Audio Watermarking Based on Multiple Echoes Hiding for FM Radio
|
|
- Beatrix Wilkerson
- 5 years ago
- Views:
Transcription
1 INTERSPEECH 2014 Audio Watermarking Based on Multiple Echoes Hiding for FM Radio Xuejun Zhang, Xiang Xie Beijing Institute of Technology Abstract An audio watermarking system based on multiple echoes hiding is designed for frequency modulation (FM) broadcasting. The embedded watermarking information of 16 bits can be recovered from the receiver by recording the broadcast for any 1 second. On the premise of guaranteeing the high imperceptibility and robustness, the multiple echoes scheme we proposed has a higher capacity. The proposed system is tested on a semi-physical platform with the real channel transmission and the recovery rate reaches higher than 98%. Some attacks, such as white noise, filtering, re-sampling, adding an echo and re-quantization, are used to test the robustness. The subjective test result shows that the system has a good imperceptibility. Index Terms: echo hiding, audio watermarking, FM radio 1. Introduction In recent years, there have been increasing researches interesting in delivering information by audio for its convenience and low cost. Audio watermarking is a hopeful technique to solve this problem. From the technical aspect, audio watermarking aims to embed proprietary data into the audio object. When necessary, the owners can extract these data. For example, the bank card number can be embedded into the audio, and we can accomplish electronic payment by just playing the watermarked audio. The available audio watermarking schemes can be classified into the following four categories: phase coding [1], spread spectrum modulation [2], patchwork [3], and echo hiding [4-6]. Among them, echo hiding algorithm has natural advantages in imperceptibility. In addition, the advantages are also reflected in low complexity, no additive noise, blind detection, low requirements for synchronization act which makes it very attractive to researchers. An effective and practical audio watermarking method should possess three important traits: imperceptibility, robustness, and information capacity. The sound in a real life we heard is a sound with multiple echoes for sound in a real room including multiple reflections from the walls and other objects in the room [7]. That is multiple echoes can provide a more natural sound quality than only a single echo. So the echo-hiding watermarking methods in [4] [6] which utilized a single echo has a relatively large damage on audio quality. In order to guarantee better imperceptibility, the multiple echoes system is proposed by Xulai Cao [8]. A challenging task for watermarking system based on multiple echoes scheme is the trade-off between robustness and capacity. Especially in the application of delivering information, the capacity should be paid more attention. In this paper, the theoretical upper limit of the echoes number in multiple echoes system is pointed out by our analysis. Based on this, we designed an echo hiding system with multiple echoes which can be used in FM radio. The multiple echoes scheme we proposed embeds a symbol which includes 16 bits binary number into 1 segment. Compared with the multiple echoes scheme in [8] which embedded 1 bit binary number into 1 segment, our algorithm achieves higher capacity. Our system is tested on a semi-physical platform with the real channel transmission and shows a better performance. The paper is organized as follows. Section 2 briefly introduces the echo hiding schemes. An echo hiding system is proposed in Section 3. Section 4 gives the experiment results. Conclusions are given in section Echo hiding scheme The basic idea of the echo hiding scheme is to add an echo which is inaudible by human ear to the original audio. It takes advantage of the temporal masking effect of human ear. The traditional echo kernel is expressed as h() =() ( ) (1) where h() is the echo kernel, δ(n) represents the unit-impulse function, and α denotes the amplitude of the echo. The delay d of the echo is decided by the values of the embedded bit. Let x(n) represent the host signal, the watermarked signal can be expressed as () =() h() =() ( ) (2) The specific process of the encoding is described as follows Step 1: Divide the host signal x(n) into several consecutive segments which contain the same number of samples. Step 2: Embed 1 bit into each segment by the different delay: represents bit 0, and represents bit 1. Step 3: Combine the segments with hiding message into a continuous audio signal. We use the power cepstrum of the watermarked signal to extract the watermark. The power cepstrum of the signal is defined as () = () =() h() (3) Then take (2) into (3), we can get [] = () () ( ) ( ) (4) where () is the power cepstrum of the host signal. From (4), we can see the power cepstrum of the watermarked signal appear a peak at the delay offset d. Then, the embedded information can be extracted by checking the amplitude at or. 3. Proposed echo hiding system The diagram of the whole system is demonstrated in Fig.1. The system mainly consists of three parts: the watermark embedded part, FM transmission part, and the watermark extraction part. Copyright 2014 ISCA September 2014, Singapore
