Watermarking-based digital audio data authentication

被引:34
|
作者
Steinebach, M
Dittmann, J
机构
[1] Fraunhofer Inst IPSI, MERIT, D-64293 Darmstadt, Germany
[2] Platanista GmbH, D-39106 Magdeburg, Germany
[3] Otto Von Guericke Univ, D-39106 Magdeburg, Germany
关键词
multimedia security; manipulation recognition; content-fragile watermarking; invertible watermarking; digital signature; original protection;
D O I
10.1155/S1110865703304081
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate between fragile, semifragile, and content-fragile watermarking approaches for media authentication. Furthermore, invertible watermarking schemes exist while each bit change can be recognized by the watermark which can be extracted and the original data can be reproduced for high-security applications. Later approaches can be extended with cryptographic approaches like digital signatures. As we see from the literature, only few audio approaches exist and the audio domain requires additional strategies for time flow protection and resynchronization. To allow different security levels, we have to identify relevant audio features that can be used to determine content manipulations. Furthermore, in the field of invertible schemes, there are a bunch of publications for image and video data but no approaches for digital audio to ensure data authentication for high-security applications. In this paper, we introduce and evaluate two watermarking algorithms for digital audio data, addressing content integrity protection. In our first approach, we discuss possible features for a content-fragile watermarking scheme to allow several postproduction modifications. The second approach is designed for high-security applications to detect each bit change and reconstruct the original audio by introducing an invertible audio watermarking concept. Based on the invertible audio scheme, we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original, protected with a secret key.
引用
收藏
页码:1001 / 1015
页数:15
相关论文
共 50 条
  • [21] Watermarking-based image authentication with recovery capability using halftoning technique
    Rosales-Roldan, Luis
    Cedillo-Hernandez, Manuel
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    Kurkoski, Brian
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (01) : 69 - 83
  • [22] CONTENT-BASED AUDIO AUTHENTICATION WATERMARKING
    Gulbis, Michael
    Mueller, Erika
    Steinebach, Martin
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (07): : 1883 - 1892
  • [23] Semi-fragile Watermarking-based Color Image Authentication with Recovery Capability
    Rosales-Roldan, Luis
    Cedillo-Hernandez, Manuel
    Chao, Jinhui
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 528 - 534
  • [24] A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
    Cao, Xinyue
    Fu, Zhangjie
    Sun, Xingming
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016
  • [25] Tally Based Digital Audio Watermarking
    Sonoda, Kotaro
    Noguchi, Shu
    [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 399 - 405
  • [26] A Watermarking-Based Method for Informed Source Separation of Audio Signals With a Single Sensor
    Parvaix, Mathieu
    Girin, Laurent
    Brossier, Jean-Marc
    [J]. IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2010, 18 (06): : 1464 - 1475
  • [27] Robust audio hashing for audio authentication watermarking
    Zmudzinski, Sascha
    Steinebach, Martin
    [J]. SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819
  • [28] Watermarking-based intellectual property protection for sensor streaming data
    Xiao, Xiangrong
    Sun, Xingming
    Li, Fan
    Wang, Baowei
    Xia, Zhihua
    Liang, Wei
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2010, 39 (04) : 213 - 223
  • [29] Digital Image Authentication System Based on Digital Watermarking
    Bhargava, Neeraj
    Sharma, M. M.
    Garhwal, Abhimanyu Singh
    Mathuria, Manish
    [J]. 2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 185 - 189
  • [30] An Image Authentication Technology Based on Digital Watermarking
    Zhu, Yong
    Yu, Xiaohong
    Liu, Xiaohuan
    [J]. 2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 179 - 183