By Topic

Combining Multilevel Manipulation Estimation with Content-Based Authentication Watermarking

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Gulbis, M. ; Univ. of Rostock, Rostock ; Muller, E. ; Steinebach, M.

The recognition of digital audio data manipulation is a challenge addressed by various fragile and content- fragile watermarking algorithms. But so far none of the approaches provides satisfying results with respect to manipulation detection. Especially distinguishing malicious attacks from allowed post production operations is still an open issue. We introduce an integration of our watermarking-based approach for audio data falsification recognition into a content-based watermark authentication method. This combines the capabilities of known feature-embedding algorithms with our forensic approach using watermarking as a hint for falsification estimation. We create a feature that can be extracted out of the same domain as for the watermark embedding. Our method is verified using several audio data sets of speech.

Published in:

Intelligent Information Hiding and Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference on  (Volume:1 )

Date of Conference:

26-28 Nov. 2007