Full Text:   <4315>

CLC number: TP391; TP309

On-line Access: 2011-12-29

Received: 2011-04-06

Revision Accepted: 2011-09-09

Crosschecked: 2011-12-08

Cited: 4

Clicked: 7743

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
1. Reference List
Open peer comments

Journal of Zhejiang University SCIENCE C 2012 Vol.13 No.1 P.11-19


A multipurpose audio watermarking algorithm with synchronization and encryption

Author(s):  Baiying Lei, Ing Yann Soon

Affiliation(s):  School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore

Corresponding email(s):   leib0001@e.ntu.edu.sg

Key Words:  Audio watermarking, Copyright protection, Content authentication, Compound encryption, Synchronization

Baiying Lei, Ing Yann Soon. A multipurpose audio watermarking algorithm with synchronization and encryption[J]. Journal of Zhejiang University Science C, 2012, 13(1): 11-19.

@article{title="A multipurpose audio watermarking algorithm with synchronization and encryption",
author="Baiying Lei, Ing Yann Soon",
journal="Journal of Zhejiang University Science C",
publisher="Zhejiang University Press & Springer",

%0 Journal Article
%T A multipurpose audio watermarking algorithm with synchronization and encryption
%A Baiying Lei
%A Ing Yann Soon
%J Journal of Zhejiang University SCIENCE C
%V 13
%N 1
%P 11-19
%@ 1869-1951
%D 2012
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.C1100085

T1 - A multipurpose audio watermarking algorithm with synchronization and encryption
A1 - Baiying Lei
A1 - Ing Yann Soon
J0 - Journal of Zhejiang University Science C
VL - 13
IS - 1
SP - 11
EP - 19
%@ 1869-1951
Y1 - 2012
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.C1100085

We propose a new multipurpose audio watermarking scheme in which two complementary watermarks are used. For audio copyright protection, the watermark data with copyright information or signature are first encrypted by Arnold transformation. Then the watermark data are inserted in the low frequency largest significant discrete cosine transform (DCT) coefficients to obtain robustness performance. For audio authentication, a chaotic signal is inserted in the high frequency insignificant DCT coefficients to detect tampered regions. Furthermore, the synchronization code is embedded in the audio statistical characteristics to resist desynchronization attacks. Experimental results show that our proposed method can not only obtain satisfactory detection and tampered location, but also achieve imperceptibility and robustness to common signal processing attacks, such as cropping, shifting, and time scale modification (TSM). Comparison results show that our method outperforms some existing methods.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article


[1]Chen, N., Zhu, J., 2008. Multipurpose audio watermarking algorithm. J. Zhejiang Univ.-Sci. A, 9(4):517-523.

[2]Cvejic, N., Seppanen, T., 2008. Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks. Information Science Reference, Hershey.

[3]Huang, J., Wang, Y., Shi, Y.Q., 2002. A Blind Audio Watermarking Algorithm with Self-Synchronization. Proc. IEEE Int. Symp. on Circuits and Systems, 3:627-630.

[4]Katzenbeisser, S., Petitcolas, F.A.P., 2000. Information Hiding Techniques for Steganography and Digital Watermaring. Artech House, Norwood, Mass, USA.

[5]Kirovski, D., Malvar, H.S., 2003. Spread-spectrum watermarking of audio signals. IEEE Trans. Signal Process., 51(4):1020-1033.

[6]Lu, C.S., Liao, H.Y.M., 2001. Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Process., 10(10):1579-1592.

[7]Lu, C.S., Liao, H.Y.M., Chen, L.H., 2000. Multipurpose Audio Watermarking. Proc. 15th Int. Conf. on Pattern Recognition, p.282-285.

[8]Lu, Z.M., Xu, D.G., Sun, S.H., 2005. Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans. Image Process., 14(6):822-831.

[9]Ma, X., Li, X., Liu, W., 2008. A New Audio Watermarking Method for Copyright Protection and Tampering Localization. Proc. 3rd Int. Conf. on Innovative Computing Information and Control, p.352-358.

[10]Steinebach, M., Dittmann, J., Seibel, C., Ferri, L.C., Petitcolas, F.A.P., Fatès, N., Fontaine, C., Raynal, F., 2001. StirMark Benchmark: Audio Watermarking Attacks. Proc. Int. Conf. on Information Technology: Coding and Computing, p.49-54.

[11]Swanson, M.D., Zhu, B., Tewfik, A.H., Boney, L., 1998. Robust audio watermarking using perceptual masking. Signal Process., 66(3):337-355.

[12]Tsekeridou, S., Solachidis, V., Nikolaidis, N., Nikolaidis, A., Tefas, A., Pitas, I., 2001. Statistical analysis of a watermarking system based on Bernoulli chaotic sequences. Signal Process., 81(6):1273-1293.

[13]Wang, X.Y., Zhao, H., 2006. A novel synchronization invariant audio watermarking scheme based on DWT and DCT. IEEE Trans. Signal Process., 54(12):4835-4840.

[14]Wang, Y., Yang, Y., 2008. A Synchronous Audio Watermarking Algorithm Based on Chaotic Encryption in DCT Domain. Proc. Int. Symp. on Information Science and Engineering, 2:371-374.

[15]Wu, Y.T., Shih, F.Y., 2007. Digital watermarking based on chaotic map and reference register. Pattern Recogn., 40(12):3753-3763.

[16]Xie, L., Zhang, J.S., He, H.J., 2006. NDFT-Based Audio Watermarking Scheme with High Security. Proc. 18th Int. Conf. on Pattern Recognition, 4:270-273.

[17]Yeo, I.K., Kim, H.J., 2003. Modified patchwork algorithm: a novel audio watermarking scheme. IEEE Trans. Speech Audio Process., 11(4):381-386.

[18]Zhang, L., Chen, L.M., Qian, G.B., 2006. Self-Synchronization Adaptive Blind Audio Watermarking. Proc. 2nd Int. Conf. on Multi-media Modelling, p.1-4.

Open peer comments: Debate/Discuss/Question/Opinion


Please provide your name, email address and a comment

Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE