Audio Watermarking Based on Multiple Echoes Hiding for FM Radio

Size: px
Start display at page:

Download "Audio Watermarking Based on Multiple Echoes Hiding for FM Radio"

Transcription

1 INTERSPEECH 2014 Audio Watermarking Based on Multiple Echoes Hiding for FM Radio Xuejun Zhang, Xiang Xie Beijing Institute of Technology Abstract An audio watermarking system based on multiple echoes hiding is designed for frequency modulation (FM) broadcasting. The embedded watermarking information of 16 bits can be recovered from the receiver by recording the broadcast for any 1 second. On the premise of guaranteeing the high imperceptibility and robustness, the multiple echoes scheme we proposed has a higher capacity. The proposed system is tested on a semi-physical platform with the real channel transmission and the recovery rate reaches higher than 98%. Some attacks, such as white noise, filtering, re-sampling, adding an echo and re-quantization, are used to test the robustness. The subjective test result shows that the system has a good imperceptibility. Index Terms: echo hiding, audio watermarking, FM radio 1. Introduction In recent years, there have been increasing researches interesting in delivering information by audio for its convenience and low cost. Audio watermarking is a hopeful technique to solve this problem. From the technical aspect, audio watermarking aims to embed proprietary data into the audio object. When necessary, the owners can extract these data. For example, the bank card number can be embedded into the audio, and we can accomplish electronic payment by just playing the watermarked audio. The available audio watermarking schemes can be classified into the following four categories: phase coding [1], spread spectrum modulation [2], patchwork [3], and echo hiding [4-6]. Among them, echo hiding algorithm has natural advantages in imperceptibility. In addition, the advantages are also reflected in low complexity, no additive noise, blind detection, low requirements for synchronization act which makes it very attractive to researchers. An effective and practical audio watermarking method should possess three important traits: imperceptibility, robustness, and information capacity. The sound in a real life we heard is a sound with multiple echoes for sound in a real room including multiple reflections from the walls and other objects in the room [7]. That is multiple echoes can provide a more natural sound quality than only a single echo. So the echo-hiding watermarking methods in [4] [6] which utilized a single echo has a relatively large damage on audio quality. In order to guarantee better imperceptibility, the multiple echoes system is proposed by Xulai Cao [8]. A challenging task for watermarking system based on multiple echoes scheme is the trade-off between robustness and capacity. Especially in the application of delivering information, the capacity should be paid more attention. In this paper, the theoretical upper limit of the echoes number in multiple echoes system is pointed out by our analysis. Based on this, we designed an echo hiding system with multiple echoes which can be used in FM radio. The multiple echoes scheme we proposed embeds a symbol which includes 16 bits binary number into 1 segment. Compared with the multiple echoes scheme in [8] which embedded 1 bit binary number into 1 segment, our algorithm achieves higher capacity. Our system is tested on a semi-physical platform with the real channel transmission and shows a better performance. The paper is organized as follows. Section 2 briefly introduces the echo hiding schemes. An echo hiding system is proposed in Section 3. Section 4 gives the experiment results. Conclusions are given in section Echo hiding scheme The basic idea of the echo hiding scheme is to add an echo which is inaudible by human ear to the original audio. It takes advantage of the temporal masking effect of human ear. The traditional echo kernel is expressed as h() =() ( ) (1) where h() is the echo kernel, δ(n) represents the unit-impulse function, and α denotes the amplitude of the echo. The delay d of the echo is decided by the values of the embedded bit. Let x(n) represent the host signal, the watermarked signal can be expressed as () =() h() =() ( ) (2) The specific process of the encoding is described as follows Step 1: Divide the host signal x(n) into several consecutive segments which contain the same number of samples. Step 2: Embed 1 bit into each segment by the different delay: represents bit 0, and represents bit 1. Step 3: Combine the segments with hiding message into a continuous audio signal. We use the power cepstrum of the watermarked signal to extract the watermark. The power cepstrum of the signal is defined as () = () =() h() (3) Then take (2) into (3), we can get [] = () () ( ) ( ) (4) where () is the power cepstrum of the host signal. From (4), we can see the power cepstrum of the watermarked signal appear a peak at the delay offset d. Then, the embedded information can be extracted by checking the amplitude at or. 3. Proposed echo hiding system The diagram of the whole system is demonstrated in Fig.1. The system mainly consists of three parts: the watermark embedded part, FM transmission part, and the watermark extraction part. Copyright 2014 ISCA September 2014, Singapore

