{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:32:05Z","timestamp":1760149925701,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:00:00Z","timestamp":1695945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science and Technology Council, Taiwan","award":["NSTC 112-2221-E-197-026"],"award-info":[{"award-number":["NSTC 112-2221-E-197-026"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Watermarking is a viable approach for safeguarding the proprietary rights of digital media. This study introduces an innovative fast Fourier transform (FFT)-based phase modulation (PM) scheme that facilitates efficient and effective blind audio watermarking at a remarkable rate of 508.85 numeric values per second while still retaining the original quality. Such a payload capacity makes it possible to embed a full-color image of 64 \u00d7 64 pixels within an audio signal of just 24.15 s. To bolster the security of watermark images, we have also implemented the Arnold transform in conjunction with chaotic encryption. Our comprehensive analysis and evaluation confirm that the proposed FFT\u2013PM scheme exhibits exceptional imperceptibility, rendering the hidden watermark virtually undetectable. Additionally, the FFT\u2013PM scheme shows impressive robustness against common signal-processing attacks. To further enhance the visual rendition of the recovered color watermarks, we propose using residual neural networks to perform image denoising and super-resolution reconstruction after retrieving the watermarks. The utilization of the residual networks contributes to noticeable improvements in perceptual quality, resulting in higher levels of zero-normalized cross-correlation in cases where the watermarks are severely damaged.<\/jats:p>","DOI":"10.3390\/cryptography7040047","type":"journal-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T07:42:08Z","timestamp":1695973328000},"page":"47","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hiding Full-Color Images into Audio with Visual Enhancement via Residual Networks"],"prefix":"10.3390","volume":"7","author":[{"given":"Hwai-Tsu","family":"Hu","sequence":"first","affiliation":[{"name":"Department of Electronic Engineering, National I-Lan University, No. 1, Sec. 1, Shen-Lung Road, I-Lan 26047, Taiwan"}]},{"given":"Tung-Tsun","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, National I-Lan University, No. 1, Sec. 1, Shen-Lung Road, I-Lan 26047, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"12654","DOI":"10.1109\/ACCESS.2022.3145950","article-title":"Audio Watermarking for Security and Non-Security Applications","volume":"10","author":"Charfeddine","year":"2022","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.sigpro.2016.04.005","article-title":"Twenty years of digital audio watermarking\u2014A comprehensive review","volume":"128","author":"Hua","year":"2016","journal-title":"Signal Process."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.sigpro.2014.11.011","article-title":"Robust, transparent and high-capacity audio watermarking in DCT domain","volume":"109","author":"Hu","year":"2015","journal-title":"Signal Process."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"4835","DOI":"10.1109\/TSP.2006.881258","article-title":"A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT","volume":"54","author":"Wang","year":"2006","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1109\/TASLP.2014.2328175","article-title":"Patchwork-Based Audio Watermarking Method Robust to De-synchronization Attacks","volume":"22","author":"Xiang","year":"2014","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"764030","DOI":"10.1155\/S1110865703208027","article-title":"Audio Watermarking Based on HAS and Neural Networks in DCT Domain","volume":"2003","author":"Tsai","year":"2003","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_7","first-page":"2477","article-title":"High capacity robust audio watermarking scheme based on FFT and linear regression","volume":"8","author":"Fallahpour","year":"2012","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3078","DOI":"10.1016\/j.sigpro.2010.05.012","article-title":"Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification","volume":"90","author":"Fallahpour","year":"2010","journal-title":"Signal Process."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1455","DOI":"10.1016\/S0165-1684(02)00284-0","article-title":"An audio watermarking method using a two-dimensional pseudo-random array","volume":"82","author":"Tachibana","year":"2002","journal-title":"Signal Process."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TMM.2005.861291","article-title":"Localized audio watermarking technique robust against time-scale modification","volume":"8","author":"Li","year":"2006","journal-title":"IEEE Trans. Multimed."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1016\/j.sigpro.2012.11.003","article-title":"A norm-space, adaptive, and blind audio watermarking algorithm by discrete wavelet transform","volume":"93","author":"Wang","year":"2013","journal-title":"Signal Process."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1007\/s00034-015-0074-9","article-title":"A DWT-Based Rational Dither Modulation Scheme for Effective Blind Audio Watermarking","volume":"35","author":"Hu","year":"2016","journal-title":"Circuits Syst. Signal Process."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1016\/j.dsp.2012.08.006","article-title":"A learning-based audio watermarking scheme using kernel Fisher discriminant analysis","volume":"23","author":"Peng","year":"2013","journal-title":"Digit. Signal Process."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.dsp.2014.04.014","article-title":"Variable-dimensional vector modulation for perceptual-based DWT blind audio watermarking with adjustable payload capacity","volume":"31","author":"Hu","year":"2014","journal-title":"Digit. Signal Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1547","DOI":"10.1016\/j.dsp.2010.02.006","article-title":"An adaptive audio watermarking based on the singular value decomposition in the wavelet domain","volume":"20","author":"Bhat","year":"2010","journal-title":"Digit. Signal Process."