Audio Files Protection Using Logo Watermarking, Fingerprinting and Encryption

Przemysław Dymarski , Hyeseong Lee , Younjeong Jo


Logo watermarking and fingerprinting algorithms are combined with encryption for protection of audio files. Graphical signs are embedded directly in the spectrogram, and may be visualized using any audio editing software. Fingerprinting is based on long pseudorandom sequences perceptually filtered using an adaptive zero-phase filter. Fingerprints may be embedded at receiver side, if an encrypted copy of the original audio file is transmitted. Logo watermarks and fingerprints are robust to MP3 noise attacks. Fingerprints are robust to linear and some nonlinear collusion attacks (more than 20 colluders) combined with MP3 noise attacks.
Author Przemysław Dymarski (FEIT / IT)
Przemysław Dymarski,,
- The Institute of Telecommunications
, Hyeseong Lee - KyungPook National University
Hyeseong Lee,,
, Younjeong Jo - KyungPook National University
Younjeong Jo,,
Publication size in sheets0.5
Book Gleich Dušan, Planinšič Peter, Zamuda Aleš, Čučej Žarko (eds.): 25th International Conference on Systems, Signals and Image Processing - IWSSIP 2018, 2018, Institute of Electrical and Electronics Engineers, IEEE Computer Society, ISBN 978-1-5386-6979-2, [978-1-5386-6978-5, 978-1-5386-6980-8], 315 p.
2018 IWSSIP.pdf / 3.26 MB / No licence information
Keywords in EnglishAudio watermarking, Logo, Fingerprinting, Copyright protection, Fingerprint recognition, Watermarking, Spectrogram, Encryption, Low pass filters, Correlation
ProjectThe Develpment of Digital Communicatios. Project leader: Siuzdak Jerzy, , Phone: +48 22 234-7868, start date 07-06-2017, end date 30-11-2018, IT/2017/statut, Completed
WEiTI Działalność statutowa
Languageen angielski
2018 Dymarski Audio Files Protection Using Logo.pdf 2.03 MB
Score (nominal)20
Score sourcepublisherList
ScoreMinisterial score = 20.0, 02-02-2020, ChapterFromConference
Publication indicators WoS Citations = 0
Citation count*
Share Share

Get link to the record

* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Are you sure?