4
A Robust Zero-Watermarking Algorithm for Audio Based on LPCC Shu-Min Tsai Department of Communication Engineering National Penghu Technology University Penghu, Taiwan [email protected] Abstract—The embedding of a digital watermark into digital data protects the owners of information. The development of the Internet has made the problem of unauthorized copying and distributed data potentially devastating to intellectual property rights. A zero-watermarking algorithm for audio based on the correlation of Linear Prediction Cepstrum Coefficients (LPCC) with adaptive factors, is proposed herein. Compared with LPCC watermarking, the proposed algorithm can retrieve the available embedded watermark back after various attacks. Simulation results reveal that the proposed algorithm has greater robustness and security than the LPCC scheme algorithm. Index Terms—Intellectual Property Right, Information Security, Zero-Watermarking, Robustness, Linear Prediction Cepstrum Coefficients. I. INTRODUCTION With With the fast development of digital media and the application of Internet, digital watermarking technique is now playing an increasingly important role in the protection of copyright and the authentication of digital signals. To date, various watermarking schemes have been presented but they may distort slightly the original signal and can not provide a perfect balance between robustness and imperceptibility. The technique of zero-watermark was developed to keep well the robustness and imperceptibility in digital media [1]. Recently, zero-watermarking schemes have been proposed to analyze security for audio signals. [2] proposed a method for mapping the approximate coefficients of the wavelet transform of an audio segment into a binary matrix. A blind zero-watermark algorithm, based on discrete wavelet transform (DWT), has been used to construct secrete keys [3]. [4] used the lifting wavelet transform (LWT) technique on audio aggregation zero-watermark. The technologies of DWT and discrete cosine transformation (DCT) have been combined to generate the watermark sequences [5, 6]. [7] employed an audio zero-watermarking algorithm that combined DCT and Zernike moments. [8] discovered that the properties of entropy on different scales were depicted the audio's statistical features. The concept of the zero-watermark based on LPCC was proposed to protect audio signals [9, 10]. This paper proposes a new zero-watermarking algorithm that is based on the relationship between LPCC with factors. Simulation results that this method is robust. This paper proceeds as follows. Section II presents the proposed zero-watermarking scheme in detail. Section III presents experimental results concerning the proposed and existing methods. Finally, the conclusions about this paper are given in Section IV. II. ZERO-WATERMARKING SCHEME The zero-watermarking scheme consists of three parts, which are described as follows. A. Preprocess First, a watermark image I = } 1 , 1 ), , ( { Y j X i j i I is used with Y X × size. It needs to be converted to an one- dimensional signal V, V } 1 ), ( { Y X k k v × = for the host audio. Second, a high-pass filter is applied before the embedding process. The high-pass filter eliminates undesired low- frequency components. After the audio signal is filtered through the high-pass filter, it is segmented by a Hamming window into segments Y X × . B. Embedding Process Figure 1 shows the block diagram of the watermarking embedding scheme. The embedding steps are as follows. Generate a random permutation which is used as a key (denoted as random seed) in the watermark detecting process. Then V is scrambled into W. By this way, we can decrease the relationship of pixel space in the watermark image, and improve the security of the system. The zero-watering sequences should be perceptually significant features. In this paper, Linear Prediction Cepstrum Coefficients (LPCC) are chosen as the characteristic values of audio signal. Let S be the original audio signal, s(n) is the estimated value by linear prediction, s(n-1) ,..., s(n-p) are the previous audio samples, A 1 ~A p are the linear prediction coefficients, and p is an order number. Linear prediction function is given by ). ( ... ) 2 ( ) 1 ( ) ( 2 1 p n S A n S A n S A n S p × + + × + × = (1) 978-1-4673-5936-8/13/$31.00 ©2013 IEEE 63

[IEEE 2013 1st International Conference on Orange Technologies (ICOT 2013) - Tainan (2013.3.12-2013.3.16)] 2013 1st International Conference on Orange Technologies (ICOT) - A robust

  • Upload
    lexuyen

  • View
    215

  • Download
    2

Embed Size (px)

Citation preview

Page 1: [IEEE 2013 1st International Conference on Orange Technologies (ICOT 2013) - Tainan (2013.3.12-2013.3.16)] 2013 1st International Conference on Orange Technologies (ICOT) - A robust

