Multiplicative watermarking of audio in DFT magnitude

Similar documents
DWT based high capacity audio watermarking

High capacity robust audio watermarking scheme based on DWT transform

Audio Watermarking Scheme in MDCT Domain

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT

A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

Localized Robust Audio Watermarking in Regions of Interest

IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING

Audio Watermark Detection Improvement by Using Noise Modelling

Data Hiding in Digital Audio by Frequency Domain Dithering

Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

Audio watermarking robust against D/A and A/D conversions

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

FPGA implementation of DWT for Audio Watermarking Application

Different Approaches of Spectral Subtraction Method for Speech Enhancement

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code

Introduction to Audio Watermarking Schemes

23rd European Signal Processing Conference (EUSIPCO) ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING

Introduction of Audio and Music

Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates

Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction

Auditory modelling for speech processing in the perceptual domain

An Improvement for Hiding Data in Audio Using Echo Modulation

Speech/Music Change Point Detection using Sonogram and AANN

I D I A P R E S E A R C H R E P O R T. June published in Interspeech 2008

High Capacity Audio Watermarking Based on Fibonacci Series

A Parametric Model for Spectral Sound Synthesis of Musical Sounds

11th International Conference on, p

Nonuniform multi level crossing for signal reconstruction

HIGH QUALITY AUDIO CODING AT LOW BIT RATE USING WAVELET AND WAVELET PACKET TRANSFORM

Audio Restoration Based on DSP Tools

RECENTLY, there has been an increasing interest in noisy

Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification

PAPER Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification

Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection

The main object of all types of watermarking algorithm is to

(i) Understanding the basic concepts of signal modeling, correlation, maximum likelihood estimation, least squares and iterative numerical methods

A High-Rate Data Hiding Technique for Uncompressed Audio Signals

Reduction of Musical Residual Noise Using Harmonic- Adapted-Median Filter

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Chapter 4 SPEECH ENHANCEMENT

Chapter IV THEORY OF CELP CODING

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio

Speech Enhancement in Presence of Noise using Spectral Subtraction and Wiener Filter

Enhanced Waveform Interpolative Coding at 4 kbps

Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis

Nonlinear Companding Transform Algorithm for Suppression of PAPR in OFDM Systems

Speech Synthesis using Mel-Cepstral Coefficient Feature

Multirate Digital Signal Processing

EE482: Digital Signal Processing Applications

Audio Informed Watermarking by means of Dirty Trellis Codes

MMSE STSA Based Techniques for Single channel Speech Enhancement Application Simit Shah 1, Roma Patel 2

Single Channel Speaker Segregation using Sinusoidal Residual Modeling

Enhancement of Speech in Noisy Conditions

A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference

MODIFIED DCT BASED SPEECH ENHANCEMENT IN VEHICULAR ENVIRONMENTS

Performance Analysis of Parallel Acoustic Communication in OFDM-based System

Discrete Fourier Transform (DFT)

Scale estimation in two-band filter attacks on QIM watermarks

Digital Watermarking and its Influence on Audio Quality

Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm

WARPED FILTER DESIGN FOR THE BODY MODELING AND SOUND SYNTHESIS OF STRING INSTRUMENTS

Improving Channel Estimation in OFDM System Using Time Domain Channel Estimation for Time Correlated Rayleigh Fading Channel Model

Improved Detection by Peak Shape Recognition Using Artificial Neural Networks

Mel Spectrum Analysis of Speech Recognition using Single Microphone

Communications Theory and Engineering

IMPROVED CODING OF TONAL COMPONENTS IN MPEG-4 AAC WITH SBR

Real-time Attacks on Audio Steganography

CG401 Advanced Signal Processing. Dr Stuart Lawson Room A330 Tel: January 2003

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Accurate Delay Measurement of Coded Speech Signals with Subsample Resolution

Evaluation of Audio Compression Artifacts M. Herrera Martinez

Digital Image Watermarking by Spread Spectrum method

Experimental Validation for Hiding Data Using Audio Watermarking

Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression

Biomedical Signals. Signals and Images in Medicine Dr Nabeel Anwar

Digital Watermarking Using Homogeneity in Image

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.

