High capacity robust audio watermarking scheme based on DWT transform

Size: px
Start display at page:

Download "High capacity robust audio watermarking scheme based on DWT transform"

Transcription

1 High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com Ali Nayeri Rad (Sama technical and vocational training college, Islamic Azad University, Ahvaz Branch, Ahvaz, Iran) Abstract This paper proposed an audio digital watermarking algorithm based on the Discrete wavelet transform (DWT) by combining with human auditory model and using the masking effect of human ears. This algorithm is realized to embed a binary image watermark into the audio signal and improved the imperceptibility of watermarks. Experimental results show that this algorithm has a better robustness against common signal processing such as noise, filtering, resampling and lossy compression. Keywords: Audio Watermarking, wavelet transform, high capacity. 1. Introduction The recent growth in computer networks, and more specifically, the World Wide Web, copyright protection of digital audio becomes more and more important. Digital audio watermarking has drawn extensive attention for copyright protection of audio data. A digital audio watermarking is a process of embedding watermarks into audio signal to show authenticity and ownership. Audio watermarking should meet the following requirements: (a)imperceptibility: the digital watermark should not affect the quality of original audio signal after it is watermarked; (b) Robustness: the embedded watermark data should not be removed or eliminated by unauthorized distributors using common signal processing operations and attacks; (c) Capacity: capacity refers to the numbers of bits that can be embedded into the audio signal within a unit of time. All these requirements are often contradictory with each other. Furthermore, there are two kinds of detections in watermarking system. Blind detection which has no knowledge of the original signal and informed (non-blind) detection, which uses the original signal for extracting the watermark signal. Blind detection is beneficial when the original signal is not easily accessible. According to the implementation process of audio watermarking algorithms, they can be divided into the time domain methods and transform domain methods. In time domain schemes, the hidden bits are embedded directly into the time signal samples. Time domain watermarking systems are usually weaker against signalprocessing attacks compared to the transform domain counterparts. From the view of the performance of watermarks against attacks, the performance of the transform domain methods are commonly considered better than that of the time domain methods [1]. Phase modulation [] and echo hiding [3] are well known methods in the time domain. In frequency domain watermarking, after taking one of the usual transforms such as Discrete Fourier Transform (DFT), the Discrete Cosine Transform (DCT),the Modified Discrete Cosine Transform (MDCT) or the Wavelet Transform (WT) [4,, 6, 7,8,9] from the signal, the hidden bits are embedded into the resulting transform coefficients. In this paper, we discuss the audio watermark embedding based on the human auditory characters using the wavelet transform. The wavelet transform has many advantages in audio signal processing. Its inherent frequency multi-resolution and logarithmic decomposition of frequency bands resembles the human perception of frequencies, since it provides the decomposition to mimic the critical band structure of the HAS. In the proposed scheme, the last low frequency band of the 4th level wavelet decomposition (CA4), is used for embedding. This band of wavelet samples is divided into frames and then, the average of the absolute values of each frame s samples is computed [7]. After that, in the embedding process, all wavelet coefficients are scanned and if each coefficient satisfies a given condition then the corresponding 14

2 secret bit is embedded into it. The corresponding two secret bits is embedded into a single wavelet coefficient and the two next secret bits is embedded into the next suitable coefficient. The experimental results show that this scheme has an excellent capacity with transparency and robustness against common signal processing attacks is achieved. In section two, we give a brief description of the discrete wavelets transform. In section three, we describe in details the watermarking embedding and extraction procedures of the proposed algorithm. In section four, we evaluate the performance of the algorithm and present simulation results with respect to inaudibility and robustness. We conclude in section five with some remarks.. The Discrete Wavelets Transform Suppose an original audio signal is f(n) and the filters corresponding to the scale function and wavelet function are the H and G respectively. The discrete wavelet transform (DWT) of audio signal f(n) is showed as Fig.. CA is the approximate components sub-band which mainly represent the low frequency components of the audio signal, and CD is the detail components sub-band which mainly represent the high frequency components of the audio signal. If continued to decompose the approximate components CA with J levels, we can obtain the wavelet decomposing components in different decomposing levels. This decomposing process is called the wavelet multi-resolution analysis with J levels to the audio signal f (n). The detail components and the approximate component obtained are respectively CDi and CAJ, where the CDi (i = 1,, L, J) represents the i- th level detail component. This multi-resolution decomposing process is approximate to the human auditory system. Depending on the application and the length of the signal, the low frequencies part might be further decomposed into two parts of high and low frequencies. Figure 1 shows a 4-level DWT decomposition of signal f(n). The original signal f(n) can be reconstructed using the inverse DWT process. Fig 1: Four-level DWT decomposition Since the hearing of human ears is not much sensible to the minute change of the wavelet high frequency components and the coefficients of the high frequency component are smaller, so we can embed the watermarks into the high frequency components sub-band to realize the inaudibility of watermarks effectively. But the high frequency components are easily to be destroyed or removed by some kind of common signal processing, so that the robustness of the watermarks can t be ensured. While the low frequency components are the main components of the signal, because in the high frequency sub-band, the coefficients of the high frequency components are bigger and they carry most of the energy of the audio signal. So selecting the low frequency components sub-band to embed the watermarks can obtain an excellent robustness. Although the wavelet approximate components are affected little by the outer environment and their stabilities are good, selecting this area to embed the watermarks can enhance the robustness of the watermarks, but at the same time they carry the main energy of the audio signal and are the main components of the signal. So the change to the approximate components can easily destroy the quality of the original audio signal. Due to its excellent spatioe-frequency localization properties, the DWT is very suitable to identify areas in an audio signal where a watermark can be embedded effectively. Many DWT-based audio watermarking techniques can be found in literature [4,, 6, 7, 8, 9]. 1