2 Original watermark Extracted watermark Figure 1: the block diagram of the system The theoretical upper limit of the echoes number Differing from multiple echoes scheme in [8], the multiple echoes algorithm we proposed embeds a symbol which includes 16 bits binary number instead of 1 bit binary number into 1 segment. The multiple echoes kernel is described as h() =() ( ) (5) where J (J 2) denotes the number of echoes represents the delay of the each echo. The different delays represent different binary number. It is vital to guarantee there is a peak in each delay sample in the power cepstrum of the watermarked signal so that we can extract the watermark exactly. With the increasing of the echoes number, the interference between each echo becomes stronger. So the maximum number of echoes is needed to be anatomized so that we can extract the watermark accurately. Take (5) to (3), we can get () () () { [( ) ( )] } ( ( )( ( )) [ ( )( )]} [ ( ) ( )] (6) We can see that there are two kinds of peaks in the power cepstrum. First is the peaks in the delay offset. with the amplitude 2, which are needed to extract the hiding information, we call them delay peaks. The second is the peaks in (1 < ) with the amplitude, called interference peaks. The number of the interference peaks is. Watermark encoder Extraction Original audio Embedded algorithm Record FM emitter channel FM receiver In the decoder, the watermark is extracted by seeking the location of the peaks positions. That is, we can gain high robustness only by insuring that the amplitude of delay peaks is always larger than the amplitude of interference peaks. Otherwise, the location of the peaks positions we seek is interference peaks position (1 < ) rather than the delay peak position. Assume a limiting case that all the interference peaks appear in the same position, the amplitude will reach the maximum. If the maximized amplitude of the interference peaks is equal to the amplitude of the delay peak, we can t differentiate which are the delay peaks in the power cepstrum. The value of in this situation is the upper limit of the echoes number. That is ( ) Applying (3) to (8) J = = (7) From (8), we can see that the theoretical upper limit of the echoes number is related to the amplitude of the echo. J =4 when is chosen as 0.4. Gruhl et al. have proved that all signals showed acceptable accuracy with a decay rate between 0.3 and 0.4, and even those with exceptional hearing have difficulty resolving the echoes [10] Embedding algorithm We know from the analysis above that the echo kernel can be described as follows h() =() ( ) ( ) (9) Unlike the traditional algorithm, a symbol consists of 16bits binary number is embedded into 1 segment integrally. Set a symbol={a 0, a 1, a 2, a 3, a 4, a 5, a 6, a 7, a 8, a 9, a 10, a 11, a 12, a 13, a 14, a 15 } and 1 segment is (). The symbol is first changed to a 4 4 matrix, then transforms four binary in each column into the corresponding hexadecimal, we can obtain four hexadecimal number [b1, b2, b3, b4], where [0,15], l [1,4]. The next task is to embed each hexadecimal number into each echo. It is formulated as follows. Step 1: Calculate the delay of the first echo =M (10) where is the minimum value of. ( F 1) is the minimum interval of, we call it resolution. Table.1 shows the relationship between and delay. Table 1. Relationship between and. b 1 d 1 0 M 1 MF 15 M15F Step 2: Work out the rest of the delays = (11) = (12) = (13) From (10)-(13), we can know that is always bigger than, and the minimum interval between them is ( 1), we call it bracer. This algorithm ensures that the delays of four-way echoes signals is increasing, that is d 4 >d 3 >d 2 >d 1. Thus, the peaks of the power cepstrum in the delays are easily distinguished, which is shown in Fig.2. Then the watermark information is extracted by the value of corresponding. Step 3: The watermarked signal is the temporal convolution of () and h() () = () h() (14) Fig.3 illustrates how watermark is embedded into a host signal. (8) 1387
3 3.3. Parameter analysis Figure 2: The power cepstrum of 1 second watermarked signal in computer simulation. x(n) * δ(n) αδ(n ) αδ(n ) αδ(n ) αδ(n ) h(n) 1 x(n) α x(n-d 1 ) α x(n-d 2 ) α x(n-d 3 ) α x(n-d 4 ) y(n) d 1 d 2 d 3 d 4 * Figure 3: Schemetic explanation of how watermark is embedded. The scope of interference peak position M M60F3K K 45F3K The scope of delay peak position Figure 4: The position of the two kinds of peaks. t Echo 1 Echo 2 Echo 3 Echo 4 Watermarked signal t Parameter M Form (10) to (13) and the scope of, we know that the maximum of is 60 3, which is also the maximum of all the delays. That is the position of the delay peak is in the scope of [M, M60F3K]. From analysis above, we know that the position of interference peaks are,,,,,. From (10) to (13), we can calculate that =3 ( 2) [K, 15F K] (15) =3 ( 4) [2K,30F2K] (16) =3 ( 6) [3K, 45F 3K] (17) =3 ( 2) [K,15FK] (18) =3 ( 4) [2K, 30F 2K] (19) =3 ( 2) [K,15FK] (20) Form (15) to (20), we know