Acoustic Communication System Using Mobile Terminal Microphones

Chapter 2: Signal Representation

Performance study of Text-independent Speaker identification system using MFCC & IMFCC for Telephone and Microphone Speeches

Subband Analysis of Time Delay Estimation in STFT Domain

RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS

Problem Sheet 1 Probability, random processes, and noise

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing

Audio Data Verification and Authentication using Frequency Modulation Based Watermarking

Filter Banks I. Prof. Dr. Gerald Schuller. Fraunhofer IDMT & Ilmenau University of Technology Ilmenau, Germany. Fraunhofer IDMT

FOR THE PAST few years, there has been a great amount

Testing of Objective Audio Quality Assessment Models on Archive Recordings Artifacts

SINOLA: A New Analysis/Synthesis Method using Spectrum Peak Shape Distortion, Phase and Reassigned Spectrum

Study of Turbo Coded OFDM over Fading Channel

NOISE ESTIMATION IN A SINGLE CHANNEL

Digital Processing of Continuous-Time Signals

Audio and Speech Compression Using DCT and DWT Techniques

Journal of mathematics and computer science 11 (2014),

Voice Activity Detection for Speech Enhancement Applications

MUS421/EE367B Applications Lecture 9C: Time Scale Modification (TSM) and Frequency Scaling/Shifting

Transcription:

DOI 10.1007/s11042-012-1282-y Multiplicative watermarking of audio in DFT magnitude Jyotsna Singh Parul Garg Aloknath De Published online: 21 November 2012 Springer Science+Business Media New York 2012 Abstract In this paper, watermark is multiplicatively embedded in discrete fourier transform magnitude of audio signal using spread spectrum based technique. A new perceptual model for magnitude of discrete fourier transform coefficients is developed which finds the regions of highest watermark embedding capacity with least perceptual distortion. Theoretical evaluation of detector performance using correlation detector and likelihood ratio detector is undertaken under the assumption that host feature follows Weibull distribution. Also, experimental results are presented in order to show the performance of the proposed scheme under various attacks such as presence of multiple watermarks, additive white gaussian noise and audio compression. Keywords Audio Correlation detector Discrete fourier transform Log-likelihood detection Watermarking 1 Introduction Various watermarking embedding techniques have been proposed which embed watermark additively or multiplicatively in audio signal using the imperfections of human auditory system (HAS). These techniques explore the fact that the HAS is J. Singh (B) P. Garg Division of Electronics and Communication Engineering, Netaji Subhas Institute of Technology, Sector 3, Dwarka, New Delhi 110075, India e-mail: jsingh.nsit@gmail.com P. Garg e-mail: parul_saini@yahoo.co.in A. De Samsung India Software Operations, No. 66/1, Bagmane Lakeview, Bagmane Tech Park, C.V. Raman Nagar, Byrasandra, Bangalore 560 093, India e-mail: aloknath.de@samsung.com