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1973","DOI":"10.1016\/j.sigpro.2011.03.001","article-title":"Blind and robust audio watermarking scheme based on SVD\u2013DCT","volume":"91","author":"Lei","year":"2011","journal-title":"Signal Process."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1186\/1687-6180-2014-12","article-title":"Incorporation of perceptually adaptive QIM with singular value decomposition for blind audio watermarking","volume":"2014","author":"Hu","year":"2014","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/18.923725","article-title":"Quantization index modulation: A class of provably good methods for digital watermarking and information embedding","volume":"47","author":"Chen","year":"2001","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2083","DOI":"10.1109\/JPROC.2005.859599","article-title":"Data-Hiding Codes","volume":"93","author":"Moulin","year":"2005","journal-title":"Proc. IEEE"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","volume":"6","author":"Cox","year":"1997","journal-title":"IEEE Trans. Image Process."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/6046.923822","article-title":"Robust audio watermarking in the time domain","volume":"3","author":"Bassia","year":"2001","journal-title":"IEEE Trans. Multimed."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2228","DOI":"10.1109\/TASLP.2015.2476755","article-title":"Spread Spectrum-Based High Embedding Capacity Watermarking Method for Audio Signals","volume":"23","author":"Xiang","year":"2015","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TIFS.2011.2173678","article-title":"A Dual-Channel Time-Spread Echo Method for Audio Watermarking","volume":"7","author":"Xiang","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TASLP.2014.2387385","article-title":"Time-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness","volume":"23","author":"Hua","year":"2015","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1109\/TASL.2009.2019259","article-title":"Robust Multiplicative Patchwork Method for Audio Watermarking","volume":"17","author":"Kalantari","year":"2009","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"ref_26","unstructured":"Arnold, V.I., and Avez, A. (1968). Ergodic Problems of Classical Mechanics, Benjamin."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"856","DOI":"10.1109\/81.633874","article-title":"An introduction to the synchronization of chaotic systems: Coupled skew tent maps","volume":"44","author":"Hasler","year":"1997","journal-title":"IEEE Trans. Circuits Syst. I Fundam. Theory Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"19063","DOI":"10.1109\/ACCESS.2019.2893646","article-title":"High-Performance Self-Synchronous Blind Audio Watermarking in a Unified FFT Framework","volume":"7","author":"Hu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Toole, F.E. (2017). Sound Reproduction: The Acoustics and Psychoacoustics of Loudspeakers and Rooms, Routledge. [3rd ed.].","DOI":"10.4324\/9781315686424"},{"key":"ref_30","unstructured":"CVG-UGR (2023, August 15). (Computer Vision Group-University of Granada) Image Database. Available online: https:\/\/ccia.ugr.es\/cvg\/dbimagenes\/."},{"key":"ref_31","unstructured":"Kabal, P. (2002). An Examination and Interpretation of ITU-R BS.1387: Perceptual Evaluation of Audio Quality, Department of Electrical & Computer Engineering, McGill University. TSP Lab Technical Report."},{"key":"ref_32","unstructured":"Kabal, P. (2023, August 15). Matlab Implementation of the ITU-R BS 1387.1. Available online: http:\/\/www-mmsp.ece.mcgill.ca\/Documents\/Software\/."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., and Petitcolas, F.A.P. (2000). Information Hiding Techniques for Steganography and DIGITAL Watermarking, Artech House.","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Ledig, C., Theis, L., Husz\u00e1r, F., Caballero, J., Aitken, A.P., Tejani, A., Totz, J., Wang, Z., and Shi, W. (2017, January 21\u201326). Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network. Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.19"},{"key":"ref_35","first-page":"60","article-title":"A Deep Journey into Super-resolution: A Survey","volume":"53","author":"Anwar","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Li, J., Fang, F., Mei, K., and Zhang, G. (2018, January 8\u201314). Multi-scale Residual Network for Image Super-Resolution. Proceedings of the European Conference on Computer Vision (ECCV), Munich, Germany.","DOI":"10.1007\/978-3-030-01237-3_32"},{"key":"ref_37","unstructured":"Cai, C., and Wang, Y. (2020). A Note on Over-Smoothing for Graph Neural Networks. arXiv."},{"key":"ref_38","unstructured":"Lim, J.H., and Ye, J.C. (2017). Geometric GAN. arXiv."},{"key":"ref_39","unstructured":"Grubinger, M., Clough, P.D., M\u00fcller, H., and Deselaers, T. (2006, January 24). The IAPR TC-12 Benchmark: A New Evaluation Resource for Visual Information Systems. Proceedings of the International Conference on Language Resources and Evaluation, Genoa, Italy. Available online: http:\/\/www-i6.informatik.rwth-aachen.de\/imageclef\/resources\/iaprtc12.tgz."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/4\/47\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:02:02Z","timestamp":1760130122000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/4\/47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,29]]},"references-count":39,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["cryptography7040047"],"URL":"https:\/\/doi.org\/10.3390\/cryptography7040047","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2023,9,29]]}}}