that the position of the interference peak is in the scope of [K,45F3K]. Fig.4 showed that the peaks in the intersection region [M, 45F3K] can t be judged which kind of peak it belongs to. In order to eliminate the cross interference between the delay peak and the interference peak, the parameter M is ascertained as 45F3K1. In this way, there is no intersection region between the two kinds of peaks Parameter F and K The accurate rate ( ) is defined as: = 100% (21) where a symbol contains 16 bits information. Delay time will affect detecting performance and the subjective quality of echoed audio signal. It is difficult to detect the position of echo for too short delay time, and as a result, the is low. The energy of echoes will be less and the subjective quality will be bad for long delay time. According to the methods in [9], delay time belonging to 2ms~6ms is acceptable both for detecting performance and the subjective quality. There are 64 delay positions in our system and the maximum delay time of ensuring the imperceptibility is 6ms. Thus, the maximum temporary resolution is about 0.1ms. In this way, the Min Samples is 10kHz. Here, the host audio we chose is sampled at 44.1 khz sampling rate with 16-bit quantization. From (10) to (13), we know that the minimum delay time of is M which is also the minimum delay time of all echoes and the delay time of is M60F3K which is the maximum delay time. So it needs to meet the two equations M 60F 3K f (22) M f t (23) where is the maximum delay time, t is the minimum delay time and f is the sampling frequency. Applying (22),(23) to (24), the following conclusion is straightforward 17.5F K 44 15F K 29 (24) It is proved that the super parameters F =2,K [1,9]. 4. Experiments In order to estimate the performance of the system, we first test the capacity of the proposed echo hiding scheme. Some attacks are also used to measure the robustness of the algorithm. The subjective test result showed that the embedded 1388
4 algorithm has a good imperceptibility. Then the echo hiding scheme is used on FM broadcast system with a semi-physical platform to estimate the performance of the whole system. Twenty uncompressed audio clips are used as host audio and the parameter F=9. These 20 clips were sampled at 44.1 khz sampling rate with 16-bit quantization and belong to 5 different audio groups as illustrated in Table 2. Table 2. signal used in simulation. Host Signal Genres S 01 -S 04 Chinese Rock S 05 -S 08 Disc Jockey S 09 -S 12 Eastern Classic Songs S 13 -S 16 Foreign Songs S 17 -S 20 Pop Songs 4.1. The performance of echo hiding scheme Transmission rate test The results of the transmission rate comparison between the proposed algorithm and the scheme in [8] are showed in table.3. A symbol contains 16 bits is embedded into one segment in the algorithm we proposed, so it is feasible to control the transmission rate by varying the length of segment. For example, when the length of the segment is changed to 0.5 second, which means we embed a symbol per 0.5 second, thus the transmission rate is 32 bits/s. Obviously, proposed kernel shows a better extraction performance than conventional echo methods especially when we increase the transmission rate. Table 3. Result of transmission rate test. Transmission rate (%) (bits/s) Proposed method in [8] Robustness test In daily life, the audio files often need to carry out several necessary signal processing operations. So it is necessary to test the performance after the signal processing operations which is illustrated in table.4. Table 4. Detail of attack. attack Detailed Description high-pass filtering >5khz Low-pass filtering <5.5khz Resampling 44.1k 22.05k 44.1k Requantization 16bits 8bits 16bits Noise Addition SNR=20db Additional Echo Delay=8ms, α=0.1 Table 5. Result of attack test. attack (%) Proposed method in [8] high-pass filtering Low-pass filtering Resampling Requantization Noise Addition Additional Echo From table.5, we can see the proposed kernel have a better performance to signal processing operations comparing with the conventional echo hiding Subjective test We adopt AB test method to test the quality of watermarked audio. In this test, each of the participants chose the partial audio from the pair of host audio and the watermarked audio. 10 subjects are required to listen 20 audio clip pairs respectively. The result is shown in Table.6. Table 6. Result of subjective test. prefer Watermarked audio number rate The almost half-to-half rate indicates that our watermarking process does not obvious damage on the hearing quality of host audio Performance of the whole system The FM, which is band-limited to below 16kHz, meets the minimum sampling rate. The proposed system is utilized on and the performance showed in Table.7. With the increase of the recording distance, SNR will decrease which inevitable leads to low. As we can see in Table.6, the system has a good performance with the transmission rate of 16 bits/s and the recording distance can reach 4 meters with 90.05%. Table 7. Test result of the whole system. Distance (%) 10cm cm meters meters meters meters meters Conclusion