Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity

Digital watermarking is a growing research area to mark digital content (image, audio, video, etc.) by embedding information into the content itself. This technique opens or provides additional and useful features for many application fields (like DRM, annotation, integrity proof and many more). The role of watermarking algorithm evaluation (in a broader sense benchmarking) is to provide a fair and automated analysis of a specific approach if it can fulfill certain application requirements and to perform a comparison with different or similar approaches. Today most algorithm designers use their own methodology and therefore the results are hardly comparable. Derived from the variety of actually presented evaluation procedures in this paper, firstly we introduce a theoretical framework for digital robust watermarking algorithms where we focus on the triangle of robustness, transparency and capacity. The main properties and measuring methods are described. Secondly, a practical environment shows the predefined definition and introduces the practical relevance needed for robust audio watermarking benchmarking. Our goal is to provide a more partial precise methodology to test and compare watermarking algorithms. The hope is that watermarking algorithm designers will use our introduced methodology for testing their algorithms to allow a comparison with existing algorithms more easily. Our work should be seen as a scalable and improvable attempt for a formalization of a benchmarking methodology in the triangle of transparency, capacity and robustness.

[1]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[2]  Josep Domingo-Ferrer,et al.  Simple collusion-secure fingerprinting schemes for images , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[3]  Jana Dittmann,et al.  Audio watermark attacks: from single to profile attacks , 2005, MM&Sec '05.

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  Jana Dittmann,et al.  Profiles for evaluation: the usage of audio WET , 2006, Electronic Imaging.

[6]  Edward J. Delp,et al.  Application-oriented audio watermark benchmark service , 2005, IS&T/SPIE Electronic Imaging.

[7]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[8]  David Megías,et al.  An audio watermarking scheme robust against stereo attacks , 2004, MM&Sec '04.

[9]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[10]  Narendra Ahuja,et al.  A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[11]  Fernando Pérez-González,et al.  Information-Theoretic Analysis of Security in Side-Informed Data Hiding , 2005, Information Hiding.

[12]  A. J. Jerri The Shannon sampling theorem—Its various extensions and applications: A tutorial review , 1977, Proceedings of the IEEE.

[13]  渡辺馨 Objective measurement method of audio quality in accordance with ITU-R Recommendation BS. 1387 , 2001 .

[14]  Akihiro Yamamoto,et al.  A Digital Watermark Technique Based on the Wavelet Transform and Its Robustness on Image Compression and Transformation , 1999 .

[15]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[16]  J. Dittmann,et al.  StirMark and profiles : from high end up to preview scenarios , 2004 .

[17]  Edward J. Delp,et al.  Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.

[18]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[19]  Jiri Fridrich,et al.  Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[20]  David Megías,et al.  A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression , 2003, Communications and Multimedia Security.

[21]  David Megías,et al.  Robust Frequency Domain Audio Watermarking: A Tuning Analysis , 2004, IWDW.

[22]  Nazim Fatès,et al.  Public automated web-based evaluation service for watermarking schemes: StirMark benchmark , 2001, IS&T/SPIE Electronic Imaging.

[23]  Jerome M. Shapiro,et al.  Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..

[24]  Teddy Furon,et al.  Watermarking security part two: Practice , 2005, IS&T/SPIE Electronic Imaging.

[25]  A. Lang,et al.  Multimodal Speaker Authentication – Evaluation of Recognition Performance of Watermarked , 2006 .

[26]  Jana Dittmann,et al.  Transparency benchmarking on audio watermarks and steganography , 2006, Electronic Imaging.

[27]  Jana Dittmann,et al.  Digital watermarking of biometric speech references: impact to the EER system performance , 2007, Electronic Imaging.

[28]  Margaret King,et al.  Evaluation of natural language processing systems , 1991 .

[29]  Teddy Furon,et al.  Watermarking security part one: Theory , 2005, IS&T/SPIE Electronic Imaging.

[30]  Jana Dittmann,et al.  Advanced audio watermarking benchmarking , 2004, IS&T/SPIE Electronic Imaging.