Paper Abstract and Keywords |
Presentation |
2016-05-20 13:15
A Novel Data Hiding Scheme into Musical Pieces by Utilizing Musical Characteristics Kan Kamada, Tetsuya Kojima (NIT, Tokyo College) IT2016-14 EMM2016-14 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Data hiding schemes using complete complementary codes (CCC) have been developed for image and audio signals. It has been shown that a high payload and a low bit-error-rate can be achieved by such data hiding strategies because of the ideal auto- and cross-correlation properties of CCC. In this study, a new data hiding strategy based on CCC is proposed by utilizing characteristics of musical pieces. In the proposed method, secret information is embedded into the specific frequency coefficients constructing the chord progression of the musical piece. If the completely same frequency coefficients as those used in the musical piece are selected to embed the secret information, they can perfectly match the pitch of the musical piece. As a result, it is expected that such a stego audio signal can be recognized by human ears as one of the components of the musical piece played on additional electronic instruments such as synthesizers. It is shown that the stego musical piece generated by the proposed method can be naturally recognized by human ears as a digital music through the subjective assessment by the practical experiment using a loud speaker. In addition, the results of the numerical experiments imply that the proposed method can transmit a large message with almost no errors even under various attacks. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
audio data hiding / complete complementary code / chord progression / musical piece / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 116, no. 34, EMM2016-14, pp. 81-86, May 2016. |
Paper # |
EMM2016-14 |
Date of Issue |
2016-05-12 (IT, EMM) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IT2016-14 EMM2016-14 |
Conference Information |
Committee |
IT EMM |
Conference Date |
2016-05-19 - 2016-05-20 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Otaru Economic Center |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Information Security, Information Theory, Information Hiding, etc. |
Paper Information |
Registration To |
EMM |
Conference Code |
2016-05-IT-EMM |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A Novel Data Hiding Scheme into Musical Pieces by Utilizing Musical Characteristics |
Sub Title (in English) |
|
Keyword(1) |
audio data hiding |
Keyword(2) |
complete complementary code |
Keyword(3) |
chord progression |
Keyword(4) |
musical piece |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Kan Kamada |
1st Author's Affiliation |
National Institute of Technology, Tokyo College (NIT, Tokyo College) |
2nd Author's Name |
Tetsuya Kojima |
2nd Author's Affiliation |
National Institute of Technology, Tokyo College (NIT, Tokyo College) |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2016-05-20 13:15:00 |
Presentation Time |
25 minutes |
Registration for |
EMM |
Paper # |
IT2016-14, EMM2016-14 |
Volume (vol) |
vol.116 |
Number (no) |
no.33(IT), no.34(EMM) |
Page |
pp.81-86 |
#Pages |
6 |
Date of Issue |
2016-05-12 (IT, EMM) |
|