Please use this identifier to cite or link to this item:
Title: A blind audio watermarking scheme using peak point extraction
Authors: Foo, Say Wei
Xue, Feng
Li, Mengyuan
Issue Date: 2005
Source: Foo, S. W., Xue, F., & Li, M. (2005). A blind audio watermarking scheme using peak point extraction. IEEE International Symposium on Circuits and Systems, ISCAS 2005, (pp. 4409-4412). Singapore: School of Electrical and Electronic Engineering.
Abstract: In this paper, a blind digital audio watermarking scheme is proposed. A psychoacoustic model is used to ensure the imperceptibility of the embedded watermark. The watermark is embedded in the Discrete Cosine Transform (DCT) domain by changing the phase of five information carriers determined using the psychoacoustic model. Blind recovery is achieved through the application of a novel synchronization scheme, the peak point extraction (PPE) scheme. Error correcting codes are used to enhance the robustness of the system. Informal listening reveals excellent imperceptibility of the embedded watermark. The watermarked signal was put through various forms of attacks. Experimental results show that recovery of watermark is perfect for signal not subjected to attack and the system is robust against attacks such as cropping and re-sampling.
DOI: 10.1109/ISCAS.2005.1465609
Rights: © 2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:EEE Conference Papers

Files in This Item:
File Description SizeFormat 
C92-C1L-R2-ISCAS2005XueF.pdfPublished version334.79 kBAdobe PDFThumbnail

Citations 10

Updated on Sep 2, 2020

Page view(s) 5

Updated on Jun 27, 2022

Download(s) 5

Updated on Jun 27, 2022

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.