A Blind EMD-based Audio Watermarking using Quantization

Size: px
Start display at page:

Download "A Blind EMD-based Audio Watermarking using Quantization"

Transcription

1 768 A Blind EMD-based Audio Watermaring using Quantization Chinmay Maiti 1, Bibhas Chandra Dhara 2 Department of Computer Science & Engineering, CEMK, W.B., India, chinmay@cem.ac.in 1 Department of Information Technology, Jadavpur University, W.B., India, bibhas@it.jusl.ac.in 2 ABSTRACT In this paper, a blind audio watermaring algorithm in time domain using empirical mode decomposition (EMD) and quantization is presented. The host audio signal is partitioned into non-overlapping segments. Then, each segment is decomposed into finite number of intrinsic mode functions (IMFs) using EMD. In the proposed algorithm, the first IMF has been considered for embedding the watermar. The watermar bit is embedded into the audio segment by quantizing norm of the extremes of the first IMF using quantization process. The size of the watermar is equal to the number of segments of the host audio signal. The watermar is extracted from watermared audio signal blindly in the extraction process. To enhance the security of the watermar, Arnold transformation technique is used to scramble the watermar before embedding it. The experimental evaluation shows that proposed method achieves high imperceptibility and high capacity. Moreover, the present algorithm is also robust under different audio attacs such as mp3 compression, requantization, amplitude reverse, Additive White Gaussian noise, cropping, etc. Keywords: Audio watermaring, Empirical mode decomposition, Security, Audio attacs, Robustness 1. INTRODUCTION The rapid growths of the internet and multimedia technology have allowed transmission and distribution of the digital multimedia data such as image, video, audio easily and efficiently to distant places. However, this convenience allows unauthorized copying and distribution of the digital multimedia data. At the same time, the problem of copyright protection is increasing day by day. Copyright protection of multimedia data can be possible by two different ways: Cryptography and Watermaring. In cryptography, data encrypted to prevent the unauthorized access but once the data are decrypted then everyone can access it. In watermaring, watermar information is embedded into the digital multimedia data (also called host data signal) and it will be in the host data forever. Whenever, there are disputes regarding ownership of the data, the authorized owner can extract the watermar to establish his/her ownership. Therefore, the watermaring can be effective solution for copyright protection of the digital multimedia data. An effective audio watermaring algorithm must satisfy the following properties: (i) Imperceptibility: after embedding, the quality of the host audio signal should not be affected. According to IFPI [1], SNR of the watermared audio signal should be greater than 20 db. (ii) Capacity: the amount of information that can be embedded into the audio signal per unit of time. The capacity should be more than 20 bit per second (bps). (iii) Robustness: ability to extract the watermar from a watermared audio signal after signal processing attacs.(iv)security: the watermar can be extracted only by authorized users. All watermaring algorithms mae suitable trade-off among these conflict properties. Many algorithms in audio watermaring have been presented to address these challenges. All audio watermaring algorithms can be classified into two categories: time domain [2], [3], [4], [5] and transform domain [6], [7], [8]. In the survey, it is found that transform domain methods are more robust than time domain methods. Embedding watermar into audio signals is more difficult than the image or video signals [9], due to higher sensitivity of Human Auditory System (HAS) compared to that of Human Visual System (HVS). Many audio watermaring algorithms have been implemented in wavelet domain [1], [7] as the wavelet coefficients contain the multiple spectrums of multiple band frequencies [10]. A limitation of wavelet based approach is that the basis functions are fixed and not necessarily match all real signals. For this reason, many researchers use Empirical Mode Decomposition (EMD) [11] to develop new audio watermaring techniques. EMD is a method which can brea down a signal into a number of IMFs and a residual. Then, signal can be easily reconstructed by adding the IMFs and the residual. The main advantage of EMD is that, there is no priori choice of basis functions and it is fully data-driven method. Thus, EMD is adaptive and highly efficient for perceptual transparency (inaudibility) and robustness. In the literature, there are few audio watermaring algorithms have been found based on EMD [12], [13],

