A dual-channel time-spread echo method for audio watermarking

Xiang, Yong, Natgunanathan, Iynkaran, Peng, Dezhong, Zhou, Wanlei and Yu, Shui 2012, A dual-channel time-spread echo method for audio watermarking, IEEE transactions on information forensics and security, vol. 7, no. 2, pp. 383-392.

Attached Files
Name Description MIMEType Size Downloads

Title A dual-channel time-spread echo method for audio watermarking
Author(s) Xiang, YongORCID iD for Xiang, Yong orcid.org/0000-0003-3545-7863
Natgunanathan, IynkaranORCID iD for Natgunanathan, Iynkaran orcid.org/0000-0003-4215-000X
Peng, Dezhong
Zhou, WanleiORCID iD for Zhou, Wanlei orcid.org/0000-0002-1680-2521
Yu, ShuiORCID iD for Yu, Shui orcid.org/0000-0003-4485-6743
Journal name IEEE transactions on information forensics and security
Volume number 7
Issue number 2
Start page 383
End page 392
Total pages 10
Publisher IEEE Signal Processing Society
Place of publication Piscataway, N.J.
Publication date 2012-04
ISSN 1556-6013
Keyword(s) audio watermarking
colored pseudonoise (PN) sequence
echo hiding
echo kernel
Summary This work proposes a novel dual-channel time-spread echo method for audio watermarking, aiming to improve robustness and perceptual quality. At the embedding stage, the host audio signal is divided into two subsignals, which are considered to be signals obtained from two virtual audio channels. The watermarks are implanted into the two subsignals simultaneously. Then the subsignals embedded with watermarks are combined to form the watermarked signal. At the decoding stage, the watermarked signal is split up into two watermarked subsignals. The similarity of the cepstra corresponding to the watermarked subsignals is exploited to extract the embedded watermarks. Moreover, if a properly designed colored pseudonoise sequence is used, the large peaks of its auto-correlation function can be utilized to further enhance the performance of watermark extraction. Compared with the existing time-spread echo-based schemes, the proposed method is more robust to attacks and has higher imperceptibility. The effectiveness of our method is demonstrated by simulation results.
Language eng
Field of Research 089999 Information and Computing Sciences not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2011, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30044189

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 49 times in TR Web of Science
Scopus Citation Count Cited 61 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 628 Abstract Views, 12 File Downloads  -  Detailed Statistics
Created: Thu, 05 Apr 2012, 15:56:35 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.