A Robust Zero-Watermarking Algorithm for Audio Based on LPCC

Shu-Min Tsai Department of Communication Engineering

National Penghu Technology University Penghu, Taiwan

[email protected]

Abstract—The embedding of a digital watermark into digital data protects the owners of information. The development of the Internet has made the problem of unauthorized copying and distributed data potentially devastating to intellectual property rights. A zero-watermarking algorithm for audio based on the correlation of Linear Prediction Cepstrum Coefficients (LPCC) with adaptive factors, is proposed herein. Compared with LPCC watermarking, the proposed algorithm can retrieve the available embedded watermark back after various attacks. Simulation results reveal that the proposed algorithm has greater robustness and security than the LPCC scheme algorithm.

Index Terms—Intellectual Property Right, Information Security, Zero-Watermarking, Robustness, Linear Prediction Cepstrum Coefficients.

I. INTRODUCTION With With the fast development of digital media and the

application of Internet, digital watermarking technique is now playing an increasingly important role in the protection of copyright and the authentication of digital signals. To date, various watermarking schemes have been presented but they may distort slightly the original signal and can not provide a perfect balance between robustness and imperceptibility. The technique of zero-watermark was developed to keep well the robustness and imperceptibility in digital media [1].

Recently, zero-watermarking schemes have been proposed to analyze security for audio signals. [2] proposed a method for mapping the approximate coefficients of the wavelet transform of an audio segment into a binary matrix. A blind zero-watermark algorithm, based on discrete wavelet transform (DWT), has been used to construct secrete keys [3]. [4] used the lifting wavelet transform (LWT) technique on audio aggregation zero-watermark. The technologies of DWT and discrete cosine transformation (DCT) have been combined to generate the watermark sequences [5, 6]. [7] employed an audio zero-watermarking algorithm that combined DCT and Zernike moments. [8] discovered that the properties of entropy on different scales were depicted the audio's statistical features.

The concept of the zero-watermark based on LPCC was proposed to protect audio signals [9, 10]. This paper proposes a new zero-watermarking algorithm that is based on the relationship between LPCC with factors. Simulation results that this method is robust.

This paper proceeds as follows. Section II presents the proposed zero-watermarking scheme in detail. Section III presents experimental results concerning the proposed and existing methods. Finally, the conclusions about this paper are given in Section IV.

II. ZERO-WATERMARKING SCHEME The zero-watermarking scheme consists of three parts,

which are described as follows.

A. Preprocess First, a watermark image I = }1,1),,({ YjXijiI ≤≤≤≤

is used with YX × size. It needs to be converted to an one-dimensional signal V, V }1),({ YXkkv ×≤≤= for the host audio.

Second, a high-pass filter is applied before the embedding process. The high-pass filter eliminates undesired low-frequency components. After the audio signal is filtered through the high-pass filter, it is segmented by a Hamming window into segments YX × .

B. Embedding Process Figure 1 shows the block diagram of the watermarking

embedding scheme. The embedding steps are as follows. • Generate a random permutation which is used as a key

(denoted as random seed) in the watermark detecting process. Then V is scrambled into W. By this way, we can decrease the relationship of pixel space in the watermark image, and improve the security of the system.

• The zero-watering sequences should be perceptually significant features. In this paper, Linear Prediction Cepstrum Coefficients (LPCC) are chosen as the characteristic values of audio signal. Let S be the original audio signal, s(n) is the estimated value by linear prediction, s(n-1) ,..., s(n-p) are the previous audio samples, A1~Ap are the linear prediction coefficients, and p is an order number. Linear prediction function is given by

).(...)2()1()( 21 pnSAnSAnSAnS p −×++−×+−×= (1)

978-1-4673-5936-8/13/$31.00 ©2013 IEEE 63

Page 2: [IEEE 2013 1st International Conference on Orange Technologies (ICOT 2013) - Tainan (2013.3.12-2013.3.16)] 2013 1st International Conference on Orange Technologies (ICOT) - A robust

To obtain the linear prediction coefficients (LPC), we use autocorrelation relationship and Durbin algorithm. Thus Linear Prediction Cepstrum Coefficients can be obtained as follows:

.,)/1(

;1,)/1(

,

1)(

1

1)(

11

pnifCAnmC

pnifCAnmAC

AC

p

mmnmn

n

mmnmnn

≥××−=

≤≤××−+=

=

=−

=−

(2)

• A binary pattern E, is defined as },1),({ YXkke ×≤≤=E (3)

Th(k) is the mean of the logarithm characteristic values of every frame.