2 769 [14]. In [12], a blind audio watermaring method based on EMD and psychoacoustic model is proposed. The watermar bits are embedded by modifying the final residual of the audio signal. This method is not robust to many attacs. A. N. K. Zaman et al [13] have presented an audio watermaring algorithm using EMD and Hilbert Transformation (HT), where watermar is embedded into the IMF containing highest energy. This method is not robust to attacs as highest energy IMF can be a high frequency mode. In [14], a blind audio watermaring scheme is presented based on EMD. A binary watermar is embedded along with the synchronization codes into the extremes of the last IMF. This method is robust under attacs and preserving the quality of the watermared audio signal. The capacity of this method is which is very low. In this paper, a new blind watermaring algorithm based on EMD and quantization is proposed. In the embedding process, the extremes of the first IMF of the audio signal have used as number of extremes decreases with the order of mode [15]. Here, maximum number of extremes have used for embedding the watermar. The watermar bit is embedded by modifying the norm of the extremes using user defined quantization parameter. The rest of the paper is organized as follows. Section 2 gives an overview of the empirical mode decomposition process. The Arnold technique is described in Section 3.The proposed algorithm is presented in Section 4. Section 5 illustrates the experimental results. The performance of the proposed algorithm is analyzed in Section 6. And finally the concluding remars are given in section EMD PROCESS A detailed mathematically formulated description of the empirical mode decomposition (EMD) has been found in [11]. By using the EMD process, any complex multicomponent signal is decomposed into a finite number of intrinsic mode functions (IMFs), each of which contains only one oscillatory mode at any time instances. An intrinsic mode function is a function that satisfies two conditions: 1) in the whole data set, the number of extremes and the number of zero crossing must either equal or differ at most by one; and 2) at any point, the envelop defined by the local maxima and the envelop defined by the local minima is zero. An algorithm, nown as the EMD decomposes a signal into finitely many IMFs. The EMD which extracts all IMFs from a signal s 0 (t), can be described as follows [11] Step 1: The first IMF component g 1 (t) from the signal s 0 (t). a) Determine all the local extremes of the signal s 0 (t). b) Construct upper envelope for all the local maxima and lower envelope for all the local minima using cubic splines. c) Compute the mean of upper and lower envelope values and denoted the mean as m 1 (t). d) Evaluate the difference between the signal s 0 (t) and m 1 (t) as below h 1 (t)= s 0 (t) - m 1 (t) e) If h 1 (t) is not an IMF then replace the signal s 0 (t) by h 1 (t) and repeat the above strategy for h 1 (t) [from steps 1(a) to 1(d) ] f) The shifting process stops until the resulting difference between the mean of two envelope values in Step 1(c) and the signal s 0 (t) in Step 1(a) is an IMF. The first IMF of the original signal s 0 (t) is denoted as g 1 (t). Step 2: Let s 1 (t) = s 0 (t) - g 1 (t). If g 1 (t) becomes a monotonic function, then stop the decomposition process, Otherwise, replace s 0 (t) by s 1 (t) and repeat Step 1 to find next IMF from s 1 (t). From a given signal s 0 (t), obtain set of signals g (t) and s (t), such that g (t) is obtained from s -1 (t), and s (t) = s -1 (t) - g (t) for 1 r, and s r (t) does not have any IMFs. The s r (t) is called the residual signal. The superposition of all IMFs and the residual reconstruct the original signal s 0 (t). The empirical mode decomposition of the original signal s 0 (t) is define as follows: s t t r 0 = g + sr (1) = 1 The attractive characteristics of IMFs [14] are: (i) IMFs are nearly orthogonal to each other and all have nearly zero mean. (ii) The number of extremes is reduced when going from lower order IMF to the higher order IMF. (iii) The IMFs are completely described by their extremes and it could be recovered from them. (iv) The higher order IMFs are the low frequency components and vice versa. (v) The EMD process is totally adaptive as it is fully data-driven. These important characteristics motivated us to select the EMD process and embed watermar into the extremes of the first IMF. 3. ARNOLD TRANSFORM It is very common to scramble an image for maing it into a meaningless image in the domain of information

3 770 security. The objective is that an original image falls into confusion based on the inverse image transformation. So, the actual content is concealed. The Arnold transformation technique [16], [17] which is a 2-D transformation is used to transform one matrix into another. This can be viewed as a discrete chaotic system [18]. Without loss of generality, let H be an image which is a matrix of size N N. The element (i, j) of the matrix H can be transformed to another position (i, j ) using the transformation rule as below. i = A i modn (2) j j Where A = p s r q Here, A is called Arnold matrix. The element of the matrix A, i.e., p, q, r, s are positive integers and the determinant of A must be equal to unity, i.e., A = 1. Due to its simplicity, it is used for pre-processing of the watermar image in digital watermaring. The main idea is to distribute the pixels randomly within the image. The Arnold matrix is used as secret ey in the proposed watermaring algorithm. It is used to improve the security of the watermar even the watermaring scheme is nown. According to the periodicity of Arnold transformation technique, the actual image can be restored after several iterations. 4. THE PROPOSED ALGORITHM The idea of the proposed watermaring algorithm is to embed a binary watermar image into the host audio signal (X) of L samples. The host audio is partitioned into non-overlapping segments having M samples. The number of segments is equal to the size of the watermar. The size of the binary watermar image (W) is P P. i.e., L = M (P P). The watermar is scrambled using Arnold transformation before embedding it into the host audio. In the embedding process, each audio segment is decomposed into IMFs using EMD process described in section 2. The watermar bit is embedded into each segment by quantizing the norm of the extremer of first IMF using user defined quantization parameter. The value of is adapted experimentally. In the extraction process, same value is applied to extract the watermar. The embedding and extraction process of the proposed algorithm are described as follows. 4.1 Embedding Process The bloc diagram of the proposed algorithm is shown in Fig. 1. The algorithmic steps are given below. Step1: The audio signal X is partitioned into nonoverlapping segment SG, =1, 2,,(P P), each of size M. Step2: The watermar image W is scrambled by Arnold transformation technique to obtain scrambled watermar W s. Step3: The EMD process is applied on each segment SG and computes the norm of the extremes of the first IMF as below. Let e = {e 1, e 2,, e q } be the set extremes of the first IMF. The norm is obtained as follows: R = e = q i= 1 e i 2 (3) Step4: The watermar bits are embedded by quantizing the norm using user defined quantization parameter. Let H = R mod Case 1: If watermar bit = 0, then quantize the norm as follows 3 7 R + H if H R = 12 R + H, otherwise 10 Case 2: If watermar bit = 1, then quantize the norm as follows 3 3 R H if H R = 7 R otherwise + H 10 Step5: Then, modify the extremes of the first IMFs using the formula: R e = e (4) R Step6: Compute the modified segment SG w by inverse EMD process Step7: The watermared audio signal X w is obtained from all watermared segments.

