Proceedings International Conference on Information Technology: Coding and Computing
DOI: 10.1109/itcc.2001.918764
|View full text |Cite
|
Sign up to set email alerts
|

StirMark benchmark: audio watermarking attacks

Abstract: In this paper we will briefly present the architecture of a public automated evaluation service we are developing for still images, sound and video.We will also detail new tests that will be included in this platform. The set of tests is related to audio data and addresses the usual equalisation and normalisation but also time stretching, pitch shifting and specially designed audio attack algorithms. These attacks are discussed and results on watermark attacks and perceived quality after applying the attacks a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(46 citation statements)
references
References 5 publications
0
46
0
Order By: Relevance
“…In this paper the average function (p = 1 in Eq. (4)) is considered as function g. RDM in audio signals was carried out using frames with 128 MCLT coefficients instead of single samples in order to get a robust scheme not only to gain attacks but also to typical attacks in data hiding systems, such as the Audio Stirmark benchmark test [5].…”
Section: Proposed Data Hiding Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper the average function (p = 1 in Eq. (4)) is considered as function g. RDM in audio signals was carried out using frames with 128 MCLT coefficients instead of single samples in order to get a robust scheme not only to gain attacks but also to typical attacks in data hiding systems, such as the Audio Stirmark benchmark test [5].…”
Section: Proposed Data Hiding Systemmentioning
confidence: 99%
“…This evaluation was carried out using 5 different kinds of music with the following results: for classic music −63.2 dB, for rock music −65.3, for pop music −62.8 dB, for instrumental music −61.7 and finally for latin music −62.5 dB. Table I shows the bit error rate (BER) of extracted hidden data after the Audio Stirmark attacks [5] are applied. Generally, the embedded data are robust to various types of attacks, except copysample, cutsample, echo, ffttest, flippsample and voiceremove attacks.…”
Section: Mbsd (Modified Bark Spectral Distortion)mentioning
confidence: 99%
“…A single change in spatial domain may alter the values of all coefficients in the transform domain. A full coverage protection is then possible [17].…”
Section: 4mentioning
confidence: 99%
“…A detailed categorization of different attacks is described in [11]. Experiments were performed [53] to test if each attack can itself degrade perception of audio quality. A conclusion drawn was that the perceptual impact of the attack on audio quality is highly dependent on the attacked material.…”
Section: Robustnessmentioning
confidence: 99%