,/})]([log{)(1 10 pkCkTh p

n n∑ == (4)

where k is a frame index. A new binary bit is obtained by comparing with TH, as follows.

⎩⎨⎧ >

=.,0

),()(,1)(

otherwisekThkCif

kno nn

(5)

The number, )(knotal is obtained by summation the new bits as

.)()()(1∑

==

p

nnntal knokwkno (6)

The factor nw is used to intensify the characteristic, Cn for large than the threshold. The element of the binary pattern E can be obtained by

⎩⎨⎧ ×>

=,,0

),()(,1)(

otherwiseptkno

ke tal (7)

t is set to 70% in this paper.

• The zero-watermarking ZW is generated as follows.

),()()( kwkekzw ⊗= (8) where ⊗ is the XOR operation. The zero-watermarking

image is shown in Figure 2.

Fig. 1. Block diagram of watermarking embedding scheme

Fig. 2. Zero-Watermarking image

C. Detecting Process The watermark can be recovered and Fig. 3 shows the

block diagram of watermarking detecting scheme. The extraction process is as follows.

• The test audio is divided into YX × frames. • Feature values (LPCC) of the test audio are calculated. • The same procedure that is described as an embedding

process in section B is performed to estimate the binary pattern E~ .

• The XOR operstion is applied between E~ and )(kzw , that is,

),()(~)(~ kzwkekw ⊗= (9)

where W~ are sequences of the scrambled image. • The random seed is used to get the extracted watermark

from W~ .

Fig. 3. Block diagram of watermarking detecting scheme

III. SIMULATION RESULTS In computer simulations, a 8888× bits binary image is used

as the watermark, as shown in Fig. 4.

Fig. 4. Watermark image A completed music is used as the original signal. The

detailed information is as follows. • Duration of music: 296s.

Tested Audio

Preprocess Characteristic Values

Encoding

XOR

Recovered Untidy- Picture

Zero-Watermark

Random Seed Extracted

Watermark

Keyes

Original Audio

Preprocess Characteristic Values

Encoding Time Label

XOR

Untidy Picture

Zero-Watermark

Random Seed

Original Picture

(Watermark)

Keyes

64

Page 3: [IEEE 2013 1st International Conference on Orange Technologies (ICOT 2013) - Tainan (2013.3.12-2013.3.16)] 2013 1st International Conference on Orange Technologies (ICOT) - A robust

• Sampling frequency: 44.1k Hz. • Number of bits per sample: 16 bits. • Bit rate: 705k bps. • Number of channels: 1 (mono)

Table 1 presents several methods and tools of attack. • Re-sampling : The sampling frequency is changed

from 44.1k Hz to 22.05k Hz, and then from 22.05k Hz to 44.1k Hz.

• Re-quantization: The number of bits is reduced from 16 bits to 8 bits, and then increased from 8 bits to 16 bits.

• Low-pass filtering: Tested music is filtered through a low-pass filter with a cut-off frequency of 11k Hz.

• MP3 compression: The signal is compressed in MP3 format.

• Additive white Gaussian noise (AWGN): The signal-to -noise ratios of WGN are 20 dB and 30 dB.

• Random Cropping: The signal is cropped by 10% and 20%.

TABLE 1. ATTACKED METHODS AND TOOLS

ATTACKED METHODS

TOOLS

Resampling 44.1→22.05→44.1 (kHz) GoldWave

Requantization 16→8→16 (bits) GoldWave

Low-pass filter (11 kHz) GoldWave

MP3 compression (24 kbps) Audacity

AWGN (20dB) Audacity

AWGN (30dB) Audacity

Random cropping (10%) GoldWave

Random cropping (20%) GoldWave

The bit error rate (BER), defined in Eq. (10), is used to

estimate the reliability of the schemes.