4 771 Step4: Then, apply inverse Arnold transformation technique to obtain actual sequence of the extracted watermar image. Fig.1: Watermar Embedding Process 4.2 Extraction Process The bloc diagram of the extraction process of the proposed algorithm is shown in Fig. 2. The algorithmic steps are given below Step1:The watermared audio signal X w (possibly attaced) is partitioned into non-overlapping segment SG w, =1, 2,,P P, each of size M. Step2: EMD process is applied on each segment and the norm of the extremes of first IMF of the segment are computed as follows R = e Now, it is then quantized as follows H = R mod Step3: Finally, watermar bit is computed as follows 0 if H Watermar = 2 1 otherwise Fig.2: Watermar Extraction Process 5. EXPERIMENTAL RESULTS The proposed method is implemented in MATLAB environment. In this section, experimental results are presented to analyze effectiveness of the proposed watermaring algorithm. The results have been enumerated on two host audio signals namely, classical and jazz. The audio signals are 16-bit mono file in the WAVE format and has 44.1 Hz sampling rate. The original binary watermar image of size and its scrambled version are shown in Fig. 3. The host audio signals and its watermared version are shown in Fig. 4 and Fig. 5 respectively. In the proposed algorithm the audio signal is partitioned into non-overlapping segments with 64 samples. In this experiment quantization parameter is set as The effectiveness of the proposed technique is measured in terms of four properties namely, imperceptibility, robustness, payload and security. Due to the embedding of the watermar, the extremes of the IMF signal get modified and hence, the original host signal cannot be retrieved, i.e., proposed watermar method is a lossy method.

5 772 (a) (b) Fig.3: Binary Watermar: (a) Original, (b) Scrambled 5.1 Imperceptibility Test For the imperceptibility test of our proposed algorithm, signal-to-noise ratio (SNR) is used. It is defined as follows SNR = 10* log 10 L i1 L i1 x( i) x 2 x( i) w ( i) 2 ( db) Where x(i) and x w (i) are i th sample of the host audio signal and the watermared audio signal respectively. The higher value of SNR refers to the high quality watermared audio signals. That is perceptually no significant difference between original and watermared audio. This experiment results average SNR of the watermared signals is db which is relatively high compare to IFPI standard. 5.2 Robustness Test The following audio attacs are performed to evaluate the robustness of the algorithm. The audio editing and attacing tools used in the experiment are Adobe Audition 1.0 and Gold Wave The different attacs that are performed in this experiment are as follows: i. Additive white Gaussian noise (AWGN): White Gaussian noise is added to the watermared signal. ii. Amplitude reverse: Reverse the signs of the audio sample amplitude. iii. Re-quantization: The 16-bit watermared audio signals are re-quantized down to 8 bits/sample and then bac to 16 bits/ sample. iv. Cropping: Segments of 500 samples are removed from six different positions of the watermared audio signal and subsequently replaced by the segments of the attaced (with additive white Gaussian noise) watermared audio signal. v. Compression: The MPEG-1 layer-3 compression is applied. The watermared audio signal is compressed at the bit rate 128 bps, 64 bps, 48 bps and then decompressed bac to the WAVE format. (5) To measure the robustness of the algorithm under the attacs, bit error rate (BER) and normalized crosscorrelation (NC) are used. Normalized cross-correlation (NC) is used to compute the similarity between the original watermar and the extracted watermar and is defined as follows: W i, jw i, j (6) NC W,W = i i, j j W i, j W i, j Where W and W are the original and extracted watermars respectively, and i, j are positions of the binary watermar image. If NC(W,W ) is close to one, then the similarity between W and W is very high. If NC (W,W ) close to zero, then the similarity between W and W is very low. The bit error rate (BER) is used to compute the watermar detection accuracy after processing of audio attacs. The BER is defined as follows: BER W,W i, j W i, j W i, j (7) = P P The symbol is the XOR operator. Table 1 and Table 2 presented the BER (%), NC values, extracted watermar image from attaced watermared classical and jazz audio respectively. The result shows that the proposed method satisfies acceptable amount of robustness. In Table 3, we have compared the performance of several recent audio watermaring methods against compression, sorted by capacity. The proposed algorithm has the highest capacity. (a) Host classical audio signal

6 773 (b) Host jazz audio signal Fig.4: A plot of the two host audio signals 5.3 Capacity Fig.6: FPE probability versus number of watermar bits Then, the capacity CP (say) is defined as follows. N w CP = bps (8) T s The capacity (also called data payload) of the watermaring algorithm is defined as the number of bits that can be embedded into the audio signal within a unit of time and it is measured in the unit of bps (bits per second). Suppose, the length of host audio signal is T s seconds and the number of watermar bits is N w. Fig.7: FNE probability versus number of watermar bits (a) Watermared classical audio signal For the proposed algorithm, number of watermar bits is 1024 and length of the host audio signal is 1.86 seconds. Therefore, the capacity of the proposed method is bps. This is relatively very high as typical capacity is bps, shown in Table 3.Since capacity of the proposed method is very high compare to other methods, additional information may combined with watermar bits so that original host signal can be recovered after extraction of the watermar, i.e., the proposed method may be further extended to a lossless watermaring method. 5.4 Security (b) Watermared jazz audio signal Fig.5: A plot of the two watermared audio signals To improve the security of the watermar, Arnold transformation technique is applied for preprocessing the watermar before actual embedding into the host audio signal. Without Arnold matrix no one can generate the actual sequence of the watermar image. Hence, Arnold matrix is used as the first Secret Key in this wor. Since, this watermar embedding algorithm depends

