Quality-driven secure audio transmissions in wireless multimedia sensor networks

Many audio applications such as audio surveillance and human acoustic health monitoring require security protections for audio streaming over WSNs. The process of watermarking which embeds small amounts of data (i.e., the watermark) into the original audio is an effective technique to ensure the integrity of received audio data at the receiver in energy-constrained WSNs. However, the selection of positions to embed watermark into audio streams is critical to both received audio quality and watermarking authentication performance in error-prone wireless transmission environments. In this paper we propose an approach that dynamically determines the range of middle sub-band components for embedding the watermark with minimum quality distortions, based on psycho-acoustic models and adaptive sub-band thresholds. In addition, through unequal network resource allocation schemes the proposed approach protects both middle sub-bands and high sub-bands, which include the important audio components. Our theoretical analysis and simulation results demonstrate that the proposed quality-driven energy-efficient watermarking approach for audio transmissions can achieve considerable performance gains in WSNs.

[1]  Michael Arnold Audio watermarking: features, applications and algorithms , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[2]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[3]  Chin-Feng Lai,et al.  DLNA-Based Multimedia Sharing System for OSGI Framework With Extension to P2P Network , 2010, IEEE Systems Journal.

[4]  Homayoun Yousefi'zadeh,et al.  An Optimal UEP Scheme of Audio Transmission over MIMO Wireless Links , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[5]  Koen Langendoen,et al.  An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.

[6]  Min Chen,et al.  Rethinking energy efficiency models of cellular networks with embodied energy , 2011, IEEE Network.

[7]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[8]  Michael W. Marcellin,et al.  Joint source/channel coding for multiple images , 2005, IEEE Transactions on Communications.

[9]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[10]  Hamid Sharif,et al.  Index-Based Selective Audio Encryption for Wireless Multimedia Sensor Networks , 2010, IEEE Transactions on Multimedia.

[11]  C.-C. Jay Kuo,et al.  Comparison of two speech content authentication approaches , 2002, IS&T/SPIE Electronic Imaging.

[12]  Ye Wang,et al.  Content-based UEP: a new scheme for packet loss recovery in music streaming , 2003, ACM Multimedia.

[13]  Hamid Sharif,et al.  Energy-Constrained Distortion Reduction Optimization for Wavelet-Based Coded Image Transmission in Wireless Sensor Networks , 2008, IEEE Transactions on Multimedia.

[14]  Ioannis Pitas,et al.  Robust audio watermarking in the time domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[15]  Dimitrios Skraparlis Design of an efficient authentication method for modern image and video , 2003, IEEE Trans. Consumer Electron..

[16]  Xin Li,et al.  Transparent and robust audio data hiding in subband domain , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[17]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[18]  Jaap A. Haitsma,et al.  Robust Audio Hashing for Content Identification , 2001 .

[19]  Wei Wang,et al.  Energy-Aware Adaptive Watermarking for Real-Time Image Delivery in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[20]  V. Hardman,et al.  A survey of packet loss recovery techniques for streaming audio , 1998, IEEE Network.

[21]  Liang Zhou,et al.  Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.

[22]  Cheng-Xiang Wang,et al.  Capacity Analysis of a Multi-Cell Multi-Antenna Cooperative Cellular Network with Co-Channel Interference , 2011, IEEE Transactions on Wireless Communications.

[23]  Deborah Estrin,et al.  An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[24]  Shih-Fu Chang,et al.  A secure and robust digital signature scheme for JPEG2000 image authentication , 2005, IEEE Transactions on Multimedia.

[25]  Chang Wen Chen,et al.  Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks , 2007, IEEE Transactions on Multimedia.

[26]  Athanasios V. Vasilakos,et al.  Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks , 2011, IEEE Journal on Selected Areas in Communications.

[27]  Klara Nahrstedt,et al.  Noninvertible watermarking methods for MPEG-encoded audio , 1998, Electronic Imaging.

[28]  Chin-Feng Lai,et al.  Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks , 2010, Mobile Networks and Applications.

[29]  Jürgen Herre,et al.  Digital Watermarking and Its Influence on Audio Quality , 1998 .

[30]  LinKai,et al.  Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks , 2012 .

[31]  Hamid Sharif,et al.  Image transmissions with security enhancement based on region and path diversity in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.