Paper
29 April 2002 Nth-order audio watermarking
Neil J. Hurley, Guenole C.M. Silvestre
Author Affiliations +
Proceedings Volume 4675, Security and Watermarking of Multimedia Contents IV; (2002) https://doi.org/10.1117/12.465265
Event: Electronic Imaging, 2002, San Jose, California, United States
Abstract
Second generation watermarking schemes differ from first generation symmetric schemes in that the detection process does not require the use of the same private key in both the embedder and the detector. An advantage of such schemes is that estimation of the watermark by an averaging attack is rendered impossible, so that the overall system is more secure. Almost all second generation schemes to date are also second order; that is, they are based on the computation of a quadratic form in the detector. Recently, Furon presented a unified description of second order schemes. Furon showed that O(m2) attacks were required to estimate the quadratic form where m is the spreading period. This presents a significant improvement over O(m) attacks required to estimate the watermarking key in symmetric schemes. In this work, the authors propose an audio watermarking scheme which employs an n-th order detection process. The scheme is based on a generalized differential modulation scheme and provides increased security over second order schemes. The cost of such increased security is a loss of efficiency, so that the watermark must be spread over more content. The paper presents an efficiency and security analysis for the third- and fourth-order scheme.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Neil J. Hurley and Guenole C.M. Silvestre "Nth-order audio watermarking", Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, (29 April 2002); https://doi.org/10.1117/12.465265
Lens.org Logo
CITATIONS
Cited by 5 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Sensors

Modulation

Information security

Signal detection

Computer security

Distortion

Back to Top