2 Original watermark Extracted watermark Figure 1: the block diagram of the system The theoretical upper limit of the echoes number Differing from multiple echoes scheme in [8], the multiple echoes algorithm we proposed embeds a symbol which includes 16 bits binary number instead of 1 bit binary number into 1 segment. The multiple echoes kernel is described as h() =() ( ) (5) where J (J 2) denotes the number of echoes represents the delay of the each echo. The different delays represent different binary number. It is vital to guarantee there is a peak in each delay sample in the power cepstrum of the watermarked signal so that we can extract the watermark exactly. With the increasing of the echoes number, the interference between each echo becomes stronger. So the maximum number of echoes is needed to be anatomized so that we can extract the watermark accurately. Take (5) to (3), we can get () () () { [( ) ( )] } ( ( )( ( )) [ ( )( )]} [ ( ) ( )] (6) We can see that there are two kinds of peaks in the power cepstrum. First is the peaks in the delay offset. with the amplitude 2, which are needed to extract the hiding information, we call them delay peaks. The second is the peaks in (1 < ) with the amplitude, called interference peaks. The number of the interference peaks is. Watermark encoder Extraction Original audio Embedded algorithm Record FM emitter channel FM receiver In the decoder, the watermark is extracted by seeking the location of the peaks positions. That is, we can gain high robustness only by insuring that the amplitude of delay peaks is always larger than the amplitude of interference peaks. Otherwise, the location of the peaks positions we seek is interference peaks position (1 < ) rather than the delay peak position. Assume a limiting case that all the interference peaks appear in the same position, the amplitude will reach the maximum. If the maximized amplitude of the interference peaks is equal to the amplitude of the delay peak, we can t differentiate which are the delay peaks in the power cepstrum. The value of in this situation is the upper limit of the echoes number. That is ( ) Applying (3) to (8) J = = (7) From (8), we can see that the theoretical upper limit of the echoes number is related to the amplitude of the echo. J =4 when is chosen as 0.4. Gruhl et al. have proved that all signals showed acceptable accuracy with a decay rate between 0.3 and 0.4, and even those with exceptional hearing have difficulty resolving the echoes [10] Embedding algorithm We know from the analysis above that the echo kernel can be described as follows h() =() ( ) ( ) (9) Unlike the traditional algorithm, a symbol consists of 16bits binary number is embedded into 1 segment integrally. Set a symbol={a 0, a 1, a 2, a 3, a 4, a 5, a 6, a 7, a 8, a 9, a 10, a 11, a 12, a 13, a 14, a 15 } and 1 segment is (). The symbol is first changed to a 4 4 matrix, then transforms four binary in each column into the corresponding hexadecimal, we can obtain four hexadecimal number [b1, b2, b3, b4], where [0,15], l [1,4]. The next task is to embed each hexadecimal number into each echo. It is formulated as follows. Step 1: Calculate the delay of the first echo =M (10) where is the minimum value of. ( F 1) is the minimum interval of, we call it resolution. Table.1 shows the relationship between and delay. Table 1. Relationship between and. b 1 d 1 0 M 1 MF 15 M15F Step 2: Work out the rest of the delays = (11) = (12) = (13) From (10)-(13), we can know that is always bigger than, and the minimum interval between them is ( 1), we call it bracer. This algorithm ensures that the delays of four-way echoes signals is increasing, that is d 4 >d 3 >d 2 >d 1. Thus, the peaks of the power cepstrum in the delays are easily distinguished, which is shown in Fig.2. Then the watermark information is extracted by the value of corresponding. Step 3: The watermarked signal is the temporal convolution of () and h() () = () h() (14) Fig.3 illustrates how watermark is embedded into a host signal. (8) 1387

3 3.3. Parameter analysis Figure 2: The power cepstrum of 1 second watermarked signal in computer simulation. x(n) * δ(n) αδ(n ) αδ(n ) αδ(n ) αδ(n ) h(n) 1 x(n) α x(n-d 1 ) α x(n-d 2 ) α x(n-d 3 ) α x(n-d 4 ) y(n) d 1 d 2 d 3 d 4 * Figure 3: Schemetic explanation of how watermark is embedded. The scope of interference peak position M M60F3K K 45F3K The scope of delay peak position Figure 4: The position of the two kinds of peaks. t Echo 1 Echo 2 Echo 3 Echo 4 Watermarked signal t Parameter M Form (10) to (13) and the scope of, we know that the maximum of is 60 3, which is also the maximum of all the delays. That is the position of the delay peak is in the scope of [M, M60F3K]. From analysis above, we know that the position of interference peaks are,,,,,. From (10) to (13), we can calculate that =3 ( 2) [K, 15F K] (15) =3 ( 4) [2K,30F2K] (16) =3 ( 6) [3K, 45F 3K] (17) =3 ( 2) [K,15FK] (18) =3 ( 4) [2K, 30F 2K] (19) =3 ( 2) [K,15FK] (20) Form (15) to (20), we know that the position of the interference peak is in the scope of [K,45F3K]. Fig.4 showed that the peaks in the intersection region [M, 45F3K] can t be judged which kind of peak it belongs to. In order to eliminate the cross interference between the delay peak and the interference peak, the parameter M is ascertained as 45F3K1. In this way, there is no intersection region between the two kinds of peaks Parameter F and K The accurate rate ( ) is defined as: = 100% (21) where a symbol contains 16 bits information. Delay time will affect detecting performance and the subjective quality of echoed audio signal. It is difficult to detect the position of echo for too short delay time, and as a result, the is low. The energy of echoes will be less and the subjective quality will be bad for long delay time. According to the methods in [9], delay time belonging to 2ms~6ms is acceptable both for detecting performance and the subjective quality. There are 64 delay positions in our system and the maximum delay time of ensuring the imperceptibility is 6ms. Thus, the maximum temporary resolution is about 0.1ms. In this way, the Min Samples is 10kHz. Here, the host audio we chose is sampled at 44.1 khz sampling rate with 16-bit quantization. From (10) to (13), we know that the minimum delay time of is M which is also the minimum delay time of all echoes and the delay time of is M60F3K which is the maximum delay time. So it needs to meet the two equations M 60F 3K f (22) M f t (23) where is the maximum delay time, t is the minimum delay time and f is the sampling frequency. Applying (22),(23) to (24), the following conclusion is straightforward 17.5F K 44 15F K 29 (24) It is proved that the super parameters F =2,K [1,9]. 4. Experiments In order to estimate the performance of the system, we first test the capacity of the proposed echo hiding scheme. Some attacks are also used to measure the robustness of the algorithm. The subjective test result showed that the embedded 1388

4 algorithm has a good imperceptibility. Then the echo hiding scheme is used on FM broadcast system with a semi-physical platform to estimate the performance of the whole system. Twenty uncompressed audio clips are used as host audio and the parameter F=9. These 20 clips were sampled at 44.1 khz sampling rate with 16-bit quantization and belong to 5 different audio groups as illustrated in Table 2. Table 2. signal used in simulation. Host Signal Genres S 01 -S 04 Chinese Rock S 05 -S 08 Disc Jockey S 09 -S 12 Eastern Classic Songs S 13 -S 16 Foreign Songs S 17 -S 20 Pop Songs 4.1. The performance of echo hiding scheme Transmission rate test The results of the transmission rate comparison between the proposed algorithm and the scheme in [8] are showed in table.3. A symbol contains 16 bits is embedded into one segment in the algorithm we proposed, so it is feasible to control the transmission rate by varying the length of segment. For example, when the length of the segment is changed to 0.5 second, which means we embed a symbol per 0.5 second, thus the transmission rate is 32 bits/s. Obviously, proposed kernel shows a better extraction performance than conventional echo methods especially when we increase the transmission rate. Table 3. Result of transmission rate test. Transmission rate (%) (bits/s) Proposed method in [8] Robustness test In daily life, the audio files often need to carry out several necessary signal processing operations. So it is necessary to test the performance after the signal processing operations which is illustrated in table.4. Table 4. Detail of attack. attack Detailed Description high-pass filtering >5khz Low-pass filtering <5.5khz Resampling 44.1k 22.05k 44.1k Requantization 16bits 8bits 16bits Noise Addition SNR=20db Additional Echo Delay=8ms, α=0.1 Table 5. Result of attack test. attack (%) Proposed method in [8] high-pass filtering Low-pass filtering Resampling Requantization Noise Addition Additional Echo From table.5, we can see the proposed kernel have a better performance to signal processing operations comparing with the conventional echo hiding Subjective test We adopt AB test method to test the quality of watermarked audio. In this test, each of the participants chose the partial audio from the pair of host audio and the watermarked audio. 10 subjects are required to listen 20 audio clip pairs respectively. The result is shown in Table.6. Table 6. Result of subjective test. prefer Watermarked audio number rate The almost half-to-half rate indicates that our watermarking process does not obvious damage on the hearing quality of host audio Performance of the whole system The FM, which is band-limited to below 16kHz, meets the minimum sampling rate. The proposed system is utilized on and the performance showed in Table.7. With the increase of the recording distance, SNR will decrease which inevitable leads to low. As we can see in Table.6, the system has a good performance with the transmission rate of 16 bits/s and the recording distance can reach 4 meters with 90.05%. Table 7. Test result of the whole system. Distance (%) 10cm cm meters meters meters meters meters Conclusion In this paper, we designed an audio watermarking system based on the multiple echoes kernel. Theoretical upper limit of the echoes number and detection gain is derived. Then we describe how we embed watermark into the host audio in detail. Finally, it is used in FM broadcast system to increase the transmission distance and we can recover the embedded information by recording the FM broadcast. On the premise of guaranteeing the high imperceptibility and robustness, the multiple echoes scheme we proposed has a higher capacity. The proposed system is tested on a semi-physical platform with the real channel transmission and experimental results show the system has a good performance. How to differentiate the multiple embedding positions accurately and decrease the computational complexity are the coming problems needed to be solved. 6. Acknowledgements This work is supported by National Nature Science Foundation of China (NSFC): Grant No and No