In this paper, we designed an audio watermarking system based on the multiple echoes kernel. Theoretical upper limit of the echoes number and detection gain is derived. Then we describe how we embed watermark into the host audio in detail. Finally, it is used in FM broadcast system to increase the transmission distance and we can recover the embedded information by recording the FM broadcast. On the premise of guaranteeing the high imperceptibility and robustness, the multiple echoes scheme we proposed has a higher capacity. The proposed system is tested on a semi-physical platform with the real channel transmission and experimental results show the system has a good performance. How to differentiate the multiple embedding positions accurately and decrease the computational complexity are the coming problems needed to be solved. 6. Acknowledgements This work is supported by National Nature Science Foundation of China (NSFC): Grant No and No
5 7. References [1] M. Arnold, P. G. Baum, and W. Voeßing, A phase modulation audio watermarking technique, in Proc. Lecture Notes in Computer Science, 2009, vol. 5806, pp [2] A. Valizadeh and Z. J. Wang, Correlation-and-bit-aware spread spectrum embedding for data hiding, IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp , Jun [3] H. Kang, K. Yamaguchi, B. Kurkoski, K. Yamaguchi, and K. Kobayashi, Full-index-embedding patchwork algorithm for audio watermarking, IEICE Trans. Inf. Syst., vol. E91-D, no. 11, pp , Nov [4] O. T.-C. Chen and W.-C. Wu, Highly robust, secure, and perceptual quality echo hiding scheme, IEEE Trans. Audio, Speech, Language Process., vol. 16, no. 3, pp , Mar [5] Hyoung Joongn Kim, Yong Hee Choi, A Novel Echo-Hiding Scheme with Backward and Forward Kernels, IEEE transactions on circuits and systems for video technology, 13(8), pp , [6] O. T.-C. Chen and W.-C. Wu, Highly robust, secure, and perceptualquality echo hiding scheme, IEEE Trans. Audio, Speech, Language Process., vol. 16, no. 3, pp , Mar [7] B.-S. Ko, R. Nishimura, and Y. Suzuki, Time-spread echo method for digital audio watermarking, IEEE Trans.Multimedia, vol. 7, no. 2, pp , Apr [8] Xulai Cao, Linghua ZHANG, Researches on Echo Kernels of Audio Digital Watermarking Technology Based on Echo Hiding, International Conference on Wireless Communications and Signal Processing (WCSP 2011), p.5pp., 2011 [9] D. Gruhl and W. Bender, Echo hiding, Proceeding of Information Hiding Workshop, Cambridge, U.K., pp , [10] LI LI, YA-QI SONG, EXPERIMENTAL RESEARCH ON PARAMETER SELECTION OF ECHO HIDING IN VOICE, Eighth International Conference on Machine Learning and Cybernetics (ICMLC), p ,
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationHigh capacity robust audio watermarking scheme based on DWT transform
High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com
More informationDWT based high capacity audio watermarking
LETTER DWT based high capacity audio watermarking M. Fallahpour, student member and D. Megias Summary This letter suggests a novel high capacity robust audio watermarking algorithm by using the high frequency
More informationIntroduction to Audio Watermarking Schemes
Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia
More informationDigital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers
Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,
More information11th International Conference on, p
NAOSITE: Nagasaki University's Ac Title Audible secret keying for Time-spre Author(s) Citation Matsumoto, Tatsuya; Sonoda, Kotaro Intelligent Information Hiding and 11th International Conference on, p
More informationIMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING
IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING Nedeljko Cvejic, Tapio Seppänen MediaTeam Oulu, Information Processing Laboratory, University of Oulu P.O. Box 4500, 4STOINF,
More informationTWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS
TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS Sos S. Agaian 1, David Akopian 1 and Sunil A. D Souza 1 1Non-linear Signal Processing
More informationAn Improvement for Hiding Data in Audio Using Echo Modulation
An Improvement for Hiding Data in Audio Using Echo Modulation Huynh Ba Dieu International School, Duy Tan University 182 Nguyen Van Linh, Da Nang, VietNam huynhbadieu@dtu.edu.vn ABSTRACT This paper presents
More informationMethod to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT
Method to Improve Watermark Reliability Adam Brickman EE381K - Multidimensional Signal Processing May 08, 2003 ABSTRACT This paper presents a methodology for increasing audio watermark robustness. The
More informationPerformance Analysis of Parallel Acoustic Communication in OFDM-based System
Performance Analysis of Parallel Acoustic Communication in OFDM-based System Junyeong Bok, Heung-Gyoon Ryu Department of Electronic Engineering, Chungbuk ational University, Korea 36-763 bjy84@nate.com,
More informationZero-Based Code Modulation Technique for Digital Video Fingerprinting
Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and
More informationAcoustic Communication System Using Mobile Terminal Microphones
