The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei...The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.展开更多
The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist ...The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist Rotation, Scale and Translation (RST) attacks. The watermark is embedded into a domain obtained by taking Radon transform of a circular area selected from the original image, and then extracting Two-Dimensional (2-D) Fourier magnitude of the Radon transformed image. Furthermore, to prevent the watermarked image from degrading due to inverse Radon transform, watermark signal is inversely Radon transformed individually. Experimental results demonstrate that the proposed scheme is able to withstand a variety of attacks including common geometric attacks.展开更多
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio ...Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio sections.Taking use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio segments.Then,it extracts the audio profile,i.e.the zero-watermark,according to the relative size of energies of consecutive fragments.The experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness.展开更多
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ...To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.展开更多
To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is int...To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is introduced into the design of robust watermarking algorithm to ensure the transparency and to avoid the interference between the robust watermark and the semi-fragile watermark. The property of natural audio that the VQ indices of DWT-DCT coefficients among neighboring frames tend to be very similar is utilized to extract essential feature from the host audio, which is then used for watermark ex-traction. And, the chaotic mapping based semi-fragile watermark is embedded in the detail wavelet coefficients based on the instantaneous mixing model of the independent component analysis (ICA) system. Both the robust and semi-fragile watermarks can be extracted blindly and the semi-fragile watermarking algorithm can localize the tampering accurately. Simulation results demonstrate the effectiveness of our algorithm in terms of transparency, security, robustness and tampering localization ability.展开更多
A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided in...A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided into two parts for embedding the visible and invisible watermarks. The visible watermark is embedded in each DC DCT coefficient and most of the AC DCT coefficients of every block, and the invisible watermark in the rest. Based on the characteristics of Human Visual System (HVS), the embedding strength of the visible watermark is varied in accordance with the underlying content of the host image. The invisible watermark is embedded in a quaternity of midrange frequencies. Experimental results show that the visible watermark is hard to remove and the invisible watermark is robust to common digital signal processing operations.展开更多
In this paper, a novel localized audio watermarking scheme based on signal to noise ratio (SNR) to determine a scaling parameter a is proposed. The basic idea is to embed watermark in selected high inflexion regions...In this paper, a novel localized audio watermarking scheme based on signal to noise ratio (SNR) to determine a scaling parameter a is proposed. The basic idea is to embed watermark in selected high inflexion regions, and the intensity of embedded watermarks are modified by adaptively adjusting a. As these high inflexion local regions usually correspond to music edges like sound of percussion instruments, explosion or transition of mixed music, which represent the music rhythm or tempo and are very important to human auditory perception, the embedded watermark is especially expected to escape the distortions caused by time domain synchronization attacks. Taking advantage of localization and SNR, the method shows strong robustness against common problems in audio signal processing, random cropping, time scale modification, etc.展开更多
This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individua...This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individual pixels, which entitles the watermark with imperceptibility and high robustness. A class of 1-D Markov chaotic maps is employed to perform image block mixing and watermark encryption ensures security of the system. To prove the validity of this proposed scheme, some objective comparisons with the popular spread spectrum scheme were also presented. The simulation results show that this scheme can survive processing such as high-ratio JPEG compression, Gaussian noise pollution and histogram equalization.展开更多
Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, i...Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, it is presented that in wavelet domain watermarking, the associated wavelet can be considered as the private key for encrypting the watermark so as to enhance the security of the embedded mark. This idea is partly supported by the fact that from computational complexity viewpoint, it is very time-consuming to search over the immense set of all candidate wavelets for the right one if no a priori knowledge is known about it. To verify our proposal, the standard image 'Lena' is first watermarked in a specific wavelet domain, the watermark recovery experiments are then conducted in the wavelet domain for a set of wavelets with the one used for mark embedded in it,separately. It follows from the experimental results that the mark can be recovered only in the right wavelet domain, which justifies the suggestion.展开更多
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em...Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires.展开更多
Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. Th...Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. This paper presents the results obtained from onsite testing that aimed at evaluating the treatment in terms of its aesthetic performance, the depth of treatment, the mechanical properties of the consolidated stone and the influence on water transport. To this end, the testing program included colorimetry, DRMS (drilling resistance measurement system) and water absorption through the contact sponge method. This study is Part One of the final phase of a wider research program which included two previous phases progressing from treating this same very porous stone type in a laboratory-based controlled environment to uncontrolled site conditions, seeking to quantify this treatment's effectiveness in the field. Results showed that onsite consolidation was achieved and that although some changes in colour and water absorption were brought about by the treatment, these were within acceptable tolerance limits. Besides carrying out these treatments and evaluations directly on the coast, this study anticipates further studies which will look at rural and urban sites where the types and concentrations of salts are expected to be different.展开更多
This paper deals with intellectual property protection problems in the information society, when it is so easy to access unauthorised content (to pirate). Society does not care much about the damages of right owners...This paper deals with intellectual property protection problems in the information society, when it is so easy to access unauthorised content (to pirate). Society does not care much about the damages of right owners. Internet is often considered as a "public place", and works on Internet are considered as "displayed in public places" from which a lawful restriction of rights is permitted. It promotes unfair competition and hinders the development of sustainable business. Lawful use of protected copyright content is a tool for ensuring equal and sustainable competition level among entrepreneurs. On Internet, there are many copyright-protected works available. Many members of society wish to get an access to these works, which means that a solution should be found. For private and non-commercial use, there should be reasonable limitations. Combating piracy on Intemet using enforcement tools alone does not yield results. Piracy should be placed in a frame accepted by a civilized society, and the society and authors should get the maximum benefits from it.展开更多
Using copyright rules clear government of geological information property rights is the main path to realization of geological information socially sharing. For China's current laws have an institute basic principle ...Using copyright rules clear government of geological information property rights is the main path to realization of geological information socially sharing. For China's current laws have an institute basic principle of geological information protected by copyright law, we need to detailed thinking the copyright subject, write content, licensing and other aspects, combine the geological information sharing mechanism.展开更多
This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneous...This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneously meet all the four requirements(robustness,security,imperceptibility,and capacity)of a good watermarking scheme.The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet.To do so,different approaches are combined in a way that the four requirements are achieved.For instance,to obtain imperceptibility,the three color channels(red,green,and blue)are de-correlated using principal component analysis,and the first principal component(de-correlated red channel)is chosen for watermark embedding.Afterwards,to achieve robustness,the de-correlated channel is decomposed using a discrete wavelet transform(DWT),and the approximate band(the other three bands are kept intact to preserve the edge information)is further decomposed into distinct blocks.The random blocks are chosen based on a random generated key.The random selected blocks are further broken down into singular values and vectors.Based on the mutual dependency on singular values and vectors’matrices,the values are modified depending on the watermarking bits,and their locations are saved and used as another key,required when the watermark is to be extracted.Consequently,two-level authentication levels ensure the security,and using both singular values and vectors increases the capacity of the presented scheme.Moreover,the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme.Finally,to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility(peak signal-to-noise ratio and structural similarity index),security(with numerous fake keys),robustness(normalized correlation and bit error rate),and capacity,the Gonzalez and Kodak datasets are used.The comparison shows significant improvement of the proposed scheme over existing schemes.展开更多
Rapid growth in information technology and computer networks has resulted in the universal use of data transmission in the digital domain. However, the major challenge faced by digital data owners is protection of dat...Rapid growth in information technology and computer networks has resulted in the universal use of data transmission in the digital domain. However, the major challenge faced by digital data owners is protection of data against unauthorized copying and distribution. Digital watermark technology is starting to be considered a credible protection method to mitigate the potential challenges that undermine the efficiency of the system. Digital audio watermarking should retain the quality of the host signal in a way that remains inaudible to the human hearing system. It should be sufficiently robust to be resistant against potential attacks, One of the major deficiencies of conventional audio watermarking techniques is the use of non-intelligent decoders in which some sets of specific rules are used for watermark extraction. This paper presents a new robust intelligent audio water- marking scheme using a synergistic combination of singular value decomposition (SVD) and support vector machine (SVM). The methodology involves embedding a watermark data by modulating the singular values in the SVD transform domain. In the extraction process, an intelligent detector using SVM is suggested for extracting the watermark data. By learning the destructive effects of noise, the detector in question can effectively retrieve the watermark. Diverse experiments under various conditions have been carried out to verify the performance of the proposed scheme. Experimental results showed better imperceptibility, higher robustness, lower payload, and higher operational efficiency, for the proposed method than for conventional techniques.展开更多
文摘The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.
