SCIRP Mobile Website
Paper Submission

Why Us? >>

  • - Open Access
  • - Peer-reviewed
  • - Rapid publication
  • - Lifetime hosting
  • - Free indexing service
  • - Free promotion service
  • - More citations
  • - Search engine friendly

Free SCIRP Newsletters>>

Add your e-mail address to receive free newsletters from SCIRP.

 

Contact Us >>

Article citations

More>>

M. Tanaka and Y. Yoshitomi, “Optimization Problem for Embedding Position in an Audio Watermarking Based on Logarithmic Amplitude Modification for Rea-lizing High Tolerance to MP3 Compression,” In Abstracts of Autumn Research Presentation Forums of ORSJ, In Japanese, September 2006, pp. 70-71.

has been cited by the following article:

  • TITLE: An Authentication Method for Digital Audio Using a Discrete Wavelet Transform

    AUTHORS: Yasunari Yoshitomi, Taro Asada, Yohei Kinugawa, Masayoshi Tabuse

    KEYWORDS: Authentication, Audio, Copyright Protection, Tolerance to Compression, Wavelet Transforms

    JOURNAL NAME: Journal of Information Security, Vol.2 No.2, April 8, 2011

    ABSTRACT: Recently, several digital watermarking techniques have been proposed for hiding data in the frequency domain of audio files in order to protect their copyrights. In general, there is a tradeoff between the quality of watermarked audio and the tolerance of watermarks to signal processing methods, such as compression. In previous research, we simultaneously improved the performance of both by developing a multipurpose optimization problem for deciding the positions of watermarks in the frequency domain of audio data and obtaining a near-optimum solution to the problem. This solution was obtained using a wavelet transform and a genetic algorithm. However, obtaining the near-optimum solution was very time consuming. To overcome this issue essentially, we have developed an authentication method for digital audio using a discrete wavelet transform. In contrast to digital watermarking, no additional information is inserted into the original audio by the proposed method, and the audio is authenticated using features extracted by the wavelet transform and characteristic coding in the proposed method. Accordingly, one can always use copyright-protected original audio. The experimental results show that the method has high tolerance of authentication to all types of MP3, AAC, and WMA compression. In addition, the processing time of the method is acceptable for every-day use.