Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 381))

  • 951 Accesses

Abstract

In this paper, an approach has been made to authenticate an audio song in a collection of a similar one. Generating a unique signature with the help of another short length audio signal that will not be directly embedded into the original song but its encoded lower magnitude values will embed into the original song as a prime identity. Encoding hidden audio into lower magnitude values followed by embedding lower magnitude values into specified locations of magnitude values of original song in a predefined way that is not affected by its audible quality carries a secret authenticating message for quickly identifying it from similar signals. A comparative study has been made with similar existing techniques and experimental results are supported with mathematical formula based on Microsoft WAVE (“.wav”) stereo sound file.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mondal, U.Kr., Mandal, J.K.: A novel technique to protect piracy of quality songs through amplitude manipulation (PPAM). International Symposium on Electronic System Design (ISED 2010), ISBN 978-0-7695-4294-2, pp. 246–250 (2010)

    Google Scholar 

  2. Erten, G., Salam, F.: Voice output extraction by signal separation. ISCAS ’98, ISBN 07803-4455-3 3, 5–8 (1998)

    Google Scholar 

  3. Mondal, U.Kr., Mandal, J.K.: A practical approach of embedding secret key to authenticate Tagore songs (ESKATS). In: 2nd International Conference on Wireless Information Networks & Business information System (WINBIS 09), ISSN: 2091–0266, pp. 67–74 (2010)

    Google Scholar 

  4. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, ISBN 978-1-58053-035-4(2000)

    Google Scholar 

  5. Xiaoxiao, D., Mark, F., Bocko, Z.I.: Data hiding via phase manipulation of audio signals. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. 377–380 (ICASSP 2004), ISBN 0-7803-8484-9 (2004)

    Google Scholar 

  6. Blackledge et al., J.M.: Multi-channel audio information hiding. Proceedings of the 15th International Conference on Digital Audio Effects (DAFx-12), York, Sept 17–21 2012

    Google Scholar 

  7. Arnold, M.: Audio watermarking: features, applications and algorithms, In: IEEE International Conference on Multimedia and Expo, New York, 2, 1013–1016 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Uttam Kr. Mondal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Mondal, U.K., Mandal, J.K. (2016). Authentication of Audio Signals in Frequency Domain (AASF). In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 381. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2526-3_71

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2526-3_71

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2525-6

  • Online ISBN: 978-81-322-2526-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics