Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Robust audio watermarking using frequency-selective spread spectrum

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $31
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Malik, H. ; ECE Dept., Univ. of Michigan, Dearborn, MI ; Ansari, R. ; Khokhar, A.

A novel audio watermarking scheme based on frequency-selective spread spectrum (FSSS) technique is presented. Unlike most of the existing spread spectrum (SS) watermarking schemes that use the entire audible frequency range for watermark embedding, the proposed scheme randomly selects subband(s) signal(s) of the host audio signal for watermark embedding. The proposed FSSS scheme provides a natural mechanism to exploit the band-dependent frequency-masking characteristics of the human auditory system to ensure the fidelity of the host audio signal and the robustness of the embedded information. Key attributes of the proposed scheme include reduced host interference in watermark detection, better fidelity, secure embedding and improved multiple watermark embedding capability. To detect the embedded watermark, two blind watermark detection methods are examined, one based on normalised correlation and the other based on estimation correlation. Extensive simulation results are presented to analyse the performance of the proposed scheme for various signal manipulations and standard benchmark attacks. A comparison with the existing full-band SS-based schemes is also provided to show the improved performance of the proposed scheme.

Published in:

Information Security, IET  (Volume:2 ,  Issue: 4 )