DOI QR코드

DOI QR Code

A digital Audio Watermarking Algorithm using 2D Barcode

2차원 바코드를 이용한 오디오 워터마킹 알고리즘

  • 배경율 (상명대학교 소프트웨어대학 컴퓨터과학부)
  • Received : 2011.05.03
  • Accepted : 2011.06.08
  • Published : 2011.06.30

Abstract

Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

본 논문에서는 2차원 바코드를 이용한 오디오 워터마킹 알고리즘을 제안하였다. 삽입되는 워터마크 정보로는 2차원 바코드인 QR 코드를 변형하여 이용하였다. 2차원 바코드가 1차원 바코드에 비하여 많은 정보를 표현할 수 있고, 코드자체가 에러 보정능력을 내재하고 있는 장점을 이용하여 워터마킹 알고리즘의 견고성을 높였다. 또한 부분적인 워터마크 정보의 손실에 대응하기 위하여 직교코드를 이용하여 삽입대역을 확산했으며, 삽입강도 0.7에서 50dB 이상의 우수한 품질을 확보할 수 있었다.

Keywords

References

  1. 이영석, 김종원, "웨이블릿 평면에서의 2D-EMD를 이용한 디지털 영상의 블라인드 워터마킹 기술에 관한 연구", 한국인터넷정보학회 논문지, 11권 2호(2010), 113-122.
  2. Chor, B., A. Fiat, M. Naor and B. Pinkas, "Tracing traitors", IEEE Trans, Inform, Theory, Vol. 46(2000), 893-910. https://doi.org/10.1109/18.841169
  3. Kang Hyeon RHEE, "Detection of Colluded Multimedia Fingerprint using LDPC and BIBD", Electronics Engineering korea, Vol.43-5(CI), (2006).
  4. Ruisong Ye, Haiyong Liao, "A Simple Generation Method for Walsh Transformaton Matrix and Its Applicaton", Jourmal of Communication and Computer, USA, (2005), 21-25.
  5. Stone, H., "Analysis of Attacks on Image Watermarks with Randomized Coefficients", NEC Technical Peport, (1996).