%,100×=MRBER (10)

where R denotes the number of error bits, and M is the total number of bits. As the order of LPCC is increases, the recovery image becomes more distinct, and the complexity increases [10]. Hence, the watermarking method is highly robust and the trade-off between the time of required for calculation and the quality of the digital watermark must be made. The proposed algorithm provides a resolution. Table 2 summarizes the results of simulation. When order number

10=p is chosen, the proposed algorithm is more reliable than that of [10], and the quality of the recovered image approaches that obtained using the algorithm of with 22=p of [10].

Therefore, the proposed method reduces the computational complexity and provides a robust watermark image.

IV. CONCLUSION We have presented a new algorithm for embedding and

detecting an audio watermark based on LPCC with adaptive factors. Simulation results demonstrate that the proposed zero-watermark scheme performs excellently in terms of security and robustness, and against cropping attacks.

ACKNOWLEDGMENT The author would like to thank the National Science

Council of the Republic of China, Taiwan, for financially supporting this research under Contract No. NSC 101-2221-E-346 -012.

REFERENCES [1] Q. Wen, T. F. Sun, and S. X. Wang, “Concept and application of

zero-watermark,” Acta Electronica Sinica, vol. 31, no. 2, pp.214-216, Feb. 2003.

[2] X. Li, and G. He, ”A new audio zero-watermark algorithm for copyright protection based on audio segmentation and wavelet coefficients mapping,” International Conference on Digital Content, Multimedia Technology and its Applications (IDCTA), pp. 22-26, 2011.

[3] X. Zhong, X. Tang, and H. Yuc, ”Zero-watermark scheme based on audio's statistical character,” International Symposium on Microwave, Antenna, Propagation, and EMC Technologies for Wireless Communications, pp. 1227-1230, 2007.

[4] J. Li, and R. Wang, “Audio aggregation zero-watermark algorithm based on (k, n/k=n),” International Conference on Signal Processing Systems (ICSPS), vol. 3, pp. 644-648, 2010.

[5] R. W. Ciptasari, F. A. Yulianto, A. Fajar, and K. Sakurai, ”An efficient key generation method in audio zero-Watermarking,” International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 336-339, 2011.

[6] H. L. Dai, and D. He, ”An efficient and robust zero-watermarking scheme for audio based on DWT and DCT,” Asia Pacific Conference on IEEE Microelectronics & Electronics, pp. 233-236, 2009.

[7] Y. Xiong, and R. Wang, ”An audio zero-watermark algorithm combined DCT with zernike moments,” International Conference on Cyberworlds, pp. 11-15, 2008.

[8] G. Chen, and Q. Hu, ”Zero-watermark of audio based on multi-scale entropy vectors,” IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 131-135, 2010.

[9] Y. C. Lu, “Cepstral coefficients-based zero-waterwark scheme for digital audio,” Thesis for Master of Science Institute of Communication Engineering Tatung University, 2008.

[10] S. M. Tsai and S. T. Tu, “LPCC zero-watermark for audio signal,” Conference on Electronic Communication and Applications, 2011.

65

Page 4: [IEEE 2013 1st International Conference on Orange Technologies (ICOT 2013) - Tainan (2013.3.12-2013.3.16)] 2013 1st International Conference on Orange Technologies (ICOT) - A robust

TABLE 2. SIMULATION RESULTS

ATTACTED

METHODES

LPCC10[a] LPCC16[a] LPCC22[a] Proposed Scheme (LPCC10+factor)

BER watermark BER watermark BER watermark BER watermark

Re-Sampling

44.1→22.05→

44.1(kHz)

17.03%

5.19%

2.80%

5.1%

Re-Quantization

16→8→16

(bits)

10.78%

4.64%

3.58%

7.4%

Low-pass filter

(11 kHz) 15.69

%

4.24%

2.29%

0.8%

MP3 compression

(24 kbps) 18.69

%

6.16%

3.42%

1.0 %

AWGN

20dB 28.72

%

12.13

%

9.47%

1.65%

AWGN

30dB 33.70

%

15.75

%

11.11

%

2.1%

Random cropping

10%

2.66%

1.32%

0.88%

1.35%

Random cropping

20%

4.86%

2.04%

1.30%

1.75%

66