1432 Multimed Tools Appl (2014) 71:1431 1453 insensitive to small amplitude changes, either in the time [3, 4, 21, 25] or frequency [6, 7, 11, 15 18] domains. Boney et al. [4] generated the watermark by filtering a PN-sequence with a filter approximating the frequency masking characteristics of the human auditory system (HAS) [21]. This filtered watermark was then weighted in the time domain to account for temporal masking. Swanson et al. [25] proposed audio dependent watermarking procedure which directly exploited temporal and frequency masking properties to guarantee that the embedded watermark is inaudible and robust. The shaping of watermark is performed using a masking curve computed on the original signal. This masking curve is obtained by psychoacoustic modeling of host audio signal. Bassia et al. [3] presented an audio watermarking algorithm by adding a perceptually shaped spread-spectrum (SS) sequence in time domain. In the other category watermark is embedded in frequency domain. Cox et al. [6] suggested that a watermark should be constructed as an independent and identically distributed (i.i.d.) gaussian random vector that can be imperceptibly inserted in the perceptually most significant spectral components of the data. Garcia [11], Lee and Ho [16] and Kirovski and Malvar [15] exploited psychoacoustic auditory model to shape and embed the watermark for embedding it into Short-Time Fourier Transform (STFT), Cepstral and Modulated Complex Lapped Transform (MCLT) coefficients of an audio signal, respectively. Both the schemes used blind detection techniques. Another technique [7] proposed watermark embedding and detection based on the frequency hopping method in the spectral domain. The scheme of Megías et al. [18] uses MPEG 1 Layer 3 compression to determine the position of the mark bits in the frequency domain. The scheme introduces some randomness in the embedding locations by introducing a secret key in the embedding and detection processes. The secret key includes the seed of a pseudo-random number generator which is used to compute the exact marking positions. The scheme of Megias is nonblind, that is, the spectrum of the original signal is needed to detect the embedded watermark bits. An audio watermarking scheme based on frequency-selective spread spectrum (FSSS) technique in combination with the subband decomposition of the audio signal was presented by Malik et al. [17]. Fujimoto et al. [10], Garcia-Hernandez et al. [12], Fallahpour and Megias [9] and Megías et al. [19] developed a high bit-rate audio watermarking technique with robustness against common attacks and good transparency. The algorithms developed by Fujimoto et al. [10] and Fallahpour and Megias [9] are based on spline interpolation. Spline interpolation is a technique for constructing new data points within the range of a set of discrete data. These techniques are often designed to provide simplicity of implementation and good perceptual quality from known sample values. Fujimoto et al. [10] proposed time domain algorithm in which an original audio signal is divided into distinct frame and then a secret bit is embedded in each frame using spline interpolation. The algorithm proposed in [9] embeds watermark bits based on the spline interpolation of the data derived from FFT transformation. The watermark bits are embedded by manipulating the splineinterpolated magnitudes of the even bins, derived from the magnitudes of odd bins. The computational efficiency of this algorithm is high because of simple interpolation technique. The disadvantage of this algorithm is that the embedded watermark bits are easily removed because the embedding position is known. Another problem with thescheme[9] is that its embedding rule is based on the comparison of the components magnitudes, which makes it vulnerable to certain attacks that could distort the

1433 magnitudes. Garcia-Hernandez et al. [12] developed watermarking technique based on rational dither modulation and achieved embedding capacity of 689 bps. A selfsynchronized algorithm was introduced by Megías et al. [19] with an embedding rate of 30.09 bps. However these two techniques are not robust to MP3 compression of 64 kbps. The embedding techniques in [6, 7, 11, 15 18], exploit psychoacoustic characteristics of HAS while embedding the watermark additively or multiplicatively in spectral domain. These techniques explored the fact that HAS is insensitive to small amplitude changes in spectral domain. Whereas, phase discontinuity of an audio signal causes perceptible distortion when the phase relation between each frequency component of the signal is changed. Hence discrete fourier transform (DFT) magnitude would be a better option for inserting watermark. However, in literature no perceptual model is defined for DFT magnitude which can decide the location and strength of watermark to be embedded in audio spectrum. Also, these techniques have two major drawbacks. First, the psychoacoustic modeling used by existing techniques require rigorous complex computations. Second, the watermark embedding capacity of these schemes is low i.e. there is not much space to accommodate watermark in the host feature within the defined perceptual limits. To overcome these two problems, a new method of evaluating masking threshold for DFT magnitude is proposed which requires lesser computations as compared to traditional psychoacoustic model based thresholds. The technique finds best possible locations in spectra for watermark embedding and finds scaling factor of In this paper, we present a blind robust watermarking system based on pseudo-random signals embedded in the magnitude of the DFT coefficients of an audio signal. The scheme obviates the use of complex HAS calculations. Also, it allows us to build a model which can decide the location and strength of watermark in DFT spectra. The paper is organized as follows. The watermarking system model is presented in Section 3. In the next section, the signal model is presented and the distribution of DFT magnitude coefficients is shown. Then, in Section 3.4, the construction of the optimal detector is depicted. In Sections 4 and 5, the experimental results and the conclusions are presented. 2 Discrete fourier transform (DFT) DFT is used to calculate the spectrum of a waveform in terms of a set of harmonically related sinusoids, each with a particular amplitude and phase. This transform is most commonly used in audio signal processing, as it has the Fast Fourier Transform (FFT) algorithm to increase the processing speed. Also, it is an important representation of audio data because human hearing is based on a kind of real-time spectrogram encoded by the cochlea of the inner ear. Spectrogram is a sequence of FFTsof windowed audio segments. The angular frequencies of these sinusoids are represented by ω k = kω, wherek is an integer varying from 0 to N 1 and ω = 2π f s /N = 2π/NT. Here f s = 1/T denotes sampling frequency of discrete time signal s given as s =[s(0), s(t), s((n 1)T)] (1)

