Watermarking-based digital audio data authentication

被引:34
|
作者
Steinebach, M
Dittmann, J
机构
[1] Fraunhofer Inst IPSI, MERIT, D-64293 Darmstadt, Germany
[2] Platanista GmbH, D-39106 Magdeburg, Germany
[3] Otto Von Guericke Univ, D-39106 Magdeburg, Germany
关键词
multimedia security; manipulation recognition; content-fragile watermarking; invertible watermarking; digital signature; original protection;
D O I
10.1155/S1110865703304081
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate between fragile, semifragile, and content-fragile watermarking approaches for media authentication. Furthermore, invertible watermarking schemes exist while each bit change can be recognized by the watermark which can be extracted and the original data can be reproduced for high-security applications. Later approaches can be extended with cryptographic approaches like digital signatures. As we see from the literature, only few audio approaches exist and the audio domain requires additional strategies for time flow protection and resynchronization. To allow different security levels, we have to identify relevant audio features that can be used to determine content manipulations. Furthermore, in the field of invertible schemes, there are a bunch of publications for image and video data but no approaches for digital audio to ensure data authentication for high-security applications. In this paper, we introduce and evaluate two watermarking algorithms for digital audio data, addressing content integrity protection. In our first approach, we discuss possible features for a content-fragile watermarking scheme to allow several postproduction modifications. The second approach is designed for high-security applications to detect each bit change and reconstruct the original audio by introducing an invertible audio watermarking concept. Based on the invertible audio scheme, we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original, protected with a secret key.
引用
收藏
页码:1001 / 1015
页数:15
相关论文
共 50 条
  • [1] Watermarking-Based Digital Audio Data Authentication
    Martin Steinebach
    Jana Dittmann
    [J]. EURASIP Journal on Advances in Signal Processing, 2003
  • [2] A watermarking-based authentication and recovery scheme for encrypted audio
    Zhenghui Liu
    Yi Cao
    Kejia Lin
    [J]. Multimedia Tools and Applications, 2024, 83 : 10969 - 10987
  • [3] A Survey of Watermarking-Based Authentication for Digital Image
    Lee, Chin-Feng
    Shen, Jau-Ji
    Chen, Zhao-Ru
    [J]. PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 207 - 211
  • [4] A watermarking-based authentication and recovery scheme for encrypted audio
    Liu, Zhenghui
    Cao, Yi
    Lin, Kejia
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (04) : 10969 - 10987
  • [5] The survey of digital watermarking-based image authentication techniques
    Liu, T
    Qiu, ZD
    [J]. 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 1556 - 1559
  • [6] A digital watermarking-based image authentication mechanic for distributed embedded systems
    Yuan, S
    Huss, SA
    [J]. International Conference on Computing, Communications and Control Technologies, Vol 3, Proceedings, 2004, : 207 - 212
  • [7] Watermarking-based transparency authentication in visual cryptography
    Luo, Hao
    Pan, Jeng-Shyang
    Lu, Zhe-Ming
    Liao, Bin-Yih
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, 2007, : 609 - +
  • [8] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [9] Watermarking-based image authentication robust to JPEG compression
    Preda, R. O.
    Vizireanu, D. N.
    [J]. ELECTRONICS LETTERS, 2015, 51 (23) : 1873 - 1874
  • [10] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446