7 774 completely on the quantization parameter value, so without the quantization value, it is impossible to extract the watermar. Hence, quantization parameter is used as another Secret Key. Therefore, two secret eys have used in this wor which enhance the security of the watermar. 6. PERFORMANCE ANALYSIS Two types of errors may occur while searching Table 1.BER and NC of extracted watermar image from watermared classical audio signal under different attacs Audio attacs No attacs BER (%) NC AWGN Cropping (128 bps) (64 bps) (48 bps) Extracted watermar the watermar sequence: (i) false positive error (FPE) and (ii) false negative error (FNE). These errors are very significant to evaluate the performance of the watermaring system. It is difficult to design an exact probabilistic model of FPE and FNE. Here, a simplified model based on binomial probability distribution, similar to [18], is adopted. 6.1 False Positive Error The FPE is the probability that an un-watermared audio signal is declared as watermared during extraction process. Less FPE probability implies better watermaring algorithm Let N w be the total number of watermar bits, and m be the number of matching bits. The false positive error probability can be evaluated as P FPE = P( P( w, w ) Th no watermar ) (9) Table 2.BER and NC of extracted watermar image from watermared jazz audio signal under different attacs Audio attacs No attacs BER (%) NC AWGN Cropping (128 bps) (64 bps) (48 bps) Extracted watermar Table 3.Comparison of audio watermaring methods, sorted by data capacity Reference Proposed Bhat et al. [9] J. Li et al. [8] L. Wang et al. [12] B. Y. Leiet al.[7] K. Khaldiet al. [14] Method Requantizati on Amplitud e reverse Requantizati on Amplitud e reverse EMD- QIM SVD- QIM LWT- QR-QIM EMDpsychoac oustic LWT- SVD EMD- QIM Capacity ( bps) Robust-ness to (bps)

8 775 Where Th is an application dependent threshold. In most of the practical application, expected value of P FPE is very low value. BER less than 25% can meet this demand and Th is set to 0.75 N w. Therefore, P FPE may be described as N w P Nw FPE = 2 N m0.75n w m w (10) Nw Where is binomial co-efficient. In this scheme, m N w =1024, hence the P FPE is close to 0. Indeed, putting N w =150 in Eq. (10) gives P FPE = , which means the P FPE is zero. Fig. 6 plots the P FPE for N w ϵ (0 100]. It is shown that P FPE approaches to 0 when N w = False Negative Error The FNE is the probability that a watermared audio signal is declared as un-watermared during extraction process. Less FNE probability implies better watermaring algorithm. The false negative error probability can be evaluated as follows: 0.75 Nw 1 m m P = N P 1 P N w FNE w (11) E E m= 0 m Here, P E may be obtained from BER in eq. (7) under different attacs. In this scheme, N w =1024, hence the P FNE is close to 0. Fig. 7 plots P FNE for N w ϵ (00]. It is shown that the P FNE approaches to 0 when N w is larger than CONCLUSION In this paper, a new blind audio watermaring algorithm based on empirical mode decomposition and quantization is proposed. The proposed method has very higher capacity compared to recent audio watermaring methods and shows acceptable robustness against different audio attacs. The error rates of the proposed method are very low. The proposed scheme is suitable for application lie copyright protection of digital multimedia data. The proposed method is a lossy one and may be extended to a lossless watermaring method. REFERENCES [1] V. B. K., I. Sengupta, and A. Das, An adaptive audio watermaring based on the singular value decomposition in the wavelet domain. Digital Signal Processing, vol. 20, pp , [2] A. Binny and M. Koilauntla, Hiding secret information Using lsb based audio Steganography, in Proc. of IEEE International Conferences on Soft Computing and Machine Intelligence, 2014, pp [3] P. Hu, D. Peng, Z. Yi, and Y. Xiang, Robust time-spread echo watermaring using characteristics of host signals, Electronics Letters, vol. 52, no. 1, 2016, pp [4] W.-N. Lie and L.-C. Chang, Robust and highquality time-domain audio watermaring on lowfrequency amplitude modification, IEEE Transaction on Multimedia, vol. 8, no. 1,2006, pp [5] S. Subbarayan and S. K. Ramanatha, Effective watermaring of digital audio and image using matlab technique, in Proc. of IEEE International Conferences on Vision, 2009, pp [6] P. K. Dhar and T. Shimamura, A blind lwt-based audio watermaring using fast walshhadamard transform and singular value decomposition, in Proc. of IEEE International Symposium on Circuits and Systems, 2014, pp [7] B. Y. Lei, I. Y. Soon, F. Zhou, Z. Li, and H. Lei, A robust Audio watermaring scheme based on lifting wavelet Transform and singular value decomposition, Signal Processing, vol. 92, 2012, pp [8] J. Li and T. Wu, Robust audio watermaring scheme via qim of correlation coefficients using lwt and qr decomposition, in Proc. of IEEE International Conferences on Informative and Cybernetics for Computational Social Systems, 2015, pp [9] V. B. K., I. Sengupta, and A. Das, An audio watermaring scheme using singular value decomposition and dither-modulation quantization, Multimed Tools Appl, vol. 52, 2011, pp [10] S. P. Mehobroba and T. V. Divya, Secret Audio Watermaring using Empirical Mode Decomposition and Chaotic Map, in Proc. of IEEE International Conferencee on Power, Instrumentation, Control and Computing, 2015, pp [11] N. E. Huang et al., The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis, Proc. R. Soc. Lond. A, vol. 454, 1998, pp

9 776 [12] L. Wang, S. Emmanuel and M. S. Kananalli, EMD and psychoacoustic model based watermaring for audio, IEEE International Conference on Multimedia Expo, 2010, pp [13] A. N. K. Zamam, K. M. I. Khalilullah, M.W. Islam, M. and M. K. I. Molla, A Robust Digital Audio Watermaring Algorithm Using Empirical Mode Decomposition,, in proc. of IEEE CCECE, 2010, pp [14] K. Khaldi and A. O. Boudraa, Audio Watermaring Via EMD, IEEE Transactions on Audio, Speech, and Language Processing, vol. 21, no , pp [15] M. Telespan and B. W. Schuller, Audio Watermaring Based On Empirical Mode Decomposition and Beat Detection, in Proc. of IEEE International Conference on Acoutics, Speech and Signal Processing, 2016, pp [16] J. Li and F. Wu, robust watermaring for text images based on Arnold scrambling and dwt-dft, in Proc. of IEEE International Conferences on Mechatronic Science, Electric Engineering and Computer, 2013, pp [17] X. C. Wen and C. Jing. An anti-statistical analysis LSB Steganography incorporating extended cat mapping. Berlin Heidelberg, 12(5): , [18] M. Fan and H. Wang, Chaos-based discrete fractional Sine transform domain audio watermaring scheme. Comp. Electrical Eng. 35(3), , 2009