3 3. Proposed scheme The algorithm we propose here is based on applying the DWT on the digital audio signal in which a watermark should be embedded. The watermark embedding method is performed in the wavelet domain. A binary image is embedded into the significant coefficients CA4 selective from detail coefficients. The algorithm consists of two procedures; watermarking embedding procedure and watermarking extraction procedure Watermark Embedding Procedure The embedding procedure performs three major operations; Watermark pre-processing DWT-based frequency decomposition of the audio signal Watermark embedding in the DWT-transformed audio signal. The operations are described in the following steps: 1. Convert the two-dimensional image matrix Img into a one-dimensional vector W of length M1M. W = {w(i) = Img(k,j),i = k M + j, k M1, j M} (1). The audio signal was decomposed using wavelet with four levels. 3. Divide the CA4 samples into frames of a given length and, based on the average of the absolute values of each frame s samples, compute the average mi for each frame. where (cj) are the wavelet coefficients of the high frequency sub-band (cd4), (s) is the frame size and (mi) is the average of the i-th frame. 4. The marked wavelet coefficients (Cj') are achieved by using equation (3). cj' = - mi - 3* mi/ 3* mi/ mi cj (k) Is the embedding interval (k > ). m i 1 s is j i s 1) ( 1 cj / mi > k () w(l) = w(l) = w(l) = 1 w(l) = 1 w(l+1) = w(l+1) = 1 w(l+1) = w(l+1) = 1 Two secret bit is embedded in a single suitable coefficient and thus, after embedding the bit, the index 1, incremented two unit and the two next secret bits is embedded in the next suitable coefficient. By increasing k, the interval is extended in such a way that the number of modified coefficients which satisfy the condition c j / m i < k is increased and, thus, capacity and distortion also become greater. To manage robustness and transparency, we use a scale factor, α, which defines strength of watermark. 4. Finally, the inverse DWT is applied to the modified wavelet coefficients to get the marked audio signal. The basic procedure of embedding watermark is shown in Figure. c j )3( 16

4 Fig : The watermark embedding procedure. 3.. Watermark Extraction Procedure The watermark detection is performed by using the DWT transform and the embedding parameters. Since the host audio signal is not required in the detection process, the detector is blind. The detection process can be summarized in the following steps: 1. The watermarked audio was decomposed using wavelet with 4 levels.. Divide the CA4 samples into frames of a given length and, based on the average of the absolute values of each frame s samples, compute the average m'i for each frame. is 1 m ' c ' i s j ( i 1) s 1 j (4) 3. The secret bit stream is achieved by using equation (). -((k+α) / 6) c'j / m'i< (-(k+α) / ), w'(l) =, w'(l) = -((k+α) / 6) c'j / m'i < ۰, w'(l) =, w'(l) = 1 W'l = () ۰ c'j / m'i< ((k+α) / 6), w'(l) = 1, w'(l) = ((k+α) / 6) c'j / m'i < ( (k+α) /), w'(l) = 1, w'(l) = 1 Where c'j is the sample of the high frequency band of the 4th level wavelet decomposition (CA4) of the marked signal, α is the strength of watermark and w'l is the l-th bit of the extracted secret stream.the suggested algorithm is blind, since the original signal values are not required in the receiver. 4. Experiment Results and Analysis In order to evaluate the imperceptibility and robustness of the audio proposed embedding algorithm, we have done a lot of the simulation experiments on the computer, some results are given as follows. Figure 6(a) gave the original audio and watermarks. The original audio is a segment of the song music whose length is 1 seconds, single-channel, the sample rate = 44.1 f s KHz and the resolution is 16 bits. The original watermark is a grayscale image whose size was The wavelet is the Db-8, and the level of the wavelet decomposition J = 4. In order to remove the effects of the subject factor, we adopted the SNR and the normalized correlation (NC) to measure the performance of the embedding algorithm in this paper. Signal to Noise Ratio (SNR) is a statistical difference metric which is used to measure the similitude between the undistorted original audio signal and the distorted watermarked audio signal. The SNR computation is done according to Equation (6), where x (n) corresponds to the original signal, and x'(n) corresponds to the watermarked signal. SNR 1log N 1 x (n) n 1 N 1 ^ n [ x (n)-x '(n)] 17