5 7. References [1] M. Arnold, P. G. Baum, and W. Voeßing, A phase modulation audio watermarking technique, in Proc. Lecture Notes in Computer Science, 2009, vol. 5806, pp [2] A. Valizadeh and Z. J. Wang, Correlation-and-bit-aware spread spectrum embedding for data hiding, IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp , Jun [3] H. Kang, K. Yamaguchi, B. Kurkoski, K. Yamaguchi, and K. Kobayashi, Full-index-embedding patchwork algorithm for audio watermarking, IEICE Trans. Inf. Syst., vol. E91-D, no. 11, pp , Nov [4] O. T.-C. Chen and W.-C. Wu, Highly robust, secure, and perceptual quality echo hiding scheme, IEEE Trans. Audio, Speech, Language Process., vol. 16, no. 3, pp , Mar [5] Hyoung Joongn Kim, Yong Hee Choi, A Novel Echo-Hiding Scheme with Backward and Forward Kernels, IEEE transactions on circuits and systems for video technology, 13(8), pp , [6] O. T.-C. Chen and W.-C. Wu, Highly robust, secure, and perceptualquality echo hiding scheme, IEEE Trans. Audio, Speech, Language Process., vol. 16, no. 3, pp , Mar [7] B.-S. Ko, R. Nishimura, and Y. Suzuki, Time-spread echo method for digital audio watermarking, IEEE Trans.Multimedia, vol. 7, no. 2, pp , Apr [8] Xulai Cao, Linghua ZHANG, Researches on Echo Kernels of Audio Digital Watermarking Technology Based on Echo Hiding, International Conference on Wireless Communications and Signal Processing (WCSP 2011), p.5pp., 2011 [9] D. Gruhl and W. Bender, Echo hiding, Proceeding of Information Hiding Workshop, Cambridge, U.K., pp , [10] LI LI, YA-QI SONG, EXPERIMENTAL RESEARCH ON PARAMETER SELECTION OF ECHO HIDING IN VOICE, Eighth International Conference on Machine Learning and Cybernetics (ICMLC), p ,

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

High capacity robust audio watermarking scheme based on DWT transform

High capacity robust audio watermarking scheme based on DWT transform High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com

More information

DWT based high capacity audio watermarking

DWT based high capacity audio watermarking LETTER DWT based high capacity audio watermarking M. Fallahpour, student member and D. Megias Summary This letter suggests a novel high capacity robust audio watermarking algorithm by using the high frequency

More information

Introduction to Audio Watermarking Schemes

Introduction to Audio Watermarking Schemes Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

11th International Conference on, p

11th International Conference on, p NAOSITE: Nagasaki University's Ac Title Audible secret keying for Time-spre Author(s) Citation Matsumoto, Tatsuya; Sonoda, Kotaro Intelligent Information Hiding and 11th International Conference on, p

More information

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING Nedeljko Cvejic, Tapio Seppänen MediaTeam Oulu, Information Processing Laboratory, University of Oulu P.O. Box 4500, 4STOINF,

More information

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing

More information

An Improvement for Hiding Data in Audio Using Echo Modulation

An Improvement for Hiding Data in Audio Using Echo Modulation An Improvement for Hiding Data in Audio Using Echo Modulation Huynh Ba Dieu International School, Duy Tan University 182 Nguyen Van Linh, Da Nang, VietNam huynhbadieu@dtu.edu.vn ABSTRACT This paper presents

More information

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT Method to Improve Watermark Reliability Adam Brickman EE381K - Multidimensional Signal Processing May 08, 2003 ABSTRACT This paper presents a methodology for increasing audio watermark robustness. The

More information

Performance Analysis of Parallel Acoustic Communication in OFDM-based System

Performance Analysis of Parallel Acoustic Communication in OFDM-based System Performance Analysis of Parallel Acoustic Communication in OFDM-based System Junyeong Bok, Heung-Gyoon Ryu Department of Electronic Engineering, Chungbuk ational University, Korea 36-763 bjy84@nate.com,

More information

Zero-Based Code Modulation Technique for Digital Video Fingerprinting

Zero-Based Code Modulation Technique for Digital Video Fingerprinting Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and

More information

Acoustic Communication System Using Mobile Terminal Microphones

Acoustic Communication System Using Mobile Terminal Microphones Acoustic Communication System Using Mobile Terminal Microphones Hosei Matsuoka, Yusuke Nakashima and Takeshi Yoshimura DoCoMo has developed a data transmission technology called Acoustic OFDM that embeds

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

Audio Watermark Detection Improvement by Using Noise Modelling

Audio Watermark Detection Improvement by Using Noise Modelling Audio Watermark Detection Improvement by Using Noise Modelling NEDELJKO CVEJIC, TAPIO SEPPÄNEN*, DAVID BULL Dept. of Electrical and Electronic Engineering University of Bristol Merchant Venturers Building,

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

IT is well known that digital watermarking( WM) is an

IT is well known that digital watermarking( WM) is an Proceedings of the Federated Conference on Computer Science and Information Systems pp. 727 732 ISBN 978-83-60810-51-4 The Use of Wet Paper Codes With Audio Watermarking Based on Echo Hiding Valery Korzhik

More information

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Available online at  ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Available online at www.sciencedirect.com ScienceDirect Procedia Technology ( 23 ) 7 3 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 23) BER Performance of Audio Watermarking

More information

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 7, October 2014, PP 7-12 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Scheme for Digital Audio Watermarking

More information

Lossless Image Watermarking for HDR Images Using Tone Mapping

Lossless Image Watermarking for HDR Images Using Tone Mapping IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar

More information

Printed Document Watermarking Using Phase Modulation

Printed Document Watermarking Using Phase Modulation 1 Printed Document Watermarking Using Phase Modulation Chabukswar Hrishikesh Department Of Computer Engineering, SBPCOE, Indapur, Maharastra, India, Pise Anil Audumbar Department Of Computer Engineering,

More information

Data Hiding in Digital Audio by Frequency Domain Dithering

Data Hiding in Digital Audio by Frequency Domain Dithering Lecture Notes in Computer Science, 2776, 23: 383-394 Data Hiding in Digital Audio by Frequency Domain Dithering Shuozhong Wang, Xinpeng Zhang, and Kaiwen Zhang Communication & Information Engineering,

More information

Performance Improving LSB Audio Steganography Technique

Performance Improving LSB Audio Steganography Technique ISSN: 2321-7782 (Online) Volume 1, Issue 4, September 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Performance

More information

Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates

Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates 72 JOURNAL OF COMPUTERS, VOL., NO., MARCH 2 Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates Malay Kishore Dutta Department of Electronics Engineering, GCET, Greater Noida,

More information

License Plate Localisation based on Morphological Operations

License Plate Localisation based on Morphological Operations License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract

More information

Abstract. Keywords: audio watermarking; robust watermarking; synchronization code; moving average

Abstract. Keywords: audio watermarking; robust watermarking; synchronization code; moving average A Synchronization Algorithm Based on Moving Average for Robust Audio Watermarking Scheme Zhang Jin quan and Han Bin (College of Information security engineering, Chengdu University of Information Technology,

More information

Study on OFDM Symbol Timing Synchronization Algorithm

Study on OFDM Symbol Timing Synchronization Algorithm Vol.7, No. (4), pp.43-5 http://dx.doi.org/.457/ijfgcn.4.7..4 Study on OFDM Symbol Timing Synchronization Algorithm Jing Dai and Yanmei Wang* College of Information Science and Engineering, Shenyang Ligong

More information

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG

More information

23rd European Signal Processing Conference (EUSIPCO) ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING

23rd European Signal Processing Conference (EUSIPCO) ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING Nhut Minh Ngo, Brian Michael Kurkoski, and Masashi Unoki School of Information Science, Japan Advanced Institute

More information

Chapter 2 Audio Watermarking

Chapter 2 Audio Watermarking Chapter 2 Audio Watermarking 2.1 Introduction Audio watermarking is a well-known technique of hiding data through audio signals. It is also known as audio steganography and has received a wide consideration

More information

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code IEICE TRANS. INF. & SYST., VOL.E98 D, NO.1 JANUARY 2015 89 LETTER Special Section on Enriched Multimedia Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code Harumi

More information

Watermarking patient data in encrypted medical images

Watermarking patient data in encrypted medical images Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation

More information

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption

More information

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering

More information

FPGA implementation of DWT for Audio Watermarking Application

FPGA implementation of DWT for Audio Watermarking Application FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade

More information

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,

More information

Robust Voice Activity Detection Based on Discrete Wavelet. Transform

Robust Voice Activity Detection Based on Discrete Wavelet. Transform Robust Voice Activity Detection Based on Discrete Wavelet Transform Kun-Ching Wang Department of Information Technology & Communication Shin Chien University kunching@mail.kh.usc.edu.tw Abstract This paper

More information

Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection

Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 7, April 4, -3 Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection Karen Egiazarian, Pauli Kuosmanen, and Radu Ciprian Bilcu Abstract:

More information

Multi Modulus Blind Equalizations for Quadrature Amplitude Modulation

Multi Modulus Blind Equalizations for Quadrature Amplitude Modulation Multi Modulus Blind Equalizations for Quadrature Amplitude Modulation Arivukkarasu S, Malar R UG Student, Dept. of ECE, IFET College of Engineering, Villupuram, TN, India Associate Professor, Dept. of

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS

DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS John Yong Jia Chen (Department of Electrical Engineering, San José State University, San José, California,

More information

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design 2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital

More information

TRANSIENT NOISE REDUCTION BASED ON SPEECH RECONSTRUCTION

TRANSIENT NOISE REDUCTION BASED ON SPEECH RECONSTRUCTION TRANSIENT NOISE REDUCTION BASED ON SPEECH RECONSTRUCTION Jian Li 1,2, Shiwei Wang 1,2, Renhua Peng 1,2, Chengshi Zheng 1,2, Xiaodong Li 1,2 1. Communication Acoustics Laboratory, Institute of Acoustics,

More information

Data Hiding In Audio Signals

Data Hiding In Audio Signals Data Hiding In Audio Signals Deepak garg 1, Vikas sharma 2 Student, Dept. Of ECE, GGGI,Dinarpur,Ambala Haryana,India 1 Assistant professor,dept.of ECE, GGGI,Dinarpur,Ambala Haryana,India 2 ABSTRACT Information

More information

Mel Spectrum Analysis of Speech Recognition using Single Microphone

Mel Spectrum Analysis of Speech Recognition using Single Microphone International Journal of Engineering Research in Electronics and Communication Mel Spectrum Analysis of Speech Recognition using Single Microphone [1] Lakshmi S.A, [2] Cholavendan M [1] PG Scholar, Sree

