{"title":"音频完整性验证的数字水印","authors":"Rade PetrovicI","doi":"10.1109/TELSKS.2005.1572095","DOIUrl":null,"url":null,"abstract":"This paper proposes a new method of detecting and locating manipulations of audio recordings, such as cuts, inserts, replacements or muting of selected audio segments. The objective is to verify (or dispute) integrity of audio recording in business applications (such as business conducted over the phone), court depositions, journalistic interviews, etc. We assume that embedders are public, residing within audio recorders, while extractors are secure (forensic). For this application we propose a combination of watermarks, including spread spectrum and replica watermarks, resulting in high robustness to erasure and overwriting attacks, and good localization of modified intervals. We also propose pseudo-random stego key hopping as protection against overwrite attacks. Finally, we discuss possible alternative applications of the proposed techniques.","PeriodicalId":422115,"journal":{"name":"TELSIKS 2005 - 2005 uth International Conference on Telecommunication in ModernSatellite, Cable and Broadcasting Services","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Digital watermarks for audio integrity verification\",\"authors\":\"Rade PetrovicI\",\"doi\":\"10.1109/TELSKS.2005.1572095\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a new method of detecting and locating manipulations of audio recordings, such as cuts, inserts, replacements or muting of selected audio segments. The objective is to verify (or dispute) integrity of audio recording in business applications (such as business conducted over the phone), court depositions, journalistic interviews, etc. We assume that embedders are public, residing within audio recorders, while extractors are secure (forensic). For this application we propose a combination of watermarks, including spread spectrum and replica watermarks, resulting in high robustness to erasure and overwriting attacks, and good localization of modified intervals. We also propose pseudo-random stego key hopping as protection against overwrite attacks. Finally, we discuss possible alternative applications of the proposed techniques.\",\"PeriodicalId\":422115,\"journal\":{\"name\":\"TELSIKS 2005 - 2005 uth International Conference on Telecommunication in ModernSatellite, Cable and Broadcasting Services\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"TELSIKS 2005 - 2005 uth International Conference on Telecommunication in ModernSatellite, Cable and Broadcasting Services\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TELSKS.2005.1572095\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"TELSIKS 2005 - 2005 uth International Conference on Telecommunication in ModernSatellite, Cable and Broadcasting Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TELSKS.2005.1572095","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Digital watermarks for audio integrity verification
This paper proposes a new method of detecting and locating manipulations of audio recordings, such as cuts, inserts, replacements or muting of selected audio segments. The objective is to verify (or dispute) integrity of audio recording in business applications (such as business conducted over the phone), court depositions, journalistic interviews, etc. We assume that embedders are public, residing within audio recorders, while extractors are secure (forensic). For this application we propose a combination of watermarks, including spread spectrum and replica watermarks, resulting in high robustness to erasure and overwriting attacks, and good localization of modified intervals. We also propose pseudo-random stego key hopping as protection against overwrite attacks. Finally, we discuss possible alternative applications of the proposed techniques.