5 After embedding watermark, the SNR of all selected audio signals using the proposed method are above 6dB [8] which ensures the imperceptibility of our proposed system. The normalized correlation (NC)are defined as follow: NC M lenght M width i 1 j1 M M M i j M lenght width i 1 j1 ' (, ) ( i, j ) M ( i, j ) where M (i, j) is the watermark of the original binary image, M' (i, j) is the watermark of the recovery binary image, N1 N is the size of the binary image watermark. Table 1 shows the perceptual distortion and the payload obtained for the three songs with BER equal to zero (or near zero) under the attacks detailed in Table,for k = 4, α =1.1 and the frame size equal to 1. TABLE I RESULTS OF 3 SIGNALS (ROBUST AGAINST TABLE ATTACKS) Audio File Time (m:sec) SNR (db) Payload (bps) Beginning of the End 3: Citizen,Go Back tosleep 1: Loopy Music Average 1: Note that all the results have an average SNR is 6dB and capacity is around 14 bps for all the experiments. The proposed method is thus able to provide large capacity and robustness whilst keeping imperceptibility. Table illustrates the effect of various attacks provided in the Stirmark Benchmark for Audio v1. on audio signal Loopymusic. TABLE ROBUSTNESS TEST RESULTS FOR FIVE SELECTED FILES AND COMPARISON WITH SCHEMES IN THIS Attack NC propose d [7] [1 ] BER % [9 ] [11 ] [1 ] Addnoise Add FFT noise FFTHLPassQuick MP

6 Resampling 44//44 Echo RCHighPass 1 to k RCLowPass to k A few attacks such as FFTStat1and echo in Table remove the hidden data (BER > 1%). Using frames of wavelet samples results in an increased robustness against attacks, since the average of the samples is more robust than the value of each sample. Thus, by increasing the frame size, better robustness can be achieved. However, by increasing the frame size, we enforce the same value for a greater number of samples, which decreases the audio quality and transparency. The method proposed in this paper has been compared with several recent audio watermarking strategies. Almost all the audio data hiding schemes which produce very high capacity are fragile against signal processing attacks. Because of this, it is not possible to establish a fair comparison of the proposed scheme with some fragile audio watermarking schemes which are similar to it as capacity is concerned. Hence, we have chosen a few recent and relevant robust audio watermarking schemes in the liter.. Conclusion In this paper, a high-capacity watermarking algorithm for digital audio,which is robust against common audio signal processing attacks and the Stirmark Benchmark for audio,is presented. A scaling factor, the frame size and the selected frequency band are the three adjustable parameters of this method which regulate the capacity, the perceptual distortion and the robustness trade-off of the scheme accurately. Furthermore, the suggested scheme is blind, since it does not need the original signal for extracting the hidden bits. The experimental results show that this scheme has an excellent capacity (about 4 kbps) with SNR (about 6 db) and provides robustness against common signal processing attacks such as highpass, lowpass, resampling, requantization. A comparison with other schemes in the audio watermarking literature is also provided, illustrates that the suggested scheme outperforms the robustness of other approaches while keeping transparency and capacity in the acceptable ranges. Acknowledgements Funding support of this research was provided by the, Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran. References [1] J. Cox, J. Kilian, and T. Shamoon, Secure Spread Spectrum Watermarking for Image, Audio and Video, IEEE trans. on Image Processing, vol.6, pp , [] W. N. Lie, L. C. Chang, Multiple Watermarks for Stereo Audio Signals Using Phase-Modulation Techniques, IEEE Trans.Signal Processing, Vol. 3, No., pp , [3] H. J. Kim, Y. H. Choi, A novel echo hiding scheme with back ward and forward kernels, IEEE Trans. Circuit and Systems, pp , Aug