Acoustic Communication System Using Mobile Terminal Microphones Hosei Matsuoka, Yusuke Nakashima and Takeshi Yoshimura DoCoMo has developed a data transmission technology called Acoustic OFDM that embeds
More informationJournal of mathematics and computer science 11 (2014),
Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad
More informationAudio Watermark Detection Improvement by Using Noise Modelling
Audio Watermark Detection Improvement by Using Noise Modelling NEDELJKO CVEJIC, TAPIO SEPPÄNEN*, DAVID BULL Dept. of Electrical and Electronic Engineering University of Bristol Merchant Venturers Building,
More informationLocal prediction based reversible watermarking framework for digital videos
Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,
More informationIT is well known that digital watermarking( WM) is an
Proceedings of the Federated Conference on Computer Science and Information Systems pp. 727 732 ISBN 978-83-60810-51-4 The Use of Wet Paper Codes With Audio Watermarking Based on Echo Hiding Valery Korzhik
More informationAvailable online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)
Available online at www.sciencedirect.com ScienceDirect Procedia Technology ( 23 ) 7 3 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 23) BER Performance of Audio Watermarking
More informationA Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 7, October 2014, PP 7-12 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Scheme for Digital Audio Watermarking
More informationLossless Image Watermarking for HDR Images Using Tone Mapping
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar
More informationPrinted Document Watermarking Using Phase Modulation
1 Printed Document Watermarking Using Phase Modulation Chabukswar Hrishikesh Department Of Computer Engineering, SBPCOE, Indapur, Maharastra, India, Pise Anil Audumbar Department Of Computer Engineering,
More informationData Hiding in Digital Audio by Frequency Domain Dithering
Lecture Notes in Computer Science, 2776, 23: 383-394 Data Hiding in Digital Audio by Frequency Domain Dithering Shuozhong Wang, Xinpeng Zhang, and Kaiwen Zhang Communication & Information Engineering,
More informationPerformance Improving LSB Audio Steganography Technique
ISSN: 2321-7782 (Online) Volume 1, Issue 4, September 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Performance
More informationAudio Watermarking Using Pseudorandom Sequences Based on Biometric Templates
72 JOURNAL OF COMPUTERS, VOL., NO., MARCH 2 Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates Malay Kishore Dutta Department of Electronics Engineering, GCET, Greater Noida,
More informationLicense Plate Localisation based on Morphological Operations
License Plate Localisation based on Morphological Operations Xiaojun Zhai, Faycal Benssali and Soodamani Ramalingam School of Engineering & Technology University of Hertfordshire, UH Hatfield, UK Abstract
More informationAbstract. Keywords: audio watermarking; robust watermarking; synchronization code; moving average
A Synchronization Algorithm Based on Moving Average for Robust Audio Watermarking Scheme Zhang Jin quan and Han Bin (College of Information security engineering, Chengdu University of Information Technology,
More informationStudy on OFDM Symbol Timing Synchronization Algorithm
Vol.7, No. (4), pp.43-5 http://dx.doi.org/.457/ijfgcn.4.7..4 Study on OFDM Symbol Timing Synchronization Algorithm Jing Dai and Yanmei Wang* College of Information Science and Engineering, Shenyang Ligong
More informationAn Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet
Journal of Information & Computational Science 8: 14 (2011) 3027 3034 Available at http://www.joics.com An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet Jianguo JIANG
More information23rd European Signal Processing Conference (EUSIPCO) ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING
ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING Nhut Minh Ngo, Brian Michael Kurkoski, and Masashi Unoki School of Information Science, Japan Advanced Institute
More informationChapter 2 Audio Watermarking
Chapter 2 Audio Watermarking 2.1 Introduction Audio watermarking is a well-known technique of hiding data through audio signals. It is also known as audio steganography and has received a wide consideration
More informationSound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code
IEICE TRANS. INF. & SYST., VOL.E98 D, NO.1 JANUARY 2015 89 LETTER Special Section on Enriched Multimedia Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code Harumi
More informationWatermarking patient data in encrypted medical images
Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation
More informationReversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method
ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption
More informationTHE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION
THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering
More informationFPGA implementation of DWT for Audio Watermarking Application
FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade
More informationA Reversible Data Hiding Scheme Based on Prediction Difference
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,
More informationRobust Voice Activity Detection Based on Discrete Wavelet. Transform
Robust Voice Activity Detection Based on Discrete Wavelet Transform Kun-Ching Wang Department of Information Technology & Communication Shin Chien University kunching@mail.kh.usc.edu.tw Abstract This paper
More informationVariable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection
FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 7, April 4, -3 Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection Karen Egiazarian, Pauli Kuosmanen, and Radu Ciprian Bilcu Abstract:
More informationMulti Modulus Blind Equalizations for Quadrature Amplitude Modulation
Multi Modulus Blind Equalizations for Quadrature Amplitude Modulation Arivukkarasu S, Malar R UG Student, Dept. of ECE, IFET College of Engineering, Villupuram, TN, India Associate Professor, Dept. of
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationDESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS
DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS John Yong Jia Chen (Department of Electrical Engineering, San José State University, San José, California,
More informationImplementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design
2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital
More informationTRANSIENT NOISE REDUCTION BASED ON SPEECH RECONSTRUCTION
TRANSIENT NOISE REDUCTION BASED ON SPEECH RECONSTRUCTION Jian Li 1,2, Shiwei Wang 1,2, Renhua Peng 1,2, Chengshi Zheng 1,2, Xiaodong Li 1,2 1. Communication Acoustics Laboratory, Institute of Acoustics,
More informationData Hiding In Audio Signals
Data Hiding In Audio Signals Deepak garg 1, Vikas sharma 2 Student, Dept. Of ECE, GGGI,Dinarpur,Ambala Haryana,India 1 Assistant professor,dept.of ECE, GGGI,Dinarpur,Ambala Haryana,India 2 ABSTRACT Information
More informationMel Spectrum Analysis of Speech Recognition using Single Microphone
International Journal of Engineering Research in Electronics and Communication Mel Spectrum Analysis of Speech Recognition using Single Microphone [1] Lakshmi S.A, [2] Cholavendan M [1] PG Scholar, Sree
More informationA Visual Cryptography Based Watermark Technology for Individual and Group Images
A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,
More informationAttack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks
Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University
More informationROBUST PITCH TRACKING USING LINEAR REGRESSION OF THE PHASE
- @ Ramon E Prieto et al Robust Pitch Tracking ROUST PITCH TRACKIN USIN LINEAR RERESSION OF THE PHASE Ramon E Prieto, Sora Kim 2 Electrical Engineering Department, Stanford University, rprieto@stanfordedu
More informationDirect Binary Search Based Algorithms for Image Hiding
1 Xia ZHUGE, 2 Koi NAKANO 1 School of Electron and Information Engineering, Ningbo University of Technology, No.20 Houhe Lane Haishu District, 315016, Ningbo, Zheiang, China zhugexia2@163.com *2 Department
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationJournal of American Science 2015;11(7)
Design of Efficient Noise Reduction Scheme for Secure Speech Masked by Signals Hikmat N. Abdullah 1, Saad S. Hreshee 2, Ameer K. Jawad 3 1. College of Information Engineering, AL-Nahrain University, Baghdad-Iraq
More informationTIME encoding of a band-limited function,,
672 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 53, NO. 8, AUGUST 2006 Time Encoding Machines With Multiplicative Coupling, Feedforward, and Feedback Aurel A. Lazar, Fellow, IEEE
More informationMultiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique
Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique Wen-Yuan Chen, Jen-Tin Lin, Chi-Yuan Lin, and Jin-Rung Liu Department of Electronic Engineering, National Chin-Yi Institute of Technology,
More informationMulti-GI Detector with Shortened and Leakage Correlation for the Chinese DTMB System. Fengkui Gong, Jianhua Ge and Yong Wang
788 IEEE Transactions on Consumer Electronics, Vol. 55, No. 4, NOVEMBER 9 Multi-GI Detector with Shortened and Leakage Correlation for the Chinese DTMB System Fengkui Gong, Jianhua Ge and Yong Wang Abstract
More informationIEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST On the Use of Masking Models for Image and Audio Watermarking
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST 2005 727 On the Use of Masking Models for Image and Audio Watermarking Arnaud Robert and Justin Picard Abstract In most watermarking systems, masking
More informationSpeech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm A.T. Rajamanickam, N.P.Subiramaniyam, A.Balamurugan*,
More informationBlind Source Separation for a Robust Audio Recognition Scheme in Multiple Sound-Sources Environment
International Conference on Mechatronics, Electronic, Industrial and Control Engineering (MEIC 25) Blind Source Separation for a Robust Audio Recognition in Multiple Sound-Sources Environment Wei Han,2,3,
More informationABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing
