Mikko Löytynoja, N. Cvejic, Eeva Lähetkangas, Tapio Seppänen MediaTeam
{"title":"Audio Encryption Using Fragile Watermarking","authors":"Mikko Löytynoja, N. Cvejic, Eeva Lähetkangas, Tapio Seppänen MediaTeam","doi":"10.1109/ICICS.2005.1689175","DOIUrl":null,"url":null,"abstract":"The main application area for digital watermarking is copyright protection. We propose a method that increases the robustness of copyright protection watermarks by persuading users not to try attacking the watermark. The method embeds two watermarks into media; a robust one and fragile one. Copy protection information is embedded into the robust watermark. The fragile watermark contains some application specific information that the user do not want to lose. The fragile watermark is constructed so that it is destroyed, if the robust watermark is attacked. The proposed method is demonstrated with a audio encryption scenario that uses the mobile phone to play protected audio files. The audio decryption keys are embedded into the fragile watermark","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"382 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 5th International Conference on Information Communications & Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICS.2005.1689175","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
The main application area for digital watermarking is copyright protection. We propose a method that increases the robustness of copyright protection watermarks by persuading users not to try attacking the watermark. The method embeds two watermarks into media; a robust one and fragile one. Copy protection information is embedded into the robust watermark. The fragile watermark contains some application specific information that the user do not want to lose. The fragile watermark is constructed so that it is destroyed, if the robust watermark is attacked. The proposed method is demonstrated with a audio encryption scenario that uses the mobile phone to play protected audio files. The audio decryption keys are embedded into the fragile watermark