7 [4] S. Wu, J. Huang, D. Huang, Y. Q. Shi, Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission, IEEE Trans. Broadcasting, Vol. 1, No. 1, pp , Mar.. [] Z.Xu, W.Wang, Digital Audio Watermarking Algorithm Based on Quantizing Coefficients, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 6), Pasadena, CA USA, pp , 6. [6] M.A.Akhaee, S.GhaemMaghami, and N.Khademi, A Novel Technique for Audio Signals Watermarking in the Wavelet and Walsh Transform Domains, IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Tottori, Japan, p ,6. [7] M.Fallahpour, and D.Megias, High capacity audio watermarking using the high frequency band of the wavelet domain, Multimedia tools and Applications, 1. [8] N.Khademi Kalantari, S.M.Ahadi, A Robust Audio Watermarking Scheme Using Mean Quantization in the Wavelet Transform Domain, Submitted to IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Cairo, Egypt,7. [9] M.Pooyan, A.Delforouzi, Adaptive and robust audio watermarking in wavelet domain, Third International Conference on International Information Hiding and Multimedia Signal Processing, V, Pages 78-9, 7. [1] J.J.Garcia-Hernandez, M.Nakano-Miyatake, and H.Perez-Meana, Data hiding in audio signal using Rational Dither Modulation, IEICE Electron. Express, Vol., No. 7, pp.17-, 8. [11] M.Fallahpour, and D.Megias, High capacity audio watermarking using FFT amplitude interpolation, IEICE Electronics Express, vol.6, no.14, pp ,9. [1] W.Lanxun, Y.Chao, P.Jiao, An audio watermark embedding algorithm based on mean-quantization in

DWT based high capacity audio watermarking

DWT based high capacity audio watermarking LETTER DWT based high capacity audio watermarking M. Fallahpour, student member and D. Megias Summary This letter suggests a novel high capacity robust audio watermarking algorithm by using the high frequency

More information

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering

More information

FPGA implementation of DWT for Audio Watermarking Application

FPGA implementation of DWT for Audio Watermarking Application FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

High Capacity Audio Watermarking Based on Fibonacci Series

High Capacity Audio Watermarking Based on Fibonacci Series 2017 IJSRST Volume 3 Issue 8 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Scienceand Technology High Capacity Audio Watermarking Based on Fibonacci Series U. Hari krishna 1, M. Sreedhar

More information

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio INTERSPEECH 2014 Audio Watermarking Based on Multiple Echoes Hiding for FM Radio Xuejun Zhang, Xiang Xie Beijing Institute of Technology Zhangxuejun0910@163.com,xiexiang@bit.edu.cn Abstract An audio watermarking

More information

Introduction to Audio Watermarking Schemes

Introduction to Audio Watermarking Schemes Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia

More information

Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates

Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates 72 JOURNAL OF COMPUTERS, VOL., NO., MARCH 2 Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates Malay Kishore Dutta Department of Electronics Engineering, GCET, Greater Noida,

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

PAPER Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification

PAPER Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification IEICE TRANS. INF. & SYST., VOL.E93 D, NO.1 JANUARY 2010 87 PAPER Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification Mehdi FALLAHPOUR a), Student Member and David MEGÍAS, Nonmember

More information

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Neethu V PG Scholar, Dept. of ECE, Coimbatore Institute of Technology, Coimbatore, India. R.Kalaivani Assistant

More information

The main object of all types of watermarking algorithm is to

The main object of all types of watermarking algorithm is to Transformed Domain Audio Watermarking Using DWT and DCT Mrs. Pooja Saxena and Prof. Sandeep Agrawal poojaetc@gmail.com Abstract The main object of all types of watermarking algorithm is to improve performance

More information

A Blind EMD-based Audio Watermarking using Quantization

A Blind EMD-based Audio Watermarking using Quantization 768 A Blind EMD-based Audio Watermaring using Quantization Chinmay Maiti 1, Bibhas Chandra Dhara 2 Department of Computer Science & Engineering, CEMK, W.B., India, chinmay@cem.ac.in 1 Department of Information

More information

An Improvement for Hiding Data in Audio Using Echo Modulation

An Improvement for Hiding Data in Audio Using Echo Modulation An Improvement for Hiding Data in Audio Using Echo Modulation Huynh Ba Dieu International School, Duy Tan University 182 Nguyen Van Linh, Da Nang, VietNam huynhbadieu@dtu.edu.vn ABSTRACT This paper presents

More information

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

11th International Conference on, p

11th International Conference on, p NAOSITE: Nagasaki University's Ac Title Audible secret keying for Time-spre Author(s) Citation Matsumoto, Tatsuya; Sonoda, Kotaro Intelligent Information Hiding and 11th International Conference on, p

More information

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on

More information

Audio Watermarking Based on Fibonacci Numbers

Audio Watermarking Based on Fibonacci Numbers IEEE/ACM TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 23, NO. 8, AUGUST 2015 1273 Audio Watermarking Based on Fibonacci Numbers Mehdi Fallahpour and David Megías, Member, IEEE Abstract

More information

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform J Inf Process Syst, Vol.13, No.5, pp.1331~1344, October 2017 https://doi.org/10.3745/jips.03.0042 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Data Hiding Algorithm for Images Using Discrete Wavelet

More information

Robust watermarking based on DWT SVD

Robust watermarking based on DWT SVD Robust watermarking based on DWT SVD Anumol Joseph 1, K. Anusudha 2 Department of Electronics Engineering, Pondicherry University, Puducherry, India anumol.josph00@gmail.com, anusudhak@yahoo.co.in Abstract