ABSTRACT Audio steganography deals with a method to hide a secret message in an audio file. Also, Audio steganography can be used for secret watermarking or concealing ownership or copyright information
More informationResearch on DQPSK Carrier Synchronization based on FPGA
Journal of Information Hiding and Multimedia Signal Processing c 27 ISSN 273-422 Ubiquitous International Volume 8, Number, January 27 Research on DQPSK Carrier Synchronization based on FPGA Shi-Jun Kang,
More informationTime-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness
Time-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness Guang Hua, Jonathan Goh, and Vrizlynn, L. L. Thing Abstract We present a time-spread echo-based audio watermarking
More informationExperimental Investigation of IEEE802.11n Reception with Fractional Sampling
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Experimental Investigation of IEEE802.11n Reception with Fractional Sampling Ryosuke Nakamura, Yukitoshi Sanada
More informationDepartment of Electronics and Communication Engineering 1
UNIT I SAMPLING AND QUANTIZATION Pulse Modulation 1. Explain in detail the generation of PWM and PPM signals (16) (M/J 2011) 2. Explain in detail the concept of PWM and PAM (16) (N/D 2012) 3. What is the
More informationA Blind EMD-based Audio Watermarking using Quantization
768 A Blind EMD-based Audio Watermaring using Quantization Chinmay Maiti 1, Bibhas Chandra Dhara 2 Department of Computer Science & Engineering, CEMK, W.B., India, chinmay@cem.ac.in 1 Department of Information
More informationUNIT TEST I Digital Communication
Time: 1 Hour Class: T.E. I & II Max. Marks: 30 Q.1) (a) A compact disc (CD) records audio signals digitally by using PCM. Assume the audio signal B.W. to be 15 khz. (I) Find Nyquist rate. (II) If the Nyquist
More informationClipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication
Clipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication Presented by Jian Song jsong@tsinghua.edu.cn Tsinghua University, China 1 Contents 1 Technical Background 2 System
More informationRobust Low-Resource Sound Localization in Correlated Noise
INTERSPEECH 2014 Robust Low-Resource Sound Localization in Correlated Noise Lorin Netsch, Jacek Stachurski Texas Instruments, Inc. netsch@ti.com, jacek@ti.com Abstract In this paper we address the problem
More informationRake-based multiuser detection for quasi-synchronous SDMA systems
Title Rake-bed multiuser detection for qui-synchronous SDMA systems Author(s) Ma, S; Zeng, Y; Ng, TS Citation Ieee Transactions On Communications, 2007, v. 55 n. 3, p. 394-397 Issued Date 2007 URL http://hdl.handle.net/10722/57442
More informationEfficient and Robust Audio Watermarking for Content Authentication and Copyright Protection
Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection Neethu V PG Scholar, Dept. of ECE, Coimbatore Institute of Technology, Coimbatore, India. R.Kalaivani Assistant
More informationBackground Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia
Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,
More informationNinad Bhatt Yogeshwar Kosta
DOI 10.1007/s10772-012-9178-9 Implementation of variable bitrate data hiding techniques on standard and proposed GSM 06.10 full rate coder and its overall comparative evaluation of performance Ninad Bhatt
More informationRobust Audio Watermarking Algorithm Based on Air Channel Characteristics
2018 IEEE Third International Conference on Data Science in Cyberspace Robust Audio Watermarking Algorithm Based on Air Channel Characteristics Wen Diao, Yuanxin Wu, Weiming Zhang, Bin Liu, Nenghai Yu
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationHYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationPeculiarities of use of speech acoustic environment while embedding into it of hidden message codes
cientific Journals Maritime University of zczecin Zeszyty Naukowe Akademia Morska w zczecinie 013, 33(105) pp. 46 50 013, 33(105) s. 46 50 IN 1733-8670 Peculiarities of use of speech acoustic environment
More informationReversible Data Hiding in JPEG Images Based on Adjustable Padding
Reversible Data Hiding in JPEG Images Based on Adjustable Padding Ching-Chun Chang Department of Computer Science University of Warwick United Kingdom Email: C.Chang.@warwick.ac.uk Chang-Tsun Li School
More informationAn Integrated Image Steganography System. with Improved Image Quality
Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality
More informationHigh Capacity Audio Watermarking Based on Fibonacci Series
2017 IJSRST Volume 3 Issue 8 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Scienceand Technology High Capacity Audio Watermarking Based on Fibonacci Series U. Hari krishna 1, M. Sreedhar
More informationSpread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression
Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Khaly TALL 1, Mamadou Lamine MBOUP 1, Sidi Mohamed FARSSI 1, Idy DIOP 1, Abdou Khadre DIOP 1, Grégoire SISSOKO 2 1. Laboratoire
More informationNonuniform multi level crossing for signal reconstruction
6 Nonuniform multi level crossing for signal reconstruction 6.1 Introduction In recent years, there has been considerable interest in level crossing algorithms for sampling continuous time signals. Driven