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 7, October 2014, PP 7-12 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Scheme for Digital Audio Watermarking

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering

More information

High capacity robust audio watermarking scheme based on DWT transform

High capacity robust audio watermarking scheme based on DWT transform High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com

More information

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Neethu V PG Scholar, Dept. of ECE, Coimbatore Institute of Technology, Coimbatore, India. R.Kalaivani Assistant

More information

FPGA implementation of DWT for Audio Watermarking Application

FPGA implementation of DWT for Audio Watermarking Application FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade

More information

The main object of all types of watermarking algorithm is to

The main object of all types of watermarking algorithm is to Transformed Domain Audio Watermarking Using DWT and DCT Mrs. Pooja Saxena and Prof. Sandeep Agrawal poojaetc@gmail.com Abstract The main object of all types of watermarking algorithm is to improve performance

More information

Empirical Mode Decomposition: Theory & Applications

Empirical Mode Decomposition: Theory & Applications International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 873-878 International Research Publication House http://www.irphouse.com Empirical Mode Decomposition:

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

Atmospheric Signal Processing. using Wavelets and HHT

Atmospheric Signal Processing. using Wavelets and HHT Journal of Computations & Modelling, vol.1, no.1, 2011, 17-30 ISSN: 1792-7625 (print), 1792-8850 (online) International Scientific Press, 2011 Atmospheric Signal Processing using Wavelets and HHT N. Padmaja

More information

ICA & Wavelet as a Method for Speech Signal Denoising

ICA & Wavelet as a Method for Speech Signal Denoising ICA & Wavelet as a Method for Speech Signal Denoising Ms. Niti Gupta 1 and Dr. Poonam Bansal 2 International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(3), pp. 035 041 DOI: http://dx.doi.org/10.21172/1.73.505

More information

Introduction to Audio Watermarking Schemes

Introduction to Audio Watermarking Schemes Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia

More information

KONKANI SPEECH RECOGNITION USING HILBERT-HUANG TRANSFORM

KONKANI SPEECH RECOGNITION USING HILBERT-HUANG TRANSFORM KONKANI SPEECH RECOGNITION USING HILBERT-HUANG TRANSFORM Shruthi S Prabhu 1, Nayana C G 2, Ashwini B N 3, Dr. Parameshachari B D 4 Assistant Professor, Department of Telecommunication Engineering, GSSSIETW,

More information

Application of Hilbert-Huang Transform in the Field of Power Quality Events Analysis Manish Kumar Saini 1 and Komal Dhamija 2 1,2

Application of Hilbert-Huang Transform in the Field of Power Quality Events Analysis Manish Kumar Saini 1 and Komal Dhamija 2 1,2 Application of Hilbert-Huang Transform in the Field of Power Quality Events Analysis Manish Kumar Saini 1 and Komal Dhamija 2 1,2 Department of Electrical Engineering, Deenbandhu Chhotu Ram University

More information

An Enhanced Least Significant Bit Steganography Technique

An Enhanced Least Significant Bit Steganography Technique An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are

More information

Improving DWT-DCT-Based Blind Audio Watermarking Using Perceptually Energy-Compensated QIM

Improving DWT-DCT-Based Blind Audio Watermarking Using Perceptually Energy-Compensated QIM Journal of Computers Vol. 8, No. 4, 07, pp. 63-73 doi:0.3966/995590708804007 Improving DWT-DCT-Based Blind Audio Watermaring Using Perceptually Energy-Compensated QIM Hwai-Tsu Hu *, Szu-Hong Chen, and

More information

A Novel Approach for Signal Security and Video Transmission using Lower Bandwidth Technique

A Novel Approach for Signal Security and Video Transmission using Lower Bandwidth Technique A Novel Approach for Signal Security and Video Transmission using Lower Bandwidth Technique Dr.Paluchamy 1, Pranavsreerajhen.S 2, Raagesh.I 3, Rajkumar.R 4, Sherny.X 5 U.G Student, Department of Electronics

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

Research Article A Robust Zero-Watermarking Algorithm for Audio

Research Article A Robust Zero-Watermarking Algorithm for Audio Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 453580, 7 pages doi:10.1155/2008/453580 Research Article A Robust Zero-Watermarking Algorithm for

More information

An Audio Watermarking Method Based On Molecular Matching Pursuit

An Audio Watermarking Method Based On Molecular Matching Pursuit An Audio Watermaring Method Based On Molecular Matching Pursuit Mathieu Parvaix, Sridhar Krishnan, Cornel Ioana To cite this version: Mathieu Parvaix, Sridhar Krishnan, Cornel Ioana. An Audio Watermaring

More information

Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction

Ensemble Empirical Mode Decomposition: An adaptive method for noise reduction IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 5, Issue 5 (Mar. - Apr. 213), PP 6-65 Ensemble Empirical Mode Decomposition: An adaptive

More information

Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates

Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates 72 JOURNAL OF COMPUTERS, VOL., NO., MARCH 2 Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates Malay Kishore Dutta Department of Electronics Engineering, GCET, Greater Noida,

More information

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design 2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform J Inf Process Syst, Vol.13, No.5, pp.1331~1344, October 2017 https://doi.org/10.3745/jips.03.0042 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Data Hiding Algorithm for Images Using Discrete Wavelet