More information

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing

More information

Localized Robust Audio Watermarking in Regions of Interest

Localized Robust Audio Watermarking in Regions of Interest Localized Robust Audio Watermarking in Regions of Interest W Li; X Y Xue; X Q Li Department of Computer Science and Engineering University of Fudan, Shanghai 200433, P. R. China E-mail: weili_fd@yahoo.com

More information

Audio Watermarking Scheme in MDCT Domain

Audio Watermarking Scheme in MDCT Domain Santosh Kumar Singh and Jyotsna Singh Electronics and Communication Engineering, Netaji Subhas Institute of Technology, Sec. 3, Dwarka, New Delhi, 110078, India. E-mails: ersksingh_mtnl@yahoo.com & jsingh.nsit@gmail.com

More information

Data Hiding in Digital Audio by Frequency Domain Dithering

Data Hiding in Digital Audio by Frequency Domain Dithering Lecture Notes in Computer Science, 2776, 23: 383-394 Data Hiding in Digital Audio by Frequency Domain Dithering Shuozhong Wang, Xinpeng Zhang, and Kaiwen Zhang Communication & Information Engineering,

More information

Research Article A Robust Zero-Watermarking Algorithm for Audio

Research Article A Robust Zero-Watermarking Algorithm for Audio Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 453580, 7 pages doi:10.1155/2008/453580 Research Article A Robust Zero-Watermarking Algorithm for

More information

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code IEICE TRANS. INF. & SYST., VOL.E98 D, NO.1 JANUARY 2015 89 LETTER Special Section on Enriched Multimedia Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code Harumi

More information

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING Nedeljko Cvejic, Tapio Seppänen MediaTeam Oulu, Information Processing Laboratory, University of Oulu P.O. Box 4500, 4STOINF,

More information

Lossless Image Watermarking for HDR Images Using Tone Mapping

Lossless Image Watermarking for HDR Images Using Tone Mapping IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar

More information

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 7, October 2014, PP 7-12 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Scheme for Digital Audio Watermarking

More information

Audio watermarking robust against D/A and A/D conversions

Audio watermarking robust against D/A and A/D conversions RESEARCH Open Access Audio watermarking robust against D/A and A/D conversions Shijun Xiang 1,2 Abstract Digital audio watermarking robust against digital-to-analog (D/A) and analog-to-digital (A/D) conversions

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

Audio Watermark Detection Improvement by Using Noise Modelling

Audio Watermark Detection Improvement by Using Noise Modelling Audio Watermark Detection Improvement by Using Noise Modelling NEDELJKO CVEJIC, TAPIO SEPPÄNEN*, DAVID BULL Dept. of Electrical and Electronic Engineering University of Bristol Merchant Venturers Building,

More information

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Available online at  ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Available online at www.sciencedirect.com ScienceDirect Procedia Technology ( 23 ) 7 3 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 23) BER Performance of Audio Watermarking

More information

2008/12/17. RST invariant digital image watermarking & digital watermarking based audiovisual quality evaluation. Outline

2008/12/17. RST invariant digital image watermarking & digital watermarking based audiovisual quality evaluation. Outline //7 RST invariant digital image watermarking & digital watermarking based audiovisual quality evaluation Outline Digital watermarking RST invariant image watermarking Audiovisual quality evaluation based

More information

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design 2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital

More information

An Audio Watermarking Method Based On Molecular Matching Pursuit

An Audio Watermarking Method Based On Molecular Matching Pursuit An Audio Watermaring Method Based On Molecular Matching Pursuit Mathieu Parvaix, Sridhar Krishnan, Cornel Ioana To cite this version: Mathieu Parvaix, Sridhar Krishnan, Cornel Ioana. An Audio Watermaring

More information

Evaluation of Audio Compression Artifacts M. Herrera Martinez

Evaluation of Audio Compression Artifacts M. Herrera Martinez Evaluation of Audio Compression Artifacts M. Herrera Martinez This paper deals with subjective evaluation of audio-coding systems. From this evaluation, it is found that, depending on the type of signal

More information

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Khaly TALL 1, Mamadou Lamine MBOUP 1, Sidi Mohamed FARSSI 1, Idy DIOP 1, Abdou Khadre DIOP 1, Grégoire SISSOKO 2 1. Laboratoire

More information

Audio Compression using the MLT and SPIHT

Audio Compression using the MLT and SPIHT Audio Compression using the MLT and SPIHT Mohammed Raad, Alfred Mertins and Ian Burnett School of Electrical, Computer and Telecommunications Engineering University Of Wollongong Northfields Ave Wollongong

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST On the Use of Masking Models for Image and Audio Watermarking

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST On the Use of Masking Models for Image and Audio Watermarking IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST 2005 727 On the Use of Masking Models for Image and Audio Watermarking Arnaud Robert and Justin Picard Abstract In most watermarking systems, masking