文摘The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist Rotation, Scale and Translation (RST) attacks. The watermark is embedded into a domain obtained by taking Radon transform of a circular area selected from the original image, and then extracting Two-Dimensional (2-D) Fourier magnitude of the Radon transformed image. Furthermore, to prevent the watermarked image from degrading due to inverse Radon transform, watermark signal is inversely Radon transformed individually. Experimental results demonstrate that the proposed scheme is able to withstand a variety of attacks including common geometric attacks.
基金This work is supported by the National Natural Science Foundation of China under Grant No. 61170269, No. 61170272, No. 61202082, Beijing Natural Science Foundation under Grant No. 4122026, the Fundamental Research Funds for the Central Universities under Grant No. BUPT2013RC0308, No. BUPT2013RC0311, and Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No. KM201210015007, KM201210015006.
文摘Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio sections.Taking use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio segments.Then,it extracts the audio profile,i.e.the zero-watermark,according to the relative size of energies of consecutive fragments.The experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness.
文摘To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.
文摘To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is introduced into the design of robust watermarking algorithm to ensure the transparency and to avoid the interference between the robust watermark and the semi-fragile watermark. The property of natural audio that the VQ indices of DWT-DCT coefficients among neighboring frames tend to be very similar is utilized to extract essential feature from the host audio, which is then used for watermark ex-traction. And, the chaotic mapping based semi-fragile watermark is embedded in the detail wavelet coefficients based on the instantaneous mixing model of the independent component analysis (ICA) system. Both the robust and semi-fragile watermarks can be extracted blindly and the semi-fragile watermarking algorithm can localize the tampering accurately. Simulation results demonstrate the effectiveness of our algorithm in terms of transparency, security, robustness and tampering localization ability.
文摘A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided into two parts for embedding the visible and invisible watermarks. The visible watermark is embedded in each DC DCT coefficient and most of the AC DCT coefficients of every block, and the invisible watermark in the rest. Based on the characteristics of Human Visual System (HVS), the embedding strength of the visible watermark is varied in accordance with the underlying content of the host image. The invisible watermark is embedded in a quaternity of midrange frequencies. Experimental results show that the visible watermark is hard to remove and the invisible watermark is robust to common digital signal processing operations.
基金Project supported by the National Natural Science Foundation of China (No. 60272031), the National Basic Research Program (973)of China (No. 2002CB312101), Zhejiang Provincial Natural ScienceFoundation (No. ZD0212), Doctorate Research Foundation of theState Education Commission of China (No. 20010335049), and theState Education Commission Foundation for Scholars Returned fromOverseas, China
文摘In this paper, a novel localized audio watermarking scheme based on signal to noise ratio (SNR) to determine a scaling parameter a is proposed. The basic idea is to embed watermark in selected high inflexion regions, and the intensity of embedded watermarks are modified by adaptively adjusting a. As these high inflexion local regions usually correspond to music edges like sound of percussion instruments, explosion or transition of mixed music, which represent the music rhythm or tempo and are very important to human auditory perception, the embedded watermark is especially expected to escape the distortions caused by time domain synchronization attacks. Taking advantage of localization and SNR, the method shows strong robustness against common problems in audio signal processing, random cropping, time scale modification, etc.
基金Natural Science Foundation of China( No.60 2 72 0 82 ) and Hi-Tech R&D Program of China ( No.2 0 0 2 AA14 4110
文摘This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individual pixels, which entitles the watermark with imperceptibility and high robustness. A class of 1-D Markov chaotic maps is employed to perform image block mixing and watermark encryption ensures security of the system. To prove the validity of this proposed scheme, some objective comparisons with the popular spread spectrum scheme were also presented. The simulation results show that this scheme can survive processing such as high-ratio JPEG compression, Gaussian noise pollution and histogram equalization.
基金Funded by the visit scholar Foundation of the Electrooptical Technique & System key Lab of Chinese Ministry of Education in Chongqing.
文摘Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, it is presented that in wavelet domain watermarking, the associated wavelet can be considered as the private key for encrypting the watermark so as to enhance the security of the embedded mark. This idea is partly supported by the fact that from computational complexity viewpoint, it is very time-consuming to search over the immense set of all candidate wavelets for the right one if no a priori knowledge is known about it. To verify our proposal, the standard image 'Lena' is first watermarked in a specific wavelet domain, the watermark recovery experiments are then conducted in the wavelet domain for a set of wavelets with the one used for mark embedded in it,separately. It follows from the experimental results that the mark can be recovered only in the right wavelet domain, which justifies the suggestion.
