Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
ACM Transactions on Modeling and Computer Simulation (TOMACS) - Special issue on uniform random number generation
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Simple Collusion-Secure Fingerprinting Schemes for Images
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
An audio watermarking scheme robust against stereo attacks
Proceedings of the 2004 workshop on Multimedia and security
Watermarking attack: security of WSS techniques
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Robust frequency domain audio watermarking: a tuning analysis
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Some general methods for tampering with watermarks
IEEE Journal on Selected Areas in Communications
High capacity audio watermarking using the high frequency band of the wavelet domain
Multimedia Tools and Applications
Hi-index | 0.00 |
This paper discusses the modification of a robust digital audio watermarking scheme to allow the disclosure of the embedding and detection algorithms. The chosen scheme uses MPEG 1 Layer 3 compression to determine the position of the mark bits in the frequency domain. The marking positions would be exposed if the original embedding algorithm was disclosed. In fact, it is shown that even if an attacker did not know the exact tuning parameters used for embedding, he or she could still produce an approximate superset of the marking frequencies from only a marked copy and successfully attack the file. To avoid this problem, a secret key is introduced in the embedding and detection processes. The secret key includes the seed of a pseudo-random number generator which is used to compute the exact marking positions. The modification is then analysed in terms of capacity, imperceptibility, robustness and security. The experiments show that the modified scheme preserves most of the properties of the original one, such as robustness against MP3 compression for the most frequently used bit rates, and does introduce additional security as the mark is more difficult to erase when the embedding and detection algorithms are disclosed.