More information

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT Method to Improve Watermark Reliability Adam Brickman EE381K - Multidimensional Signal Processing May 08, 2003 ABSTRACT This paper presents a methodology for increasing audio watermark robustness. The

More information

Audio Data Verification and Authentication using Frequency Modulation Based Watermarking

Audio Data Verification and Authentication using Frequency Modulation Based Watermarking Dublin Institute of Technology ARROW@DIT Articles School of Electrical and Electronic Engineering 2008-01-01 Audio Data Verification and Authentication using Frequency Modulation Based Watermarking Jonathan

More information

Audio watermarking using transformation techniques

Audio watermarking using transformation techniques Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2010 Audio watermarking using transformation techniques Rajkiran Ravula Louisiana State University and Agricultural and

More information

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION SHAOHUI LIU, HONGXUN YAO, XIAOPENG FAN,WEN GAO Vilab, Computer College, Harbin Institute of Technology, Harbin, China, 150001

More information

23rd European Signal Processing Conference (EUSIPCO) ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING

23rd European Signal Processing Conference (EUSIPCO) ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING Nhut Minh Ngo, Brian Michael Kurkoski, and Masashi Unoki School of Information Science, Japan Advanced Institute

More information

Performance Analysis of Parallel Acoustic Communication in OFDM-based System

Performance Analysis of Parallel Acoustic Communication in OFDM-based System Performance Analysis of Parallel Acoustic Communication in OFDM-based System Junyeong Bok, Heung-Gyoon Ryu Department of Electronic Engineering, Chungbuk ational University, Korea 36-763 bjy84@nate.com,

More information

Jayalakshmi M., S. N. Merchant, Uday B. Desai SPANN Lab, Indian Institute of Technology, Bombay jlakshmi, merchant,

Jayalakshmi M., S. N. Merchant, Uday B. Desai SPANN Lab, Indian Institute of Technology, Bombay   jlakshmi, merchant, SIGNIFICANT PIXEL WATERMARKING IN CONTOURLET OMAIN Jayalakshmi M., S. N. Merchant, Uday B. esai SPANN Lab, Indian Institute of Technology, Bombay email: jlakshmi, merchant, ubdesai @ee.iitb.ac.in Keywords:

More information

A Optimized and Secure Audio Steganography for Hiding Secret Information - Review

A Optimized and Secure Audio Steganography for Hiding Secret Information - Review Journal of Electronicsl and Communication Engineering (IOSR-JECE) ISSN: 2278-2834-, ISBN: 2278-8735, PP: 12-16 www.iosrjournals.org A Optimized and Secure Audio Steganography for Hiding Secret Information

More information

Audio and Speech Compression Using DCT and DWT Techniques

Audio and Speech Compression Using DCT and DWT Techniques Audio and Speech Compression Using DCT and DWT Techniques M. V. Patil 1, Apoorva Gupta 2, Ankita Varma 3, Shikhar Salil 4 Asst. Professor, Dept.of Elex, Bharati Vidyapeeth Univ.Coll.of Engg, Pune, Maharashtra,

More information

An Integrated Image Steganography System. with Improved Image Quality

An Integrated Image Steganography System. with Improved Image Quality Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality

More information

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant

More information

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform

More information

Communications Theory and Engineering

Communications Theory and Engineering Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 Speech and telephone speech Based on a voice production model Parametric representation

More information

Mel Spectrum Analysis of Speech Recognition using Single Microphone

Mel Spectrum Analysis of Speech Recognition using Single Microphone International Journal of Engineering Research in Electronics and Communication Mel Spectrum Analysis of Speech Recognition using Single Microphone [1] Lakshmi S.A, [2] Cholavendan M [1] PG Scholar, Sree

More information

Image Quality Estimation of Tree Based DWT Digital Watermarks

Image Quality Estimation of Tree Based DWT Digital Watermarks International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 215 ISSN 291-273 Image Quality Estimation of Tree Based DWT Digital Watermarks MALVIKA SINGH PG Scholar,

More information

A High-Rate Data Hiding Technique for Uncompressed Audio Signals

A High-Rate Data Hiding Technique for Uncompressed Audio Signals A High-Rate Data Hiding Technique for Uncompressed Audio Signals JONATHAN PINEL, LAURENT GIRIN, AND (Jonathan.Pinel@gipsa-lab.grenoble-inp.fr) (Laurent.Girin@gipsa-lab.grenoble-inp.fr) CLÉO BARAS (Cleo.Baras@gipsa-lab.grenoble-inp.fr)

More information

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

ScienceDirect. A Novel DWT based Image Securing Method using Steganography Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based

More information

Rhythmic Similarity -- a quick paper review. Presented by: Shi Yong March 15, 2007 Music Technology, McGill University

