Recently, several ownership protection schemes which combine encryption and secret sharing technology have been\nproposed. To reveal the original message, however, they exploited XOR operation which is similar to a one-time pad.\nIt is fairly losing the reconstruction simplicity due to the human visual system (HVS). It should be noted that it is\ncompletely different from the original concept of visual cryptography proposed by Naor and Shamir. To decrypt the\nsecret message, Naor and Shamir�s concept stacked k transparencies together. The operation solely does a visual OR\nof the shares rather than XOR, the way HVS does. In this paper, we, consequently, adopt Naor and Shamir�s concept to\napply correct theory of visual cryptography. Furthermore, audio copyright protection schemes which exploit chaotic\nmodulation or watermark integration into frequency components have been widely proposed. Nevertheless, security\nissue against intentional distortions has not been addressed yet. In this paper, we aim to construct a resilient audio\nownership protection scheme to enhance the security by integrating the discrete wavelet transform and discrete\ncosine transform, visual cryptography, and digital timestamps. In the proposed scheme, the watermark does not\nrequire to be embedded within the original audio but is used to generate a secret image and a public image. The\nwatermark is then acquired by performing OR between the secret and public image. We can alleviate the trade-off\nexpenses between the capacity of data payload and two other important properties such as imperceptibility and\nrobustness without modifying the original audio signals. The experiments against a variety of audio signals processing\nprovided by StirMark confirm superior robustness of the proposed scheme. We also demonstrate the intentional\ndistortion by modifying the original content via experiments, it reveals comparable reliability. The proposed scheme\ncan be widely applied to the area of audio ownership protection.
Loading....