Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques

In the past few years, a large amount of techniques have been proposed to identify whether a multimedia content has been illegally tampered or not. Nevertheless, very few efforts have been devoted to identifying which kind of attack has been carried out, especially due to the large data required for this task. We propose a novel hashing scheme which exploits the paradigms of compressive sensing and distributed source coding to generate a compact hash signature, and we apply it to the case of audio content protection. The audio content provider produces a small hash signature by computing a limited number of random projections of a perceptual, time-frequency representation of the original audio stream; the audio hash is given by the syndrome bits of an LDPC code applied to the projections. At the content user side, the hash is decoded using distributed source coding tools. If the tampering is sparsifiable or compressible in some orthonormal basis or redundant dictionary, it is possible to identify the time-frequency position of the attack, with a hash size as small as 200 bits/second; the bit saving obtained by introducing distributed source coding ranges between 20% to 70%.

[1]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[2]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[3]  R.G. Baraniuk,et al.  Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.

[4]  R. A. McDonald,et al.  Noiseless Coding of Correlated Information Sources , 1973 .

[5]  Qibin Sun,et al.  Robust Hash for Detecting and Localizing Image Tampering , 2007, 2007 IEEE International Conference on Image Processing.

[6]  E.J. Candes Compressive Sampling , 2022 .

[7]  Richard G. Baraniuk,et al.  Compressive Sensing , 2008, Computer Vision, A Reference Guide.

[8]  Jana Dittmann,et al.  EURASIP Journal on Applied Signal Processing 2003:10, 1001–1015 c ○ 2003 Hindawi Publishing Corporation Watermarking-Based Digital Audio Data Authentication , 2003 .

[9]  Chun-Shien Lu,et al.  Multipurpose audio watermarking , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[10]  Bernd Girod,et al.  Rate-adaptive codes for distributed source coding , 2006, Signal Process..

[11]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[12]  Aaron D. Wyner,et al.  The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.

[13]  Bernd Girod,et al.  Distributed Video Coding , 2005, Proceedings of the IEEE.

[14]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[15]  Bernd Girod,et al.  Spatial models for localization of image tampering using distributed source codes , 2007, PCS 2007.

[16]  Ton Kalker,et al.  A Highly Robust Audio Fingerprinting System With an Efficient Search Strategy , 2003 .

[17]  Michael B. Wakin,et al.  An Introduction To Compressive Sampling [A sensing/sampling paradigm that goes against the common knowledge in data acquisition] , 2008 .

[18]  E. Berg,et al.  In Pursuit of a Root , 2007 .

[19]  Jiying Zhao,et al.  A novel semi-fragile audio watermarking scheme , 2003, The 2nd IEEE Internatioal Workshop on Haptic, Audio and Visual Environments and Their Applications, 2003. HAVE 2003. Proceedings..

[20]  Shih-Kun Huang,et al.  Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..

[21]  Pedro Cano,et al.  A review of algorithms for audio fingerprinting , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[22]  Stephen P. Boyd,et al.  Enhancing Sparsity by Reweighted ℓ1 Minimization , 2007, 0711.1612.

[23]  Bernd Girod,et al.  Image Authentication Based on Distributed Source Coding , 2007, 2007 IEEE International Conference on Image Processing.

[24]  Stefano Tubaro,et al.  Rate allocation for robust video streaming based on distributed video coding , 2008, Signal Process. Image Commun..

[25]  Biing-Hwang Juang,et al.  Fundamentals of speech recognition , 1993, Prentice Hall signal processing series.

[26]  Keiichi Chono,et al.  Reduced-reference image quality assessment using distributed source coding , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[27]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[28]  Marco Dalai,et al.  The DISCOVER codec: Architecture, Techniques and Evaluation , 2007, PCS 2007.

[29]  Bernd Girod,et al.  Audio authentication based on distributed source coding , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[30]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[31]  Bernd Girod,et al.  Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[32]  Ramarathnam Venkatesan,et al.  A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding , 2001, Information Hiding.

[33]  V.K. Goyal,et al.  Compressive Sampling and Lossy Compression , 2008, IEEE Signal Processing Magazine.

[34]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[35]  Stefano Tubaro,et al.  Localization of sparse image tampering via random projections , 2008, 2008 15th IEEE International Conference on Image Processing.