1434 Multimed Tools Appl (2014) 71:1431 1453 For convenience s(nt) is often written as s(n) in literature. The kth component of DFT, S(k),ofsignals(n) is given as N 1 S(k) = s(n)e j2πkn/n (2) n=0 The samples of discrete time signal s(n) is recovered using the inverse discrete Fourier transform of S(k) as, s(n) = 1 N N 1 k=0 S(k)e j2πnk/n (3) 3 Description of watermarking model A watermarking system encompasses three major functionalities, namely, watermark generation, watermark embedding, and watermark detection. The aim of watermark generation is to construct a sequence W using an appropriate function f.hencethe watermark vector W =[W(0), W(1),, W(N 1)],suchthatW(i) R, where R is real number, is given as W = f (K, N) (4) here K is the watermark key, N is the length of watermark. Watermarked feature F is obtained by multiplicatively embedding watermark W in host feature F given as F = F(1 + aw) (5) here F =[F (0), F (1),, F (N 1)] and a is the scaling factor lying between 0 and 1. The scaling factor is introduced to maintain imperceptibility of the distortions caused to the host signal due to watermarking. Watermark detector is used to examine whether the signal under test F t contains a watermark W or not under a binary-decision hypothesis test framework. Each module is now discussed in detail, in the following subsections. 3.1 Watermark generation The steps required for generation of watermark are as follows: To construct watermark W, a white pseudo-random (PN) sequence or chip W 0 is generated such that W 0 =[W 0 (0), W 0 (1),, W 0 (N w 1)],whereW 0 (i) ( 1, 1). The sequence is generated using secret key K such that they are mutually independent with respect to the host signal. The magnitude nature of host feature needs to be preserved implying that F given in (5), should always be greater than zero. Such condition is obtained when aw(i) s 0 i N 1 take the value in the finite interval [ 1, 1] keeping scaling factor a 1. The N point DFT region hosting the watermark is usually split in number of subregions, which in our case are the critical bands. The start location (m) and end location (n) of watermark embedded in these critical bands is decided

1435 by a pre-defined masking threshold. Hence the length of watermark N w is evaluated as N w = (n m)n (6) To maintain the symmetry of DFT magnitude a reflected version of W 0 is required to be generated as W 0 (i) = W 0(N w i 1), 0 i N w 1 (7) The reflected chip W 0 is embedded in the frequency components around coefficient N 1. This is essential to obtain real valued audio in time domain. 3.2 Masking threshold for DFT magnitude In this paper, the magnitude of DFT coefficients of host audio signal are modified by adding watermark, such that the modified spectra is always below the predefined masking threshold, termed as maximum amplitude spread (MAS). The MAS is defined as the maximum of all amplitude spreads (AS) of DFT components at a particular frequency location within a frame. Following steps are involved to find MAS. Step I Finding amplitude spread (AS) The AS of DFT components is evaluated from the energy spreading function given by Schroeder et al. [22] and its effect is seen at all the N frequency locations of a frame. Schroeder presented a real nonnegative energy spreading function which approximated the basilar spreading as a triangular spreading function and is given as SF db (i, j) = 15.81 + 7.5( z + 0.474) 17.5 1 + ( z + 0.474) 2, (8) here SF db (i, j) is the energy spread in decibels (db) from ith to jth frequency location. The bark separation between these two points is given as z = z j z i, where z i and z j denote the bark frequencies of ith and jth frequency locations respectively. Let the audio signal s, given by (1), is sampled at frequency, f s Hertz (Hz). Since audio is real valued signal, its DFT will satisfy the symmetry property i.e. S(k) = S(N k), where k = 1,..., N/2 1. The DFT coefficients S(k) corresponds to frequencies f k given as f k = f s k/n, (9) here 0 k N 1, N being a power of 2. Considering the duplication in the spectra for k N/2, we evaluate the masking spread A 1 (i, j) for amplitude of N/2 components only, given as A 1 (i, j) = SF(i, j), 0 i N/2 1 (10)

