Translator Disclaimer
17 February 2006 A benchmark assessment of the WAUC watermarking audio algorithm
Author Affiliations +
Proceedings Volume 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII; 60721K (2006)
Event: Electronic Imaging 2006, 2006, San Jose, California, United States
This paper presents a benchmark assessment of the WAUC digital audio watermarking scheme, which relies on MPEG 1 Layer 3 compression to determine where and how the embedded mark must be introduced. The mark is embedded by modifying the magnitude of the spectrum at several frequencies which are chosen according to the difference between the original and the compressed audio content. The main advantage of the scheme is that the perceptual masking of the compressor is implicitly used and, thus, the scheme can be directly tested with different maskings by replacing the compressor. Since repeat coding of the mark is used, a majority voting scheme is applied to improve robustness. The scheme also uses a dual Hamming error correcting code for the embedded mark, which makes it possible to apply it for fingerprinting, achieving robustness against the collusion of two buyers. Several tuning parameters affect the embedding and reconstruction processes, the values of which are chosen according to the tuning guidelines obtained in previous works. In order to illustrate the robustness of the method, the WAUC scheme has been tested against several evaluation profiles, such as the attacks introduced in the Watermark Evaluation Testbed (WET) for audio.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
David Megías, Jordi Herrera-Joancomart, Jordi Serra, and Julià Minguillón "A benchmark assessment of the WAUC watermarking audio algorithm", Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60721K (17 February 2006);


Advanced audio watermarking benchmarking
Proceedings of SPIE (June 22 2004)
Profiles for evaluation: the usage of audio WET
Proceedings of SPIE (February 17 2006)
Two different approaches for attacking BOWS
Proceedings of SPIE (February 27 2007)
Public key watermarking issue
Proceedings of SPIE (August 01 2001)
A novel interpretation of content authentication
Proceedings of SPIE (March 01 2007)
The blind Newton sensitivity attack
Proceedings of SPIE (February 15 2006)

Back to Top