Digital watermarks for audio integrity verification

This paper proposes a new method of detecting and locating manipulations of audio recordings, such as cuts, inserts, replacements or muting of selected audio segments. The objective is to verify (or dispute) integrity of audio recording in business applications (such as business conducted over the phone), court depositions, journalistic interviews, etc. We assume that embedders are public, residing within audio recorders, while extractors are secure (forensic). For this application we propose a combination of watermarks, including spread spectrum and replica watermarks, resulting in high robustness to erasure and overwriting attacks, and good localization of modified intervals. We also propose pseudo-random stego key hopping as protection against overwrite attacks. Finally, we discuss possible alternative applications of the proposed techniques.

[1]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[2]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[3]  R. Petrovic,et al.  Audio signal watermarking based on replica modulation , 2001, 5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service. TELSIKS 2001. Proceedings of Papers (Cat. No.01EX517).

[4]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[5]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[6]  Gregory W. Wornell,et al.  Authentication with distortion criteria , 2005, IEEE Transactions on Information Theory.

[7]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[8]  Anirban Mukherjee,et al.  Media-independent watermarking classification and the need for combining digital video and audio watermarking for media authentication , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[9]  Gonzalo R. Arce,et al.  A class of authentication digital watermarks for secure multimedia communication , 2001, IEEE Trans. Image Process..

[10]  Chun-Shien Lu,et al.  Multipurpose audio watermarking , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[11]  C.-C. Jay Kuo,et al.  Speech content integrity verification integrated with ITU G.723.1 speech coding , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[12]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[13]  K. Jemili,et al.  Data hiding within audio signals , 1999, 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services. TELSIKS'99 (Cat. No.99EX365).

[14]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[15]  Ross Anderson,et al.  Information hiding terminology , 1996 .