A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks

  • Authors:
  • Xiang-Yang Wang;Tian-Xiao Ma;Pan-Pan Niu

  • Affiliations:
  • School of Computer and Information Technology, Liaoning Normal University, Dalian 116029, China and State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences ...;School of Computer and Information Technology, Liaoning Normal University, Dalian 116029, China;School of Computer and Information Technology, Liaoning Normal University, Dalian 116029, China

  • Venue:
  • Computers and Electrical Engineering
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Desynchronization attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work to design a robust audio watermarking scheme against desynchronization attacks. Based on pseudo-Zernike moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance toward desynchronization attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly, with the spatial watermarking technique, synchronization code is embedded into the statistics average value of audio samples in the first part. And then, map 1D digital audio signal in the second part into 2D form, and calculate its pseudo-Zernike moments. Finally, the watermark bit is embedded into the average value of modulus of the low-order pseudo-Zernike moments. Meanwhile combining the two adjacent synchronization code searching technology, the algorithm can extract the watermark without the help from the origin digital audio signal. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signals processing such as MP3 compression, noise addition, resampling, re-quantization, etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, jittering, etc.