IBM Systems Journal
Digital watermarking
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Speech Content Integrity Verification Integrated with ITU G.723.1 Speech Coding
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
Audio watermarking algorithm for real-time speech integrity and authentication
Proceedings of the 2004 workshop on Multimedia and security
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks
IIH-MSP '06 Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia
Psychoacoustics: Facts and Models
Psychoacoustics: Facts and Models
Watermarking-based digital audio data authentication
EURASIP Journal on Applied Signal Processing
Exposing digital forgeries in video by detecting duplication
Proceedings of the 9th workshop on Multimedia & security
Digital audio forensics: a first practical evaluation on microphone and environment classification
Proceedings of the 9th workshop on Multimedia & security
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Hi-index | 0.00 |
Existing security algorithms for data authentication like cryptographic hash functions for example, are very sensitive to changes in the protected data by design. If these mechanisms are applied on multimedia data, they fail to distinguish imperceptible signal transformation from malicious tampering that perceivably changes the content. Furthermore, they usually provide no localization or an assessment of the relevance of such manipulations with respect to human perception or even semantics which is not desirable in a number of applications. We present an algorithm for a robust message authentication code (MAC) for digital audio data in the context of authentication watermarking. An existing audio fingerprinting approaches is improved with respect to key-based security. Psychoacoustic modelling is incorporated by us to separate inaudible changes from perceivably relevant modifications of the audio content. Experimental results show that the proposed algorithm provides both a high level of distinction between perceptually different audio data and a high robustness against signal transformations that do not change the perceived information.