More informationBlind Single-Image Super Resolution Reconstruction with Defocus Blur
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Blind Single-Image Super Resolution Reconstruction with Defocus Blur Fengqing Qin, Lihong Zhu, Lilan Cao, Wanan Yang Institute
More informationData Word Length Reduction for Low-Power DSP Software
EE382C: LITERATURE SURVEY, APRIL 2, 2004 1 Data Word Length Reduction for Low-Power DSP Software Kyungtae Han Abstract The increasing demand for portable computing accelerates the study of minimizing power
More informationResearch Article A Robust Zero-Watermarking Algorithm for Audio
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 453580, 7 pages doi:10.1155/2008/453580 Research Article A Robust Zero-Watermarking Algorithm for
More informationA variable step-size LMS adaptive filtering algorithm for speech denoising in VoIP
7 3rd International Conference on Computational Systems and Communications (ICCSC 7) A variable step-size LMS adaptive filtering algorithm for speech denoising in VoIP Hongyu Chen College of Information
More informationDynamic Collage Steganography on Images
ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to
More informationDURING the past several years, independent component
912 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 10, NO. 4, JULY 1999 Principal Independent Component Analysis Jie Luo, Bo Hu, Xie-Ting Ling, Ruey-Wen Liu Abstract Conventional blind signal separation algorithms
More informationEasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network
EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and
More informationNOISE ESTIMATION IN A SINGLE CHANNEL
SPEECH ENHANCEMENT FOR CROSS-TALK INTERFERENCE by Levent M. Arslan and John H.L. Hansen Robust Speech Processing Laboratory Department of Electrical Engineering Box 99 Duke University Durham, North Carolina
More informationRobust Invisible QR Code Image Watermarking Algorithm in SWT Domain
Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant
More informationStudy on the UWB Rader Synchronization Technology
Study on the UWB Rader Synchronization Technology Guilin Lu Guangxi University of Technology, Liuzhou 545006, China E-mail: lifishspirit@126.com Shaohong Wan Ari Force No.95275, Liuzhou 545005, China E-mail:
More informationORTHOGONAL frequency division multiplexing (OFDM)
144 IEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH 2005 Performance Analysis for OFDM-CDMA With Joint Frequency-Time Spreading Kan Zheng, Student Member, IEEE, Guoyan Zeng, and Wenbo Wang, Member,
More informationImplementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary
Implementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary M.Tech Scholar, ECE Department,SKIT, Jaipur, Abstract Orthogonal Frequency Division
More informationChapter IV THEORY OF CELP CODING
Chapter IV THEORY OF CELP CODING CHAPTER IV THEORY OF CELP CODING 4.1 Introduction Wavefonn coders fail to produce high quality speech at bit rate lower than 16 kbps. Source coders, such as LPC vocoders,
More informationCombining Modern Codes and Set- Partitioning for Multilevel Storage Systems
Combining Modern Codes and Set- Partitioning for Multilevel Storage Systems Presenter: Sudarsan V S Ranganathan Additional Contributors: Kasra Vakilinia, Dariush Divsalar, Richard Wesel CoDESS Workshop,
More informationRobust patchwork-based watermarking method for stereo audio signals
Multimed Tools Appl 014 7:1387 1410 DOI 10.1007/s1104-013-1454-4 Robust patchwork-based watermarking method for stereo audio signals Iynkaran Natgunanathan Yong Xiang Yue Rong Dezhong Peng Published online:
More informationSpeech Synthesis using Mel-Cepstral Coefficient Feature
Speech Synthesis using Mel-Cepstral Coefficient Feature By Lu Wang Senior Thesis in Electrical Engineering University of Illinois at Urbana-Champaign Advisor: Professor Mark Hasegawa-Johnson May 2018 Abstract
More informationIJMIE Volume 2, Issue 4 ISSN:
Reducing PAPR using PTS Technique having standard array in OFDM Deepak Verma* Vijay Kumar Anand* Ashok Kumar* Abstract: Orthogonal frequency division multiplexing is an attractive technique for modern
More informationSimulative Investigations for Robust Frequency Estimation Technique in OFDM System
, pp. 187-192 http://dx.doi.org/10.14257/ijfgcn.2015.8.4.18 Simulative Investigations for Robust Frequency Estimation Technique in OFDM System Kussum Bhagat 1 and Jyoteesh Malhotra 2 1 ECE Department,
More informationEE390 Final Exam Fall Term 2002 Friday, December 13, 2002
Name Page 1 of 11 EE390 Final Exam Fall Term 2002 Friday, December 13, 2002 Notes 1. This is a 2 hour exam, starting at 9:00 am and ending at 11:00 am. The exam is worth a total of 50 marks, broken down
More informationA High-Rate Data Hiding Technique for Uncompressed Audio Signals
A High-Rate Data Hiding Technique for Uncompressed Audio Signals JONATHAN PINEL, LAURENT GIRIN, AND (Jonathan.Pinel@gipsa-lab.grenoble-inp.fr) (Laurent.Girin@gipsa-lab.grenoble-inp.fr) CLÉO BARAS (Cleo.Baras@gipsa-lab.grenoble-inp.fr)
More information