This paper presents an approach to evaluate the acoustic path transmission of watermarked audio tracks through
large scale simulations. The multitude of signal alterations performed implicitly via acoustic path transmission
are aggregated through the measurement of impulse responses. These impulse responses are integrated in a
test suite in order to be able to perform large scale automated tests as a replacement of the time intensive
and expensive individual measurements. The reliability of the approach is demonstrated by the comparison of
measurements and simulations.
In this paper we present concepts and corresponding implemenations to maximize the speed of audio watermarking
encoders in order to be applicable in different scenarios. To motivate the development and implementation of fast audio
watermarking encoders, application scenarios requiring high embedding speed are presented.
Different concepts with assumptions concerning the underlying watermarking algorithms are discussed. The paper
presents the necessary audio stream preparation and the corresponding implementation realizing the fast audio watermarking
methods. The quality of the watermarked audio tracks and the robustness of the embedded watermarks will be
verified by experimental tests. Enhancements of the fundamental principle concerning the distribution of audio tracks are
discussed.
This paper presents an exhaustive evaluation of the quality of an audio watermarking algorithm. The integration of the psychoacoustic model into the audio watermarking approach is demonstrated. The quality parameter relating the power of the watermark noise and the masking threshold is presented. The evaluation method is detailed and the quality of the watermarked audio tracks is evaluated with regard to different settings of the quality parameter used to adjust the power of the embedded watermarks. The subjective listener test compares the quality of the original audio track with the watermarked one. Different quality parameter settings were used in order to enable the adjustment between quality and maximum robustness according to the items to be watermarked and the target audience.
KEYWORDS: Digital watermarking, Image processing, Current controlled voltage source, Feature extraction, Detection and tracking algorithms, Visualization, Databases, RGB color model, Document management, Information security
In this article we propose content based retrieval techniques as means of improving the key management used for digital watermark monitoring. In particular, we show how keys for watermark monitoring can be used on a per media item basis (rather than one secret key for all works copyrighted by a single owner), while retaining a high probability of successful spotting.
In this paper, benchmarking results of watermarking techniques are presented. The benchmark includes evaluation of the watermark robustness and the subjective visual image quality. Four different algorithms are compared, and exhaustively tested. One goal of these tests is to evaluate the feasibility of a Common Functional Model (CFM) developed in the European Project OCTALIS and determine parameters of this model, such as the length of one watermark. This model solves the problem of image trading over an insecure network, such as Internet, and employs hybrid watermarking. Another goal is to evaluate the resistance of the watermarking techniques when subjected to a set of attacks. Results show that the tested techniques do not have the same behavior and that no tested methods has optimal characteristics. A last conclusion is that, as for the evaluation of compression techniques, clear guidelines are necessary to evaluate and compare watermarking techniques.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.