More information

A Visual Cryptography Based Watermark Technology for Individual and Group Images

A Visual Cryptography Based Watermark Technology for Individual and Group Images A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

ROBUST PITCH TRACKING USING LINEAR REGRESSION OF THE PHASE

ROBUST PITCH TRACKING USING LINEAR REGRESSION OF THE PHASE - @ Ramon E Prieto et al Robust Pitch Tracking ROUST PITCH TRACKIN USIN LINEAR RERESSION OF THE PHASE Ramon E Prieto, Sora Kim 2 Electrical Engineering Department, Stanford University, rprieto@stanfordedu

More information

Direct Binary Search Based Algorithms for Image Hiding

Direct Binary Search Based Algorithms for Image Hiding 1 Xia ZHUGE, 2 Koi NAKANO 1 School of Electron and Information Engineering, Ningbo University of Technology, No.20 Houhe Lane Haishu District, 315016, Ningbo, Zheiang, China zhugexia2@163.com *2 Department

More information

A New Compression Method for Encrypted Images

A New Compression Method for Encrypted Images Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen

More information

Journal of American Science 2015;11(7)

Journal of American Science 2015;11(7) Design of Efficient Noise Reduction Scheme for Secure Speech Masked by Signals Hikmat N. Abdullah 1, Saad S. Hreshee 2, Ameer K. Jawad 3 1. College of Information Engineering, AL-Nahrain University, Baghdad-Iraq

More information

TIME encoding of a band-limited function,,

TIME encoding of a band-limited function,, 672 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 53, NO. 8, AUGUST 2006 Time Encoding Machines With Multiplicative Coupling, Feedforward, and Feedback Aurel A. Lazar, Fellow, IEEE

More information

Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique

Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique Wen-Yuan Chen, Jen-Tin Lin, Chi-Yuan Lin, and Jin-Rung Liu Department of Electronic Engineering, National Chin-Yi Institute of Technology,

More information

Multi-GI Detector with Shortened and Leakage Correlation for the Chinese DTMB System. Fengkui Gong, Jianhua Ge and Yong Wang

Multi-GI Detector with Shortened and Leakage Correlation for the Chinese DTMB System. Fengkui Gong, Jianhua Ge and Yong Wang 788 IEEE Transactions on Consumer Electronics, Vol. 55, No. 4, NOVEMBER 9 Multi-GI Detector with Shortened and Leakage Correlation for the Chinese DTMB System Fengkui Gong, Jianhua Ge and Yong Wang Abstract

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST On the Use of Masking Models for Image and Audio Watermarking

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST On the Use of Masking Models for Image and Audio Watermarking IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST 2005 727 On the Use of Masking Models for Image and Audio Watermarking Arnaud Robert and Justin Picard Abstract In most watermarking systems, masking

More information

Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm

Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm A.T. Rajamanickam, N.P.Subiramaniyam, A.Balamurugan*,

More information

Blind Source Separation for a Robust Audio Recognition Scheme in Multiple Sound-Sources Environment

Blind Source Separation for a Robust Audio Recognition Scheme in Multiple Sound-Sources Environment International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 25) Blind Source Separation for a Robust Audio Recognition in Multiple Sound-Sources Environment Wei Han,2,3,

More information

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing ABSTRACT Audio steganography deals with a method to hide a secret message in an audio file. Also, Audio steganography can be used for secret watermarking or concealing ownership or copyright information

More information

Research on DQPSK Carrier Synchronization based on FPGA

Research on DQPSK Carrier Synchronization based on FPGA Journal of Information Hiding and Multimedia Signal Processing c 27 ISSN 273-422 Ubiquitous International Volume 8, Number, January 27 Research on DQPSK Carrier Synchronization based on FPGA Shi-Jun Kang,

More information

Time-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness

Time-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness Time-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness Guang Hua, Jonathan Goh, and Vrizlynn, L. L. Thing Abstract We present a time-spread echo-based audio watermarking

More information

Experimental Investigation of IEEE802.11n Reception with Fractional Sampling

Experimental Investigation of IEEE802.11n Reception with Fractional Sampling 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Experimental Investigation of IEEE802.11n Reception with Fractional Sampling Ryosuke Nakamura, Yukitoshi Sanada

More information

Department of Electronics and Communication Engineering 1

Department of Electronics and Communication Engineering 1 UNIT I SAMPLING AND QUANTIZATION Pulse Modulation 1. Explain in detail the generation of PWM and PPM signals (16) (M/J 2011) 2. Explain in detail the concept of PWM and PAM (16) (N/D 2012) 3. What is the

More information

A Blind EMD-based Audio Watermarking using Quantization

A Blind EMD-based Audio Watermarking using Quantization 768 A Blind EMD-based Audio Watermaring using Quantization Chinmay Maiti 1, Bibhas Chandra Dhara 2 Department of Computer Science & Engineering, CEMK, W.B., India, chinmay@cem.ac.in 1 Department of Information