More information

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract

More information

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform

More information

DWT based high capacity audio watermarking

DWT based high capacity audio watermarking LETTER DWT based high capacity audio watermarking M. Fallahpour, student member and D. Megias Summary This letter suggests a novel high capacity robust audio watermarking algorithm by using the high frequency

More information

An Implementation of LSB Steganography Using DWT Technique

An Implementation of LSB Steganography Using DWT Technique An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication

More information

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

Abstract. Keywords: audio watermarking; robust watermarking; synchronization code; moving average

Abstract. Keywords: audio watermarking; robust watermarking; synchronization code; moving average A Synchronization Algorithm Based on Moving Average for Robust Audio Watermarking Scheme Zhang Jin quan and Han Bin (College of Information security engineering, Chengdu University of Information Technology,

More information

An Improvement for Hiding Data in Audio Using Echo Modulation

An Improvement for Hiding Data in Audio Using Echo Modulation An Improvement for Hiding Data in Audio Using Echo Modulation Huynh Ba Dieu International School, Duy Tan University 182 Nguyen Van Linh, Da Nang, VietNam huynhbadieu@dtu.edu.vn ABSTRACT This paper presents

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on

More information

Audio Watermarking Schemes and Embedding Algorithms

Audio Watermarking Schemes and Embedding Algorithms Audio Watermarking Schemes and Embedding Algorithms Dissertation submitted in the partial fulfillment of requirement for the award of degree of Master of Engineering in Electronics and Communication Submitted

More information

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing

More information

Robust Voice Activity Detection Based on Discrete Wavelet. Transform

Robust Voice Activity Detection Based on Discrete Wavelet. Transform Robust Voice Activity Detection Based on Discrete Wavelet Transform Kun-Ching Wang Department of Information Technology & Communication Shin Chien University kunching@mail.kh.usc.edu.tw Abstract This paper

More information

Lossless Image Watermarking for HDR Images Using Tone Mapping

Lossless Image Watermarking for HDR Images Using Tone Mapping IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

A Visual Cryptography Based Watermark Technology for Individual and Group Images

A Visual Cryptography Based Watermark Technology for Individual and Group Images A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,

More information

Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis

Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis Mohini Avatade & S.L. Sahare Electronics & Telecommunication Department, Cummins

More information

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Basic concepts of Digital Watermarking. Prof. Mehul S Raval Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography

More information

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Modified Skin Tone Image Hiding Algorithm for Steganographic Applications Geetha C.R., and Dr.Puttamadappa C. Abstract Steganography is the practice of concealing messages or information in other non-secret

More information

I-Hao Hsiao, Chun-Tang Chao*, and Chi-Jo Wang (2016). A HHT-Based Music Synthesizer. Intelligent Technologies and Engineering Systems, Lecture Notes

I-Hao Hsiao, Chun-Tang Chao*, and Chi-Jo Wang (2016). A HHT-Based Music Synthesizer. Intelligent Technologies and Engineering Systems, Lecture Notes I-Hao Hsiao, Chun-Tang Chao*, and Chi-Jo Wang (2016). A HHT-Based Music Synthesizer. Intelligent Technologies and Engineering Systems, Lecture Notes in Electrical Engineering (LNEE), Vol.345, pp.523-528.

More information

Audio Signal Compression using DCT and LPC Techniques

Audio Signal Compression using DCT and LPC Techniques Audio Signal Compression using DCT and LPC Techniques P. Sandhya Rani#1, D.Nanaji#2, V.Ramesh#3,K.V.S. Kiran#4 #Student, Department of ECE, Lendi Institute Of Engineering And Technology, Vizianagaram,

More information

(i) Understanding the basic concepts of signal modeling, correlation, maximum likelihood estimation, least squares and iterative numerical methods

(i) Understanding the basic concepts of signal modeling, correlation, maximum likelihood estimation, least squares and iterative numerical methods Tools and Applications Chapter Intended Learning Outcomes: (i) Understanding the basic concepts of signal modeling, correlation, maximum likelihood estimation, least squares and iterative numerical methods

More information

Dynamic Collage Steganography on Images

Dynamic Collage Steganography on Images ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to

More information

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect

More information

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error. Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy

More information

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT

More information

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,

More information

Audio watermarking using transformation techniques

Audio watermarking using transformation techniques Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2010 Audio watermarking using transformation techniques Rajkiran Ravula Louisiana State University and Agricultural and

More information

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio INTERSPEECH 2014 Audio Watermarking Based on Multiple Echoes Hiding for FM Radio Xuejun Zhang, Xiang Xie Beijing Institute of Technology Zhangxuejun0910@163.com,xiexiang@bit.edu.cn Abstract An audio watermarking

More information

Authentication of grayscale document images using shamir secret sharing scheme.

Authentication of grayscale document images using shamir secret sharing scheme. IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VII (Mar-Apr. 2014), PP 75-79 Authentication of grayscale document images using shamir secret

More information

INTEGER WAVELET TRANSFORM BASED APPROACH FOR HIGH ROBUSTNESS OF AUDIO SIGNAL TRANSMISSION

INTEGER WAVELET TRANSFORM BASED APPROACH FOR HIGH ROBUSTNESS OF AUDIO SIGNAL TRANSMISSION Volume 116 No. 23 2017, 295-304 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu INTEGER WAVELET TRANSFORM BASED APPROACH FOR HIGH ROBUSTNESS OF AUDIO

More information

A Novel (2,n) Secret Image Sharing Scheme

A Novel (2,n) Secret Image Sharing Scheme Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 619 623 C3IT-2012 A Novel (2,n) Secret Image Sharing Scheme Tapasi Bhattacharjee a, Jyoti Prakash Singh b, Amitava Nag c a Departmet

