An audio watermarking method robust against time- and frequency-fluctuation

In this paper, we describe an audio watermarking algorithm that can embed a multiple-bit message which is robust against wow-and- utter, cropping, noise-addition, pitch-shift, and audio compressions such as MP3. The embedding algorithm calculates and manipulates the magnitudes of segmented areas in the time-frequency plane of the content using short-term DFTs. The detection algorithm correlates the magnitudes with a pseudo-random array that corresponds to two-dimensional areas in the time-frequency plane. The two-dimensional array makes the watermark robust because, even when some portions of the content are heavily degraded, other portions of the content can match the pseudo-random array and contribute to watermark detection. Another key idea is manipulation of
magnitudes. Because magnitudes are less in uenced than phases by uctuations of the analysis windows caused by random cropping, the watermark resists degradation. When signal transformation causes pitch uctuations in the content, the frequencies of the pseudo-random array embedded in the content shift, and that causes a decrease in the volume of the watermark signal that still correctly overlaps with the corresponding pseudo-random array. To keep the overlapping area wide enough for successful watermark detection, the widths of the frequency subbands used for the detection segments should be increased as frequency increases. We theoretically and experimentally analyze the
robustness of proposed algorithm against a variety of signal degradations.

By: Ryuki Tachibana, Shuichi Shimizu, Taiga Nakamura, and Seiji Kobayashi

Published in: Electronics Imaging 2001 (SPIE Proceedings, vol. 4314), SPIE, p.104-115 in 2001

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rt0409.pdf

Questions about this service can be mailed to reports@us.ibm.com .