Share Email Print

Proceedings Paper

Profiles for evaluation: the usage of audio WET
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

The evaluation of digital watermarks is an active and important research area. From the variety there are different types of attacks like geometric attacks, lossy compression, security or protocol attacks [1, 2] available to evaluate the robustness of digital watermarks. Furthermore, different attack strategies like single attacks or profile attacks are known to improve the evaluation process [3]. If for example, the robustness of a watermarking algorithm is evaluated, then the signal of the audio content and the embedded watermark is modified with the goal to remove or weaken the watermark information. In this paper, the focus is set on audio signals. We introduce the evaluation process of an existing benchmark service, the Audio Watermark Evaluation Testbed (Audio WET) [4] by evaluating five different audio watermarking algorithms, which work in time, frequency and wavelet domain. Therefore, we introduce basic, extended and application profiles which improve the evaluation of watermarking algorithms to provide comparability. Whereas the basic profiles measure single properties on a watermarking algorithm, the extended and application profiles reflect real world application scenarios. Furthermore a test scenario and test environment for the evaluation of five audio watermarking algorithms by using basic profiles is described and discussed. The test results of the first evaluation by using basic profiles are introduced and a comparison of the evaluated watermarking algorithms using different parameter sets for embedding function is provided.

Paper Details

Date Published: 17 February 2006
PDF: 13 pages
Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60721J (17 February 2006); doi: 10.1117/12.642695
Show Author Affiliations
Andreas Lang, Otto-von-Guericke Univ. of Magdeburg (Germany)
Jana Dittmann, Otto-von-Guericke Univ. of Magdeburg (Germany)

Published in SPIE Proceedings Vol. 6072:
Security, Steganography, and Watermarking of Multimedia Contents VIII
Edward J. Delp III; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?