A novel copyright marking approach using steganography and robust RSA asymmetric-key cryptographic technique in audio files

Abstract Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number. This paper presents a novel approach of Copyright marking using steganography and strong RSA Asymmetric-key cryptographic technique in audio files. The audio with secret information is indiscernible to human ear. The owner of the file is only aware of the secret key to access his information in the file. Thus making the method more secure and robust to the Intentional attacks.

[1]  Chia-Hung Yeh,et al.  Digital watermarking through quasi m-arrays , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).

[2]  Behrouz A. Forouzan,et al.  Data Communications and Networking , 2000 .

[3]  Sajad Shirali-Shahreza,et al.  Real-time and MPEG-1 layer III compression resistant steganography in speech , 2010, IET Inf. Secur..

[4]  Tio M. M. Cedric,et al.  Data concealment in audio using a nonlinear frequency distribution of PRBS coded data and frequency-domain LSB insertion , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).

[5]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[6]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[7]  Kathiravan Srinivasan,et al.  Robust RGB-D Hand Tracking Using Deep Learning Priors , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[9]  Motoi Iwata,et al.  A Digital Image Watermarking Scheme Withstanding Malicious Attacks , 2000 .

[10]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[11]  J. D. Johnston,et al.  Estimation of perceptual entropy using noise masking criteria , 1988, ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing.

[12]  J C Judge,et al.  Steganography: Past, Present, Future , 2001 .

[13]  Nedeljko Cvejic,et al.  ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY , 2004 .

[14]  Kathiravan Srinivasan,et al.  A hybrid NSCT domain image watermarking scheme , 2017, EURASIP J. Image Video Process..