More information

UNIT TEST I Digital Communication

UNIT TEST I Digital Communication Time: 1 Hour Class: T.E. I & II Max. Marks: 30 Q.1) (a) A compact disc (CD) records audio signals digitally by using PCM. Assume the audio signal B.W. to be 15 khz. (I) Find Nyquist rate. (II) If the Nyquist

More information

Clipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication

Clipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication Clipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication Presented by Jian Song jsong@tsinghua.edu.cn Tsinghua University, China 1 Contents 1 Technical Background 2 System

More information

Robust Low-Resource Sound Localization in Correlated Noise

Robust Low-Resource Sound Localization in Correlated Noise INTERSPEECH 2014 Robust Low-Resource Sound Localization in Correlated Noise Lorin Netsch, Jacek Stachurski Texas Instruments, Inc. netsch@ti.com, jacek@ti.com Abstract In this paper we address the problem

More information

Rake-based multiuser detection for quasi-synchronous SDMA systems

Rake-based multiuser detection for quasi-synchronous SDMA systems Title Rake-bed multiuser detection for qui-synchronous SDMA systems Author(s) Ma, S; Zeng, Y; Ng, TS Citation Ieee Transactions On Communications, 2007, v. 55 n. 3, p. 394-397 Issued Date 2007 URL http://hdl.handle.net/10722/57442

More information

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Neethu V PG Scholar, Dept. of ECE, Coimbatore Institute of Technology, Coimbatore, India. R.Kalaivani Assistant

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

Ninad Bhatt Yogeshwar Kosta

Ninad Bhatt Yogeshwar Kosta DOI 10.1007/s10772-012-9178-9 Implementation of variable bitrate data hiding techniques on standard and proposed GSM 06.10 full rate coder and its overall comparative evaluation of performance Ninad Bhatt

More information

Robust Audio Watermarking Algorithm Based on Air Channel Characteristics

Robust Audio Watermarking Algorithm Based on Air Channel Characteristics 2018 IEEE Third International Conference on Data Science in Cyberspace Robust Audio Watermarking Algorithm Based on Air Channel Characteristics Wen Diao, Yuanxin Wu, Weiming Zhang, Bin Liu, Nenghai Yu

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING

More information

An Enhanced Least Significant Bit Steganography Technique

An Enhanced Least Significant Bit Steganography Technique An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are

More information

Peculiarities of use of speech acoustic environment while embedding into it of hidden message codes

Peculiarities of use of speech acoustic environment while embedding into it of hidden message codes cientific Journals Maritime University of zczecin Zeszyty Naukowe Akademia Morska w zczecinie 013, 33(105) pp. 46 50 013, 33(105) s. 46 50 IN 1733-8670 Peculiarities of use of speech acoustic environment

More information

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Reversible Data Hiding in JPEG Images Based on Adjustable Padding Reversible Data Hiding in JPEG Images Based on Adjustable Padding Ching-Chun Chang Department of Computer Science University of Warwick United Kingdom Email: C.Chang.@warwick.ac.uk Chang-Tsun Li School

More information

An Integrated Image Steganography System. with Improved Image Quality

An Integrated Image Steganography System. with Improved Image Quality Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality

More information

High Capacity Audio Watermarking Based on Fibonacci Series

High Capacity Audio Watermarking Based on Fibonacci Series 2017 IJSRST Volume 3 Issue 8 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Scienceand Technology High Capacity Audio Watermarking Based on Fibonacci Series U. Hari krishna 1, M. Sreedhar

More information

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Khaly TALL 1, Mamadou Lamine MBOUP 1, Sidi Mohamed FARSSI 1, Idy DIOP 1, Abdou Khadre DIOP 1, Grégoire SISSOKO 2 1. Laboratoire

More information

Nonuniform multi level crossing for signal reconstruction

Nonuniform multi level crossing for signal reconstruction 6 Nonuniform multi level crossing for signal reconstruction 6.1 Introduction In recent years, there has been considerable interest in level crossing algorithms for sampling continuous time signals. Driven

More information

Blind Single-Image Super Resolution Reconstruction with Defocus Blur

Blind Single-Image Super Resolution Reconstruction with Defocus Blur Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Blind Single-Image Super Resolution Reconstruction with Defocus Blur Fengqing Qin, Lihong Zhu, Lilan Cao, Wanan Yang Institute

More information

Data Word Length Reduction for Low-Power DSP Software

Data Word Length Reduction for Low-Power DSP Software EE382C: LITERATURE SURVEY, APRIL 2, 2004 1 Data Word Length Reduction for Low-Power DSP Software Kyungtae Han Abstract The increasing demand for portable computing accelerates the study of minimizing power

More information

Research Article A Robust Zero-Watermarking Algorithm for Audio

Research Article A Robust Zero-Watermarking Algorithm for Audio Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 453580, 7 pages doi:10.1155/2008/453580 Research Article A Robust Zero-Watermarking Algorithm for

More information

A variable step-size LMS adaptive filtering algorithm for speech denoising in VoIP

