.html
[11]
Andreas Lang, Ryan Spring, StirMark Benchmark for Audio - Attack Description, internal report, 2004
[12]
A. Lang, J. Dittmann, E. T. Lin, E. J. Delp, Application Oriented Audio Watermark Benchmark Service, to appear in SPIE 2005, San Jose
[13]
Benoit Macq, Jana Dittmann, Edward J. Delp, Benchmarking of Image Watermarking Algorithms for Digital Rights Management, Proceedings of the IEEE, Special Issue on: Enabling Security Technology for Digital Rights Management, pp. 971--984, Vol. 92 No. 6, June 2004
[14]
D.D.Rife, J.Vanderkooy, Transfer-Function Measurement with Maximum-Length Sequences, JAES, Vol. 37, June 1989
[15]
Secret Rabbit Code (aka libsamplerate), http://www.mega-nerd.com/SRC/, 2004
[16]
SoundTouch Sound Processing Library, http://sky.prohosting.com/oparviai/soundtouch/, 2004
[17]
SQAM - Sound Quality Assessment Material, http://sound.media.mit.edu/mpeg4/audio/sqam/, 2004
[18]
Steven W. Smith, The Scientist and Engineer's Guide to Digital Processing, California Technical Publishing, ISBN 0 9660176 3 3, 1997
[19]
T. Thiede, W. C. treurniet, R. Bitto, C. Schmidmer, T. Sporer, J. G. Beerends, C. Colomes, M. Keyhl, G. Stoll, K. Brandeburg, B. Feiten, PEAQ -- The ITU Standard for Objective Measurement of Perceived Audio Quality, J. Audio Eng. Soc., vol. 48, pp. 3--29, Jan-Feb. 2000
[20]
Visit Audacity, Inc, http://www.audacity.com/, 2004
[21]
Thomas Vogel, Jana Dittmann, Illustration Watermarking: An Object Based Approach for Digital Images, to appear in SPIE 2005, San Jose
[22]
X Multimedia System, http://www.xmms.com/, 2004
[23]
Eberhard Zwicker, Hugo Fastl, Psychoacoustics. Facts and Models, Springer, Berlin, November 2001, ISBN 3 540 65063 6

Cited By

View all
  • (2022)A New Hybrid Steganography Scheme Employing A Time-Varying Delayed Chaotic Neural Network2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC55534.2022.00032(152-157)Online publication date: Oct-2022
  • (2022)Fake COVID-19 videos detector based on frames and audio watermarkingMultimedia Systems10.1007/s00530-022-01006-529:1(361-375)Online publication date: 27-Sep-2022
  • (2020)Compressive Sampling with Multiple Bit Spread Spectrum-Based Data HidingApplied Sciences10.3390/app1012433810:12(4338)Online publication date: 24-Jun-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '05: Proceedings of the 7th workshop on Multimedia and security
August 2005
164 pages
ISBN:1595930329
DOI:10.1145/1073170
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attack
  2. audio
  3. digital watermarking
  4. smba
  5. stirmark

Qualifiers

  • Article

Conference

MM&Sec '05
Sponsor:
MM&Sec '05: Multimedia and Security Workshop 2005
August 1 - 2, 2005
NY, New York, USA

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)3
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A New Hybrid Steganography Scheme Employing A Time-Varying Delayed Chaotic Neural Network2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)10.1109/CyberC55534.2022.00032(152-157)Online publication date: Oct-2022
  • (2022)Fake COVID-19 videos detector based on frames and audio watermarkingMultimedia Systems10.1007/s00530-022-01006-529:1(361-375)Online publication date: 27-Sep-2022
  • (2020)Compressive Sampling with Multiple Bit Spread Spectrum-Based Data HidingApplied Sciences10.3390/app1012433810:12(4338)Online publication date: 24-Jun-2020
  • (2019)Spread spectrum data embedding in audio with UISA based cooperative detectionMultimedia Tools and Applications10.1007/s11042-019-07845-1Online publication date: 1-Aug-2019
  • (2019)Analysis of impact of audio modifications on the robustness of watermark for non-blind architectureMultimedia Tools and Applications10.1007/s11042-013-1636-074:12(4415-4435)Online publication date: 17-Jan-2019
  • (2018)QIM-Based Audio Watermarking with Combined Techniques of SWT-DST-QR-CPT Using SS-Based Synchronization2018 6th International Conference on Information and Communication Technology (ICoICT)10.1109/ICoICT.2018.8528727(286-292)Online publication date: May-2018
  • (2018)CPT-Based Data Hiding in Selected Subband Using Combined Transform and Decomposition Method2018 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)10.1109/ICCEREC.2018.8712001(86-92)Online publication date: Dec-2018
  • (2016)Authentication for AAC compressed audio using data hiding2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)10.1109/ICCE-TW.2016.7520956(1-2)Online publication date: May-2016
  • (2016)Authentication of MP4 file by joint data embedding in audio and video tracks2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)10.1109/APSIPA.2016.7820780(1-6)Online publication date: Dec-2016
  • (2015)Audiovisual video characterization using audio watermarking scheme2015 15th International Conference on Intelligent Systems Design and Applications (ISDA)10.1109/ISDA.2015.7489227(213-218)Online publication date: Dec-2015
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media