More information

Image Encryption Based on New One-Dimensional Chaotic Map

Image Encryption Based on New One-Dimensional Chaotic Map Image Encryption Based on New One-Dimensional Chaotic Map N.F.Elabady #1, H.M.Abdalkader *2, M. I. Moussa #3,S. F. Sabbeh #4 # Computer Science Department, Faculty of Computer and Informatics, Benha University,

More information

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of

More information

Image Compression Supported By Encryption Using Unitary Transform

Image Compression Supported By Encryption Using Unitary Transform Image Compression Supported By Encryption Using Unitary Transform Arathy Nair 1, Sreejith S 2 1 (M.Tech Scholar, Department of CSE, LBS Institute of Technology for Women, Thiruvananthapuram, India) 2 (Assistant

More information

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing ABSTRACT Audio steganography deals with a method to hide a secret message in an audio file. Also, Audio steganography can be used for secret watermarking or concealing ownership or copyright information

More information

Data Hiding in Digital Audio by Frequency Domain Dithering

Data Hiding in Digital Audio by Frequency Domain Dithering Lecture Notes in Computer Science, 2776, 23: 383-394 Data Hiding in Digital Audio by Frequency Domain Dithering Shuozhong Wang, Xinpeng Zhang, and Kaiwen Zhang Communication & Information Engineering,

More information

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW

More information

Audio and Speech Compression Using DCT and DWT Techniques

Audio and Speech Compression Using DCT and DWT Techniques Audio and Speech Compression Using DCT and DWT Techniques M. V. Patil 1, Apoorva Gupta 2, Ankita Varma 3, Shikhar Salil 4 Asst. Professor, Dept.of Elex, Bharati Vidyapeeth Univ.Coll.of Engg, Pune, Maharashtra,

More information

Enhance Image using Dynamic Histogram and Data Hiding Technique

Enhance Image using Dynamic Histogram and Data Hiding Technique _ Enhance Image using Dynamic Histogram and Data Hiding Technique 1 D.Bharadwaja, 2 Y.V.N.Tulasi 1 Department of CSE, Gudlavalleru Engineering College, Email: bharadwaja599@gmail.com 2 Department of CSE,

More information

Audio Watermarking Scheme in MDCT Domain

Audio Watermarking Scheme in MDCT Domain Santosh Kumar Singh and Jyotsna Singh Electronics and Communication Engineering, Netaji Subhas Institute of Technology, Sec. 3, Dwarka, New Delhi, 110078, India. E-mails: ersksingh_mtnl@yahoo.com & jsingh.nsit@gmail.com

More information

Meta-data based secret image sharing application for different sized biomedical

Meta-data based secret image sharing application for different sized biomedical Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy

More information

AdaBoost based EMD as a De-Noising Technique in Time Delay Estimation Application

AdaBoost based EMD as a De-Noising Technique in Time Delay Estimation Application International Journal of Computer Applications (975 8887) Volume 78 No.12, September 213 AdaBoost based EMD as a De-Noising Technique in Time Delay Estimation Application Kusma Kumari Cheepurupalli Dept.

More information

Guan, L, Gu, F, Shao, Y, Fazenda, BM and Ball, A

Guan, L, Gu, F, Shao, Y, Fazenda, BM and Ball, A Gearbox fault diagnosis under different operating conditions based on time synchronous average and ensemble empirical mode decomposition Guan, L, Gu, F, Shao, Y, Fazenda, BM and Ball, A Title Authors Type

More information

Robust watermarking based on DWT SVD

Robust watermarking based on DWT SVD Robust watermarking based on DWT SVD Anumol Joseph 1, K. Anusudha 2 Department of Electronics Engineering, Pondicherry University, Puducherry, India anumol.josph00@gmail.com, anusudhak@yahoo.co.in Abstract

More information

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding Youzhi Xiang 1, Zhaoxia Yin 1,*, Xinpeng Zhang 2 1 School of Computer Science and Technology, Anhui University 2 School

More information

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

ScienceDirect. A Novel DWT based Image Securing Method using Steganography Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based

More information

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Image Steganography using Sudoku Puzzle for Secured Data Transmission Image Steganography using Sudoku Puzzle for Secured Data Transmission Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A, Asst.Prof.Departemen t of CSE R.V College Of ABSTRACT Image Steganography

More information

Digital Image Sharing using Encryption Processes

Digital Image Sharing using Encryption Processes Digital Image Sharing using Encryption Processes Taniya Rohmetra 1, KshitijAnil Naik 2, Sayali Saste 3, Tejan Irla 4 Graduation Student, Department of Computer Engineering, AISSMS-IOIT, Pune University

More information

Visual Secret Sharing Based Digital Image Watermarking

Visual Secret Sharing Based Digital Image Watermarking www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,

More information

Assessment of Power Quality Events by Empirical Mode Decomposition based Neural Network

Assessment of Power Quality Events by Empirical Mode Decomposition based Neural Network Proceedings of the World Congress on Engineering Vol II WCE, July 4-6,, London, U.K. Assessment of Power Quality Events by Empirical Mode Decomposition based Neural Network M Manjula, A V R S Sarma, Member,

More information

Research Article Subband DCT and EMD Based Hybrid Soft Thresholding for Speech Enhancement

Research Article Subband DCT and EMD Based Hybrid Soft Thresholding for Speech Enhancement Advances in Acoustics and Vibration, Article ID 755, 11 pages http://dx.doi.org/1.1155/1/755 Research Article Subband DCT and EMD Based Hybrid Soft Thresholding for Speech Enhancement Erhan Deger, 1 Md.

