• Complain

Hua Guang - Digital Audio Watermarking: Fundamentals, Techniques and Challenges

Here you can read online Hua Guang - Digital Audio Watermarking: Fundamentals, Techniques and Challenges full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Singapore, year: 2017, publisher: Springer Singapore, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Hua Guang Digital Audio Watermarking: Fundamentals, Techniques and Challenges
  • Book:
    Digital Audio Watermarking: Fundamentals, Techniques and Challenges
  • Author:
  • Publisher:
    Springer Singapore
  • Genre:
  • Year:
    2017
  • City:
    Singapore
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Digital Audio Watermarking: Fundamentals, Techniques and Challenges: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Digital Audio Watermarking: Fundamentals, Techniques and Challenges" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Hua Guang: author's other books


Who wrote Digital Audio Watermarking: Fundamentals, Techniques and Challenges? Find out the surname, the name of the author of the book and a list of all author's works by series.

Digital Audio Watermarking: Fundamentals, Techniques and Challenges — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Digital Audio Watermarking: Fundamentals, Techniques and Challenges" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
The Author(s) 2017
Yong Xiang , Guang Hua and Bin Yan Digital Audio Watermarking SpringerBriefs in Electrical and Computer Engineering 10.1007/978-981-10-4289-8_1
1. Introduction
Yong Xiang 1 , Guang Hua 2 and Bin Yan 3
(1)
School of Information Technology, Deakin University, Melbourne, VIC, Australia
(2)
School of Electronic Information and Communications, Huazhong University of Science and Technology, Wuhan, China
(3)
College of Electronics, Communication and Physics, Shandong University of Science and Technology, Qingdao, Shandong, China
Yong Xiang
Email:
Abstract
Digital audio watermarking is the science and art of embedding a special type of data, such as a mark or a covert message, into digital audio content. The embedded information is then extracted at the receiving end for various purposes pertaining audio security. It has been an active research topic since the advent of digital era in mid 1990s Boney et al. (The Third IEEE international conference on multimedia computing and systems 473480, 1996) []. In this chapter, we introduce the general background of digital audio watermarking, including its brief research and development history, applications, general system structure, as well as the performance criteria to evaluate an audio watermarking system.
1.1 Watermarking and Audio Watermarking
Data hiding, or information hiding, is a general term that describes the problem of embedding information in a cover content [], where the former is usually associated with specific scenarios or with tamper-resisting purposes.
A brief clarification about the differences among similar terms are provided as follows. Data hiding and information hiding are considered to be interchangeable, and both terms represent the general concept of embedding a secret signal into a cover content. Watermarking, on the other hand, specifies the type of cover content as document, audio, image, video, etc., mainly multimedia content. It is also important to note that the watermarks to be embedded may or may not contain a message, that is to say, the watermarks could simply be a mark, signature or logo, instead of a message. The designer of a watermarking system is concerned with how the watermarks could survive uncontrollable processing or attacks when the watermarked content is distributed. On the contrary, in the context of steganography, the designer is more concerned with concealing the existence of the hidden massage. More details about the similarities and differences could be found in [].
The very original concept of paper marks or paper watermarks emerged hundreds of years ago []. In this book, we will provide the readers with a comprehensive review of fundamental principles, latest techniques, and open problems of digital audio watermarking. Classical audio watermarking techniques, such as echo hiding, spread spectrum (SS), quantization index modulation (QIM), and patchwork, will be introduced. Further, the development history of each type of techniques will be reviewed, including the latest works. In addition, this book covers two special topics on audio watermarking, i.e., reversible audio watermarking and audio watermarking with cryptography.
1.2 Performance Criteria of Audio Watermarking Systems
Despite the performance criteria for an audio watermarking system depend on the specific application, common performance criteria could be summarized as follows.