Rhythmic Similarity -- a quick paper review. Presented by: Shi Yong March 15, 2007 Music Technology, McGill University Rhythmic Similarity -- a quick paper review Presented by: Shi Yong March 15, 2007 Music Technology, McGill University Contents Introduction Three examples J. Foote 2001, 2002 J. Paulus 2002 S. Dixon 2004

More information

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect

More information

ARTICLE IN PRESS. Signal Processing

ARTICLE IN PRESS. Signal Processing Signal Processing 9 (1) 467 479 Contents lists available at ScienceDirect Signal Processing journal homepage: www.elsevier.com/locate/sigpro Watermarking via zero assigned filter banks Zeynep Yücel,A.Bülent

More information

Geometrically Invariant Digital Watermarking Using Robust Feature Detectors. Xiao-Chen Yuan. Doctor of Philosophy in Software Engineering

Geometrically Invariant Digital Watermarking Using Robust Feature Detectors. Xiao-Chen Yuan. Doctor of Philosophy in Software Engineering Geometrically Invariant Digital Watermarking Using Robust Feature Detectors by Xiao-Chen Yuan Doctor of Philosophy in Software Engineering 2013 Faculty of Science and Technology University of Macau Geometrically

More information

Introduction to Wavelet Transform. Chapter 7 Instructor: Hossein Pourghassem

Introduction to Wavelet Transform. Chapter 7 Instructor: Hossein Pourghassem Introduction to Wavelet Transform Chapter 7 Instructor: Hossein Pourghassem Introduction Most of the signals in practice, are TIME-DOMAIN signals in their raw format. It means that measured signal is a

More information

FPGA implementation of LSB Steganography method

FPGA implementation of LSB Steganography method FPGA implementation of LSB Steganography method Pangavhane S.M. 1 &Punde S.S. 2 1,2 (E&TC Engg. Dept.,S.I.E.RAgaskhind, SPP Univ., Pune(MS), India) Abstract : "Steganography is a Greek origin word which

More information

A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression

A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression David Megías, Jordi Herrera-Joancomartí, and Julià Minguillón Estudis d Informàtica i Multimèdia Universitat Oberta de Catalunya Av.

More information

Robust Watermarking Scheme Using Phase Shift Keying Embedding

Robust Watermarking Scheme Using Phase Shift Keying Embedding Robust Watermarking Scheme Using Phase Sht Keying Embedding Wen-Yuan Chen Chio-Tan Kuo and Jiang-Nan Jow Department of Electronic Engineering National Chin-Yi Institute of Technology Taichung Taiwan R.O.C.

More information

Scale estimation in two-band filter attacks on QIM watermarks

Scale estimation in two-band filter attacks on QIM watermarks Scale estimation in two-band filter attacks on QM watermarks Jinshen Wang a,b, vo D. Shterev a, and Reginald L. Lagendijk a a Delft University of Technology, 8 CD Delft, etherlands; b anjing University

More information

Digital Image Watermarking by Spread Spectrum method

Digital Image Watermarking by Spread Spectrum method Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques

More information

ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING BASED ON MULTIWAVELETS

ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING BASED ON MULTIWAVELETS ORTOONAL FREQUENCY DIVISION MULTIPLEXIN BASED ON MULTIWAVELETS Dr. Saad N. Abdul Majed Baghdad College of Economic Science University Department of Computer Science Iraq Prof. Dr. Walid A. Mahmoud University

More information

An Enhanced Least Significant Bit Steganography Technique

An Enhanced Least Significant Bit Steganography Technique An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are

More information

Digital Watermarking Using Homogeneity in Image

Digital Watermarking Using Homogeneity in Image Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar

More information

Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing Journal of Physics: Conference Series PAPER OPEN ACCESS Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing To cite this article: N. M. Yoeseph et al 2016 J. Phys.: Conf.

More information

Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification

Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification Wei Li and Xiangyang Xue Department of Computer Science and Engineering University of Fudan, 220 Handan Road Shanghai

More information

Audio Fingerprinting using Fractional Fourier Transform

Audio Fingerprinting using Fractional Fourier Transform Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,

More information

An Adaptive Algorithm for Speech Source Separation in Overcomplete Cases Using Wavelet Packets

An Adaptive Algorithm for Speech Source Separation in Overcomplete Cases Using Wavelet Packets Proceedings of the th WSEAS International Conference on Signal Processing, Istanbul, Turkey, May 7-9, 6 (pp4-44) An Adaptive Algorithm for Speech Source Separation in Overcomplete Cases Using Wavelet Packets

More information

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005 Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.