A variable step-size LMS adaptive filtering algorithm for speech denoising in VoIP 7 3rd International Conference on Computational Systems and Communications (ICCSC 7) A variable step-size LMS adaptive filtering algorithm for speech denoising in VoIP Hongyu Chen College of Information

More information

Dynamic Collage Steganography on Images

Dynamic Collage Steganography on Images ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to

More information

DURING the past several years, independent component

DURING the past several years, independent component 912 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 10, NO. 4, JULY 1999 Principal Independent Component Analysis Jie Luo, Bo Hu, Xie-Ting Ling, Ruey-Wen Liu Abstract Conventional blind signal separation algorithms

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

NOISE ESTIMATION IN A SINGLE CHANNEL

NOISE ESTIMATION IN A SINGLE CHANNEL SPEECH ENHANCEMENT FOR CROSS-TALK INTERFERENCE by Levent M. Arslan and John H.L. Hansen Robust Speech Processing Laboratory Department of Electrical Engineering Box 99 Duke University Durham, North Carolina

More information

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant

More information

Study on the UWB Rader Synchronization Technology

Study on the UWB Rader Synchronization Technology Study on the UWB Rader Synchronization Technology Guilin Lu Guangxi University of Technology, Liuzhou 545006, China E-mail: lifishspirit@126.com Shaohong Wan Ari Force No.95275, Liuzhou 545005, China E-mail:

More information

ORTHOGONAL frequency division multiplexing (OFDM)

ORTHOGONAL frequency division multiplexing (OFDM) 144 IEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH 2005 Performance Analysis for OFDM-CDMA With Joint Frequency-Time Spreading Kan Zheng, Student Member, IEEE, Guoyan Zeng, and Wenbo Wang, Member,

More information

Implementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary

Implementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary Implementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary M.Tech Scholar, ECE Department,SKIT, Jaipur, Abstract Orthogonal Frequency Division

More information

Chapter IV THEORY OF CELP CODING

Chapter IV THEORY OF CELP CODING Chapter IV THEORY OF CELP CODING CHAPTER IV THEORY OF CELP CODING 4.1 Introduction Wavefonn coders fail to produce high quality speech at bit rate lower than 16 kbps. Source coders, such as LPC vocoders,

More information

Combining Modern Codes and Set- Partitioning for Multilevel Storage Systems

Combining Modern Codes and Set- Partitioning for Multilevel Storage Systems Combining Modern Codes and Set- Partitioning for Multilevel Storage Systems Presenter: Sudarsan V S Ranganathan Additional Contributors: Kasra Vakilinia, Dariush Divsalar, Richard Wesel CoDESS Workshop,

More information

Robust patchwork-based watermarking method for stereo audio signals

Robust patchwork-based watermarking method for stereo audio signals Multimed Tools Appl 014 7:1387 1410 DOI 10.1007/s1104-013-1454-4 Robust patchwork-based watermarking method for stereo audio signals Iynkaran Natgunanathan Yong Xiang Yue Rong Dezhong Peng Published online:

More information

Speech Synthesis using Mel-Cepstral Coefficient Feature

Speech Synthesis using Mel-Cepstral Coefficient Feature Speech Synthesis using Mel-Cepstral Coefficient Feature By Lu Wang Senior Thesis in Electrical Engineering University of Illinois at Urbana-Champaign Advisor: Professor Mark Hasegawa-Johnson May 2018 Abstract

More information

IJMIE Volume 2, Issue 4 ISSN:

IJMIE Volume 2, Issue 4 ISSN: Reducing PAPR using PTS Technique having standard array in OFDM Deepak Verma* Vijay Kumar Anand* Ashok Kumar* Abstract: Orthogonal frequency division multiplexing is an attractive technique for modern

More information

Simulative Investigations for Robust Frequency Estimation Technique in OFDM System

Simulative Investigations for Robust Frequency Estimation Technique in OFDM System , pp. 187-192 http://dx.doi.org/10.14257/ijfgcn.2015.8.4.18 Simulative Investigations for Robust Frequency Estimation Technique in OFDM System Kussum Bhagat 1 and Jyoteesh Malhotra 2 1 ECE Department,

More information

EE390 Final Exam Fall Term 2002 Friday, December 13, 2002

EE390 Final Exam Fall Term 2002 Friday, December 13, 2002 Name Page 1 of 11 EE390 Final Exam Fall Term 2002 Friday, December 13, 2002 Notes 1. This is a 2 hour exam, starting at 9:00 am and ending at 11:00 am. The exam is worth a total of 50 marks, broken down

More information

A High-Rate Data Hiding Technique for Uncompressed Audio Signals

A High-Rate Data Hiding Technique for Uncompressed Audio Signals A High-Rate Data Hiding Technique for Uncompressed Audio Signals JONATHAN PINEL, LAURENT GIRIN, AND (Jonathan.Pinel@gipsa-lab.grenoble-inp.fr) (Laurent.Girin@gipsa-lab.grenoble-inp.fr) CLÉO BARAS (Cleo.Baras@gipsa-lab.grenoble-inp.fr)

More information