文摘Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires.
文摘Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. This paper presents the results obtained from onsite testing that aimed at evaluating the treatment in terms of its aesthetic performance, the depth of treatment, the mechanical properties of the consolidated stone and the influence on water transport. To this end, the testing program included colorimetry, DRMS (drilling resistance measurement system) and water absorption through the contact sponge method. This study is Part One of the final phase of a wider research program which included two previous phases progressing from treating this same very porous stone type in a laboratory-based controlled environment to uncontrolled site conditions, seeking to quantify this treatment's effectiveness in the field. Results showed that onsite consolidation was achieved and that although some changes in colour and water absorption were brought about by the treatment, these were within acceptable tolerance limits. Besides carrying out these treatments and evaluations directly on the coast, this study anticipates further studies which will look at rural and urban sites where the types and concentrations of salts are expected to be different.
文摘This paper deals with intellectual property protection problems in the information society, when it is so easy to access unauthorised content (to pirate). Society does not care much about the damages of right owners. Internet is often considered as a "public place", and works on Internet are considered as "displayed in public places" from which a lawful restriction of rights is permitted. It promotes unfair competition and hinders the development of sustainable business. Lawful use of protected copyright content is a tool for ensuring equal and sustainable competition level among entrepreneurs. On Internet, there are many copyright-protected works available. Many members of society wish to get an access to these works, which means that a solution should be found. For private and non-commercial use, there should be reasonable limitations. Combating piracy on Intemet using enforcement tools alone does not yield results. Piracy should be placed in a frame accepted by a civilized society, and the society and authors should get the maximum benefits from it.
文摘Using copyright rules clear government of geological information property rights is the main path to realization of geological information socially sharing. For China's current laws have an institute basic principle of geological information protected by copyright law, we need to detailed thinking the copyright subject, write content, licensing and other aspects, combine the geological information sharing mechanism.
文摘This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneously meet all the four requirements(robustness,security,imperceptibility,and capacity)of a good watermarking scheme.The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet.To do so,different approaches are combined in a way that the four requirements are achieved.For instance,to obtain imperceptibility,the three color channels(red,green,and blue)are de-correlated using principal component analysis,and the first principal component(de-correlated red channel)is chosen for watermark embedding.Afterwards,to achieve robustness,the de-correlated channel is decomposed using a discrete wavelet transform(DWT),and the approximate band(the other three bands are kept intact to preserve the edge information)is further decomposed into distinct blocks.The random blocks are chosen based on a random generated key.The random selected blocks are further broken down into singular values and vectors.Based on the mutual dependency on singular values and vectors’matrices,the values are modified depending on the watermarking bits,and their locations are saved and used as another key,required when the watermark is to be extracted.Consequently,two-level authentication levels ensure the security,and using both singular values and vectors increases the capacity of the presented scheme.Moreover,the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme.Finally,to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility(peak signal-to-noise ratio and structural similarity index),security(with numerous fake keys),robustness(normalized correlation and bit error rate),and capacity,the Gonzalez and Kodak datasets are used.The comparison shows significant improvement of the proposed scheme over existing schemes.
基金Project supported by the Dezfoul Branch,Islamic Azad University,Dezfoul,Iran
文摘Rapid growth in information technology and computer networks has resulted in the universal use of data transmission in the digital domain. However, the major challenge faced by digital data owners is protection of data against unauthorized copying and distribution. Digital watermark technology is starting to be considered a credible protection method to mitigate the potential challenges that undermine the efficiency of the system. Digital audio watermarking should retain the quality of the host signal in a way that remains inaudible to the human hearing system. It should be sufficiently robust to be resistant against potential attacks, One of the major deficiencies of conventional audio watermarking techniques is the use of non-intelligent decoders in which some sets of specific rules are used for watermark extraction. This paper presents a new robust intelligent audio water- marking scheme using a synergistic combination of singular value decomposition (SVD) and support vector machine (SVM). The methodology involves embedding a watermark data by modulating the singular values in the SVD transform domain. In the extraction process, an intelligent detector using SVM is suggested for extracting the watermark data. By learning the destructive effects of noise, the detector in question can effectively retrieve the watermark. Diverse experiments under various conditions have been carried out to verify the performance of the proposed scheme. Experimental results showed better imperceptibility, higher robustness, lower payload, and higher operational efficiency, for the proposed method than for conventional techniques.