More information

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing ABSTRACT Audio steganography deals with a method to hide a secret message in an audio file. Also, Audio steganography can be used for secret watermarking or concealing ownership or copyright information

More information

Audio Signal Compression using DCT and LPC Techniques

Audio Signal Compression using DCT and LPC Techniques Audio Signal Compression using DCT and LPC Techniques P. Sandhya Rani#1, D.Nanaji#2, V.Ramesh#3,K.V.S. Kiran#4 #Student, Department of ECE, Lendi Institute Of Engineering And Technology, Vizianagaram,

More information

Assistant Lecturer Sama S. Samaan

Assistant Lecturer Sama S. Samaan MP3 Not only does MPEG define how video is compressed, but it also defines a standard for compressing audio. This standard can be used to compress the audio portion of a movie (in which case the MPEG standard

More information

Data Hiding In Audio Signals

Data Hiding In Audio Signals Data Hiding In Audio Signals Deepak garg 1, Vikas sharma 2 Student, Dept. Of ECE, GGGI,Dinarpur,Ambala Haryana,India 1 Assistant professor,dept.of ECE, GGGI,Dinarpur,Ambala Haryana,India 2 ABSTRACT Information

More information

Nonuniform multi level crossing for signal reconstruction

Nonuniform multi level crossing for signal reconstruction 6 Nonuniform multi level crossing for signal reconstruction 6.1 Introduction In recent years, there has been considerable interest in level crossing algorithms for sampling continuous time signals. Driven

More information

Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT)

Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT) IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. V (Mar Apr. 2015), PP 32-44 www.iosrjournals.org Audio Steganography Using Discrete Wavelet

More information

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

ISeCure. The ISC Int'l Journal of Information Security. A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications

ISeCure. The ISC Int'l Journal of Information Security. A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications The ISC Int'l Journal of Information Security January 2013, Volume 5, Number 1 (pp. 5 36) http://www.isecure-journal.org Invited Paper A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and

More information

HIGH QUALITY AUDIO CODING AT LOW BIT RATE USING WAVELET AND WAVELET PACKET TRANSFORM

HIGH QUALITY AUDIO CODING AT LOW BIT RATE USING WAVELET AND WAVELET PACKET TRANSFORM HIGH QUALITY AUDIO CODING AT LOW BIT RATE USING WAVELET AND WAVELET PACKET TRANSFORM DR. D.C. DHUBKARYA AND SONAM DUBEY 2 Email at: sonamdubey2000@gmail.com, Electronic and communication department Bundelkhand

More information

Experimental Validation for Hiding Data Using Audio Watermarking

Experimental Validation for Hiding Data Using Audio Watermarking Australian Journal of Basic and Applied Sciences, 5(7): 135-145, 2011 ISSN 1991-8178 Experimental Validation for Hiding Data Using Audio Watermarking 1 Mamoun Suleiman Al Rababaa, 2 Ahmad Khader Haboush,

More information

Performance Improving LSB Audio Steganography Technique

Performance Improving LSB Audio Steganography Technique ISSN: 2321-7782 (Online) Volume 1, Issue 4, September 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Performance

More information

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Basic concepts of Digital Watermarking. Prof. Mehul S Raval Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography

More information

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10]

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10] Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Audio Steganography

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

Finite Word Length Effects on Two Integer Discrete Wavelet Transform Algorithms. Armein Z. R. Langi

Finite Word Length Effects on Two Integer Discrete Wavelet Transform Algorithms. Armein Z. R. Langi International Journal on Electrical Engineering and Informatics - Volume 3, Number 2, 211 Finite Word Length Effects on Two Integer Discrete Wavelet Transform Algorithms Armein Z. R. Langi ITB Research

More information

Survey on Different Level of Audio Watermarking Techniques

Survey on Different Level of Audio Watermarking Techniques Survey on Different Level of Audio Watermarking Techniques Shweta Sharma Student, CS Department Rajasthan Collage of Engineering for Women, Jaipur, India Jitendra Rajpurohit Student, CS Department Poornima

More information

Chapter 4 SPEECH ENHANCEMENT

Chapter 4 SPEECH ENHANCEMENT 44 Chapter 4 SPEECH ENHANCEMENT 4.1 INTRODUCTION: Enhancement is defined as improvement in the value or Quality of something. Speech enhancement is defined as the improvement in intelligibility and/or

More information

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 239-443 Volume, No., October 202 8 Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt

More information

Watermarking patient data in encrypted medical images

Watermarking patient data in encrypted medical images Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation

More information

Dilpreet Singh 1, Parminder Singh 2 1 M.Tech. Student, 2 Associate Professor

Dilpreet Singh 1, Parminder Singh 2 1 M.Tech. Student, 2 Associate Professor A Novel Approach for Waveform Compression Dilpreet Singh 1, Parminder Singh 2 1 M.Tech. Student, 2 Associate Professor CSE Department, Guru Nanak Dev Engineering College, Ludhiana Abstract Waveform Compression

More information

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11, FPGA IMPLEMENTATION OF LSB REPLACEMENT STEGANOGRAPHY USING DWT M.Sathya 1, S.Chitra 2 Assistant Professor, Prince Dr. K.Vasudevan College of Engineering and Technology ABSTRACT An enhancement of data protection

More information