More information

Audio Enhancement Using Remez Exchange Algorithm with DWT

Audio Enhancement Using Remez Exchange Algorithm with DWT Audio Enhancement Using Remez Exchange Algorithm with DWT Abstract: Audio enhancement became important when noise in signals causes loss of actual information. Many filters have been developed and still

More information

FPGA implementation of LSB Steganography method

FPGA implementation of LSB Steganography method FPGA implementation of LSB Steganography method Pangavhane S.M. 1 &Punde S.S. 2 1,2 (E&TC Engg. Dept.,S.I.E.RAgaskhind, SPP Univ., Pune(MS), India) Abstract : "Steganography is a Greek origin word which

More information

A Survey of Substantial Digital Image Watermarking Techniques

A Survey of Substantial Digital Image Watermarking Techniques A Survey of Substantial Digital Image Watermarking Techniques Neha Sharma 1, Rasmiranjan Samantray 2 1 Central College of Engineering and Management, Kabir Nagar, Raipur. Chhattisgarh Swami Vivekananda

More information

A New Compression Method for Encrypted Images

A New Compression Method for Encrypted Images Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen

More information

New binary image encryption algorithm based on combination of confusion and diffusion

New binary image encryption algorithm based on combination of confusion and diffusion Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):621-629 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 New binary image encryption algorithm based on combination

More information

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code IEICE TRANS. INF. & SYST., VOL.E98 D, NO.1 JANUARY 2015 89 LETTER Special Section on Enriched Multimedia Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code Harumi

More information

A High-Rate Data Hiding Technique for Uncompressed Audio Signals

A High-Rate Data Hiding Technique for Uncompressed Audio Signals A High-Rate Data Hiding Technique for Uncompressed Audio Signals JONATHAN PINEL, LAURENT GIRIN, AND (Jonathan.Pinel@gipsa-lab.grenoble-inp.fr) (Laurent.Girin@gipsa-lab.grenoble-inp.fr) CLÉO BARAS (Cleo.Baras@gipsa-lab.grenoble-inp.fr)

More information

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Khaly TALL 1, Mamadou Lamine MBOUP 1, Sidi Mohamed FARSSI 1, Idy DIOP 1, Abdou Khadre DIOP 1, Grégoire SISSOKO 2 1. Laboratoire

More information

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi

More information

REVERSIBLE data hiding, or lossless data hiding, hides

REVERSIBLE data hiding, or lossless data hiding, hides IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 10, OCTOBER 2006 1301 A Reversible Data Hiding Scheme Based on Side Match Vector Quantization Chin-Chen Chang, Fellow, IEEE,

More information

Analysis of Secure Text Embedding using Steganography

Analysis of Secure Text Embedding using Steganography Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science

More information

Evaluation of Audio Compression Artifacts M. Herrera Martinez

Evaluation of Audio Compression Artifacts M. Herrera Martinez Evaluation of Audio Compression Artifacts M. Herrera Martinez This paper deals with subjective evaluation of audio-coding systems. From this evaluation, it is found that, depending on the type of signal

More information

Keywords Secret data, Host data, DWT, LSB substitution.

Keywords Secret data, Host data, DWT, LSB substitution. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Localized Robust Audio Watermarking in Regions of Interest

Localized Robust Audio Watermarking in Regions of Interest Localized Robust Audio Watermarking in Regions of Interest W Li; X Y Xue; X Q Li Department of Computer Science and Engineering University of Fudan, Shanghai 200433, P. R. China E-mail: weili_fd@yahoo.com

More information

A Fast Image Encryption Scheme based on Chaotic Standard Map

A Fast Image Encryption Scheme based on Chaotic Standard Map A Fast Image Encryption Scheme based on Chaotic Standard Map Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law Department of Electronic Engineering, City University of Hong Kong, 83 Tat Chee Avenue,

More information

Chapter 2 Channel Equalization

Chapter 2 Channel Equalization Chapter 2 Channel Equalization 2.1 Introduction In wireless communication systems signal experiences distortion due to fading [17]. As signal propagates, it follows multiple paths between transmitter and

More information

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING Nedeljko Cvejic, Tapio Seppänen MediaTeam Oulu, Information Processing Laboratory, University of Oulu P.O. Box 4500, 4STOINF,

More information

Digital Watermarking Using Homogeneity in Image

Digital Watermarking Using Homogeneity in Image Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar

More information

An Adaptive Algorithm for Speech Source Separation in Overcomplete Cases Using Wavelet Packets

An Adaptive Algorithm for Speech Source Separation in Overcomplete Cases Using Wavelet Packets Proceedings of the th WSEAS International Conference on Signal Processing, Istanbul, Turkey, May 7-9, 6 (pp4-44) An Adaptive Algorithm for Speech Source Separation in Overcomplete Cases Using Wavelet Packets

More information

Robust and Blind Spatial Watermarking in Digital Image

Robust and Blind Spatial Watermarking in Digital Image Robust and lind Spatial Watermarking in Digital Image Santi Prasad Maity Malay Kumar Kundu Dept.of Electronics Telecomm. Machine Intelligence Unit.E.College(D.U.) Indian Statical Institute Howrah -711

More information

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM Shyam Shukla 1, Aparna Dixit 2 1 Information Technology, M.Tech, MBU, (India) 2 Computer Science, B.Tech, GGSIPU, (India) ABSTRACT The main goal of steganography

More information

Audio Fingerprinting using Fractional Fourier Transform

Audio Fingerprinting using Fractional Fourier Transform Audio Fingerprinting using Fractional Fourier Transform Swati V. Sutar 1, D. G. Bhalke 2 1 (Department of Electronics & Telecommunication, JSPM s RSCOE college of Engineering Pune, India) 2 (Department,

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:   Volume 4, Issue VI, June 2016 ISSN 4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering

More information