HOME

TheInfoList



OR:

An audio watermark is a unique electronic identifier embedded in an audio signal, typically used to identify ownership of copyright. It is similar to a
watermark A watermark is an identifying image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, atop a dark background), caused by thickness or density variations ...
on a photograph. Watermarking is the process of embedding information into a signal (e.g. audio, video or pictures) in a way that is difficult to remove. If the signal is copied, then the information is also carried in the copy. Watermarking has become increasingly important to enable copyright protection and ownership verification. One of the most secure techniques of audio watermarking is spread spectrum audio watermarking (SSW). In SSW, a narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented in any signal frequency is undetectable. Thus the watermark is spread over many frequency bands so that the energy in one band is undetectable. An interesting feature of this watermarking technique is that destroying it requires noise of high amplitude to be added to all frequency bands. SSW is a robust watermarking technique because, to eliminate it, the attack must affect all possible frequency bands with modifications of considerable strength. This creates visible defects in the data. Spreading spectrum is done by a
pseudonoise In cryptography, pseudorandom noise (PRN) is a signal similar to noise which satisfies one or more of the standard tests for statistical randomness. Although it seems to lack any definite pattern, pseudorandom noise consists of a deterministic ...
(PN) sequence. In conventional SSW approaches, the receiver must know the PN sequence used at the transmitter as well as the location of the watermark in the watermarked signal for detecting hidden information. This is a high security feature, since any unauthorized user who does not have access to this information cannot detect any hidden information. Detection of the PN sequence is the key factor for detection of hidden information from SSW. Although PN sequence detection is possible by using
heuristic A heuristic (; ), or heuristic technique, is any approach to problem solving or self-discovery that employs a practical method that is not guaranteed to be optimal, perfect, or rational, but is nevertheless sufficient for reaching an immediate ...
approaches such as
evolutionary algorithm In computational intelligence (CI), an evolutionary algorithm (EA) is a subset of evolutionary computation, a generic population-based metaheuristic optimization algorithm. An EA uses mechanisms inspired by biological evolution, such as reproduct ...
s, the high computational cost of this task can make it impractical. Much of the
computational complexity In computer science, the computational complexity or simply complexity of an algorithm is the amount of resources required to run it. Particular focus is given to computation time (generally measured by the number of needed elementary operations) ...
involved in the use of
evolutionary algorithm In computational intelligence (CI), an evolutionary algorithm (EA) is a subset of evolutionary computation, a generic population-based metaheuristic optimization algorithm. An EA uses mechanisms inspired by biological evolution, such as reproduct ...
s as an optimization tool is due to the
fitness function {{no footnotes, date=May 2015 A fitness function is a particular type of objective function that is used to summarise, as a single figure of merit, how close a given design solution is to achieving the set aims. Fitness functions are used in geneti ...
evaluation that may either be very difficult to define or be computationally very expensive. One of the recent proposed approaches—in fast recovering the PN sequence- is the use of fitness granulation as a promising "
fitness approximation Fitness approximationY. JinA comprehensive survey of fitness approximation in evolutionary computation ''Soft Computing'', 9:3–12, 2005 aims to approximate the objective or fitness functions in evolutionary optimization by building up machine l ...
" scheme. With the use of the fitness granulation approach called "Adaptive Fuzzy Fitness Granulation (AFFG)", the expensive fitness evaluation step is replaced by an approximate model. When evolutionary algorithms are used as a means to extract the hidden information, the process is called Evolutionary Hidden Information Detection, whether fitness approximation approaches are used as a tool to accelerate the process or not.


See also

*
Acoustic fingerprint An acoustic fingerprint is a condensed digital summary, a fingerprint, deterministically generated from an audio signal, that can be used to identify an audio sample or quickly locate similar items in an audio database. Practical uses of aco ...
*
Activated Content Activated Content is a digital watermarking company based in Seattle, Washington. The company has its own proprietary audio watermarking technology and provides solutions based around watermarking. The system was designed with help from Sony Musi ...


References

* M. Davarynejad, S. Sedghi, M. Bahrepour, C.W. Ahn, M. Akbarzadeh, C. A. Coello Coello,
Detecting Hidden Information from Watermarked Signal using Granulation Based Fitness Approximation
, Applications of Soft Computing: From Theory to Praxis, Springer, Series: Advances in Intelligent and Soft Computing, Volume 58/2009, , pp. 463–472, 2009. * M. Davarynejad, C.W. Ahn, J. Vrancken, J. van den Berg, C .A. Coello Coello,

, Applied Soft Computing, Vol. 10(3), pp. 719–729, 2010, . {{DEFAULTSORT:Audio Watermark Detection Digital audio Digital watermarking