Reed-Solomon Codes and Their Applications
Reed-Solomon Codes and Their Applications
Audio watermark attacks: from single to profile attacks
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
DWT-Based Audio Watermarking Resistant to Desynchronization
CIT '07 Proceedings of the 7th IEEE International Conference on Computer and Information Technology
Chaos-based discrete fractional Sine transform domain audio watermarking scheme
Computers and Electrical Engineering
Full-Index-Embedding Patchwork Algorithm for Audio Watermarking
IEICE - Transactions on Information and Systems
Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks
Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks
Robust frequency domain audio watermarking: a tuning analysis
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Transactions on Data Hiding and Multimedia Security I
A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT
IEEE Transactions on Signal Processing
Audio watermarking techniques using sinusoidal patterns based on pseudorandom sequences
IEEE Transactions on Circuits and Systems for Video Technology
Rational enforcement of digital oblivion
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Distributed multicast of fingerprinted content based on a rational peer-to-peer community
Computer Communications
Hi-index | 0.08 |
Many audio watermarking schemes divide the audio signal into several blocks such that part of the watermark is embedded into each of them. One of the key issues in these block-oriented watermarking schemes is to preserve the synchronisation, i.e. to recover the exact position of each block in the mark recovery process. In this paper, a novel time domain synchronisation technique is presented together with a new blind watermarking scheme which works in the discrete Fourier transform (DFT or FFT) domain. The combined scheme provides excellent imperceptibility results whilst achieving robustness against typical attacks. Furthermore, the execution of the scheme is fast enough to be used in real-time applications. The excellent transparency of the embedding algorithm makes it particularly useful for professional applications, such as the embedding of monitoring information in broadcast signals. The scheme is also compared with some recent results of the literature.