  • Imperceptibility. Except for the special type of perceptible image watermarking, imperceptibility is probably the most primary concern of a watermarking system. It characterizes how the watermarking system could manage the distortion of original cover content caused by watermark embedding. In audio watermarking, terms such as fidelity, inaudibility, transparency and distortion , refer to the similar concept. We will stick to the term imperceptibility in this book as it more precisely reflects the relationship between embedding distortion and human perception. For image and audio watermarking, imperceptibility is achieved via exploiting the characteristics of human visual system (HVS) and human auditory system (HAS) respectively.
  • Robustness. The watermarked content, when released to end users, may undergo uncontrollable processing or even malicious attacks, before we attempt to extract the watermarks from the content. Therefore, it is essentially important for the watermarks to be robust against unintentional or malicious attacks. Typical unintentional attacks include A/D and D/A conversion, equalization, re-encoding, etc., while malicious attacks could be nonlinear scaling, tampering, and so on. Besides, a certain attack could be caused either unintentionally or intentionaly. For example, desynchronization effects could be caused by either A/D and D/A conversion or malicious scaling. Also note that robustness is the most complicated performance criterion for a watermarking system.
  • Security. In order not to confuse security with robustness, we confine the concept of watermarking security as the systems capability of preventing unauthorized party to access the watermarking channel, i.e., the systems capability of preventing unauthorized watermarking key detection and watermark extraction. This means that when security is concerned, the adversarys aim is assumed to be watermarking key detection and watermark extraction only, not including watermark removal. Unlike imperceptibility and robustness, the security of audio watermarking systems has been less studied, while the main component to ensure security is the pseudo-random noise (PN) which serves as the key.
  • Capacity. The watermarks to be embedded in a given cover content is also called payload. The maximum size of payload, usually in terms of bits, is termed capacity. Since audio signal is a function of time and most audio watermarking schemes segment audio signal into frames before watermark embedding, the embedding capacity could also be characterized by embedding rate with the unit of bits per second or bits per frame.
  • Computational Complexity. At last, an audio watermarking system is preferable to be more computationally efficient when it is designed for real-time applications such as broadcast monitoring and second screen systems.
Generally, there exists a trade-off among the above performance criteria, and improving one would probably result in compromising another (or a few others). A typical example is the most intensively studied trade-off between imperceptibility and robustness. Conceptually, if one would like the watermarks to be more imperceptible, then he or she tends to weaken the strength of the embedded watermarks, but this will result in the watermarks being more vulnerable to attacks, and vice versa. In the context of reversible audio watermarking, robustness is not considered, while the trade-off is established between imperceptibility and capacity. Specifically, if more watermark bits are embedded, then more distortion will be introduced to the cover signal, and vice versa.
1.3 Applications of Audio Watermarking
Watermarking systems were created with the original objective of copyright protection for multimedia content. Such a need has drawn more and more attentions since the era of digital technology in early 1990s. Since watermarking systems generally take effect only after copyright infringement having taken place, they are rarely used for preventing it from happening. Several companies have developed their commercial audio watermarking products to suit the need of the market. Verance []. In this application, while streaming subscribed multimedia content on a device such as a television, the subscriber could use another mobile device, e.g., a smartphone or a tablet, to receive enhanced viewing experience. In this way, immersive complementary content could be provided on the second screen of the mobile device. The communication between the second screen and the primary screen is established via audio watermarking. Specifically, audio watermarks are embedded into the audio channel of the multimedia content streamed on the primary device. Then, the second screen subscriber uses the alternative device to receive the audio signal from the primary device and extracts the imperceptible audio watermarks which trigger the service of enriched content on the second screen.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Digital Audio Watermarking: Fundamentals, Techniques and Challenges»

Look at similar books to Digital Audio Watermarking: Fundamentals, Techniques and Challenges. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Digital Audio Watermarking: Fundamentals, Techniques and Challenges»

Discussion, reviews of the book Digital Audio Watermarking: Fundamentals, Techniques and Challenges and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.