An efficient key generation method in audio zero-watermarking

Rimba Whidiana Ciptasari, Aulia Fajar, Fazmah Arif Yulianto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

This paper proposes modification of previous audio zero-watermarking, proposed by Chen et. al [1], in terms of its watermark-key generation. We investigate that the size of previous watermark detection key is around two or three times larger than its watermark data. In order to yield an efficient key rather than generating three secret keys, we will exploit data indices, instead of field indices, to store the key. Compared to previous method, our watermark key's size is relatively the same as its watermark data. Despite of having smaller key size, the experiment demonstrates that our scheme has maximum imperceptibility level, indicated by SNR value, and can resist to several non-malicious attacks, such as echo addition, band pass filtering and re-sampling. In addition, we also address the invertibility and quasi-invertibility of our scheme for resolving rightful ownership, and present attack which can cause confusion to rightful claim. We list the objective of attacks, abilities of attacker, and a scenario to evaluate its security. According to the experimental result, our proposed scheme still remains several limitations, regardless of certification authority existence.

Original languageEnglish
Title of host publicationProceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
Pages336-339
Number of pages4
DOIs
Publication statusPublished - Dec 19 2011
Event7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 - Dalian, China
Duration: Oct 14 2011Oct 16 2011

Other

Other7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
CountryChina
CityDalian
Period10/14/1110/16/11

Fingerprint

Watermarking
Sampling
Experiments

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Information Systems
  • Signal Processing

Cite this

Ciptasari, R. W., Fajar, A., Yulianto, F. A., & Sakurai, K. (2011). An efficient key generation method in audio zero-watermarking. In Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 (pp. 336-339). [6079595] https://doi.org/10.1109/IIHMSP.2011.63

An efficient key generation method in audio zero-watermarking. / Ciptasari, Rimba Whidiana; Fajar, Aulia; Yulianto, Fazmah Arif; Sakurai, Kouichi.

Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. 2011. p. 336-339 6079595.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ciptasari, RW, Fajar, A, Yulianto, FA & Sakurai, K 2011, An efficient key generation method in audio zero-watermarking. in Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011., 6079595, pp. 336-339, 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011, Dalian, China, 10/14/11. https://doi.org/10.1109/IIHMSP.2011.63
Ciptasari RW, Fajar A, Yulianto FA, Sakurai K. An efficient key generation method in audio zero-watermarking. In Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. 2011. p. 336-339. 6079595 https://doi.org/10.1109/IIHMSP.2011.63
Ciptasari, Rimba Whidiana ; Fajar, Aulia ; Yulianto, Fazmah Arif ; Sakurai, Kouichi. / An efficient key generation method in audio zero-watermarking. Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. 2011. pp. 336-339
@inproceedings{c1b29ba978a64bd59c1dd6eb6aadd51d,
title = "An efficient key generation method in audio zero-watermarking",
abstract = "This paper proposes modification of previous audio zero-watermarking, proposed by Chen et. al [1], in terms of its watermark-key generation. We investigate that the size of previous watermark detection key is around two or three times larger than its watermark data. In order to yield an efficient key rather than generating three secret keys, we will exploit data indices, instead of field indices, to store the key. Compared to previous method, our watermark key's size is relatively the same as its watermark data. Despite of having smaller key size, the experiment demonstrates that our scheme has maximum imperceptibility level, indicated by SNR value, and can resist to several non-malicious attacks, such as echo addition, band pass filtering and re-sampling. In addition, we also address the invertibility and quasi-invertibility of our scheme for resolving rightful ownership, and present attack which can cause confusion to rightful claim. We list the objective of attacks, abilities of attacker, and a scenario to evaluate its security. According to the experimental result, our proposed scheme still remains several limitations, regardless of certification authority existence.",
author = "Ciptasari, {Rimba Whidiana} and Aulia Fajar and Yulianto, {Fazmah Arif} and Kouichi Sakurai",
year = "2011",
month = "12",
day = "19",
doi = "10.1109/IIHMSP.2011.63",
language = "English",
isbn = "9780769545172",
pages = "336--339",
booktitle = "Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011",

}

TY - GEN

T1 - An efficient key generation method in audio zero-watermarking

AU - Ciptasari, Rimba Whidiana

AU - Fajar, Aulia

AU - Yulianto, Fazmah Arif

AU - Sakurai, Kouichi

PY - 2011/12/19

Y1 - 2011/12/19

N2 - This paper proposes modification of previous audio zero-watermarking, proposed by Chen et. al [1], in terms of its watermark-key generation. We investigate that the size of previous watermark detection key is around two or three times larger than its watermark data. In order to yield an efficient key rather than generating three secret keys, we will exploit data indices, instead of field indices, to store the key. Compared to previous method, our watermark key's size is relatively the same as its watermark data. Despite of having smaller key size, the experiment demonstrates that our scheme has maximum imperceptibility level, indicated by SNR value, and can resist to several non-malicious attacks, such as echo addition, band pass filtering and re-sampling. In addition, we also address the invertibility and quasi-invertibility of our scheme for resolving rightful ownership, and present attack which can cause confusion to rightful claim. We list the objective of attacks, abilities of attacker, and a scenario to evaluate its security. According to the experimental result, our proposed scheme still remains several limitations, regardless of certification authority existence.

AB - This paper proposes modification of previous audio zero-watermarking, proposed by Chen et. al [1], in terms of its watermark-key generation. We investigate that the size of previous watermark detection key is around two or three times larger than its watermark data. In order to yield an efficient key rather than generating three secret keys, we will exploit data indices, instead of field indices, to store the key. Compared to previous method, our watermark key's size is relatively the same as its watermark data. Despite of having smaller key size, the experiment demonstrates that our scheme has maximum imperceptibility level, indicated by SNR value, and can resist to several non-malicious attacks, such as echo addition, band pass filtering and re-sampling. In addition, we also address the invertibility and quasi-invertibility of our scheme for resolving rightful ownership, and present attack which can cause confusion to rightful claim. We list the objective of attacks, abilities of attacker, and a scenario to evaluate its security. According to the experimental result, our proposed scheme still remains several limitations, regardless of certification authority existence.

UR - http://www.scopus.com/inward/record.url?scp=83455180088&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=83455180088&partnerID=8YFLogxK

U2 - 10.1109/IIHMSP.2011.63

DO - 10.1109/IIHMSP.2011.63

M3 - Conference contribution

AN - SCOPUS:83455180088

SN - 9780769545172

SP - 336

EP - 339

BT - Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011

ER -