UM
Secure client-side digital watermarking using optimal key selection
Jiang J.-J.; Pun C.-M.
2011-12-23
Source PublicationCommunications in Computer and Information Science
Volume266 CCIS
IssuePART 2
Pages162-168
AbstractIn this paper, we proposed an adaptive secure client-side digital audio watermarking by choosing an optimal embedding key from numerous available embedding keys for the encryption and joint decryption and watermarking procedure of the specific content. In the proposed scheme, the embedding key will determine not only the client-specific watermark content to be embedded, but also the watermarking embedding position where the watermark will be placed. It is obvious that different region of the host signal featured different characteristics, so where to embed the watermark will impact the equilibrium between two basic requirements, known as inaudibility and robustness, of watermarking development. Consequently, how to choose the embedding key for the particular content to be distributed could be of crucial significance. Simulation results show that the watermark in this scheme can survive robustly after being subjected to various common audio attacks, such as filtering, resample and so on. © 2011 Springer-Verlag.
KeywordClient-Side Embedding Digital Watermarking Key Selection LUT
DOI10.1007/978-3-642-27201-1_19
URLView the original
Language英語English
Fulltext Access
Citation statistics
Document TypeConference paper
CollectionUniversity of Macau
AffiliationUniversidade de Macau
First Author AffilicationUniversity of Macau
Recommended Citation
GB/T 7714
Jiang J.-J.,Pun C.-M.. Secure client-side digital watermarking using optimal key selection[C],2011:162-168.
APA Jiang J.-J.,&Pun C.-M..(2011).Secure client-side digital watermarking using optimal key selection.Communications in Computer and Information Science,266 CCIS(PART 2),162-168.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Jiang J.-J.]'s Articles
[Pun C.-M.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Jiang J.-J.]'s Articles
[Pun C.-M.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Jiang J.-J.]'s Articles
[Pun C.-M.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.