1436 Multimed Tools Appl (2014) 71:1431 1453 where SF(i, j) is the inverse decibel of SF db (i, j). The square root is to convert the masking spread from energy scale to amplitude scale. Now respecting the symmetry property of DFT components, we define A(i, j) as, A(i, j) = { A1 (i, j), 0 j N/2 A 1 (i, N j), N/2 + 1 j N 1 (11) The amplitude spread of ith DFT component is then defined as, A (i, j) = A(i, j)s(i), for 0 i N/2 1, 0 j N 1, (12) where S(i) is given by (2). This gives N/2 N matrix showing amplitude spread of each of the N/2 DFT components at N frequency locations. Figure 1 shows a plot of amplitude spread A (i, j) of i = 17th and 20th frequency components at all the frequency location f j for 0 j N 1 given in (9) wheren = 512 and fs = 44.1 khz. Step II Evaluation of maximum amplitude spread (MAS) The amplitude spreads of neighboring DFT components overlap each other. Maximum amplitude spread (MAS) is the maximum of all the overlapping amplitude spreads at f i frequency due to DF T coefficients S( j), 0 j N/2 1 and j = i. MAS, Y(i),atlocationi can therefore be evaluated as Y(i) = max(a (i, j)) for 0 j N/2 1 (13) %energy spread of dft components for n=17(dashed), n=20(dot dash)and individual dft component n=18 (star) 4.5 4 3.5 3 energy spread 2.5 2 1.5 1 0.5 0 0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 frequency(hrz) Fig. 1 Overlapping of amplitude spread of 17th and 20th DFT components and magnitude of 19th DFT component

1437 Now maximum amplitude spread MAS for a critical bands z will be the minimum of all Y(i) in that critical band. From (13), we evaluate the maximum amplitude spread Y(z) for critical bands z = 1, 2,, z t as Y(z) = min( Y(i) ) for LB z i HB z, (14) where LB z and HB z are lower and upper frequency components of zth critical band. Figure 2 shows the plot between maximum amplitude spread Y(i) and the magnitude of DFT coefficients F(i) at all the frequency locations f i for i = 0, 1,..., N 1. 3.3 Watermark embedding In watermark embedding the watermark W is added to host signal F in a way that the symmetry of F is not disturbed. Also, the dc component and nyquist component of DFT spectrum should remain unchanged. This is essential in order to retrieve real valued audio signal after watermarking process. The magnitude of DFT coefficients of host audio signal are modified by multiplicative watermarking, such that the modified spectra is always below the maximum amplitude spread of original signal. Hence, the DFT magnitudes are modified only in certain critical bands to maintain the transparency of audio signal. The embedding steps are described as follows The magnitude F(k) = S(k) and phase φ(k) = S(k) of the spectral coefficients are evaluated for k = 0, 1,, N 1, wheres(k) is given by (2). The distribution of magnitude of DFT coefficients per critical band F z (k), for LB z k HB z is found by translating frequency into bark scale. Here 80 maximum amplitude spread(dot dash)/dft(dots) Vs frequency 70 60 maximum spread/dft 50 40 30 20 10 0 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 frequency(hz) x 10 4 Fig. 2 Maximum amplitude spread of DFT magnitude for a given audio of frame length N = 512

1438 Multimed Tools Appl (2014) 71:1431 1453 z = 1, 2,, z t are the critical bands, z t is total number of critical bands and LB z and HB z are the respective lower and higher frequencies in the critical band z. The watermark is embedded in critical bands in which magnitude of DFT coefficients is less than the defined masking threshold, Y(z). The final watermark is now generated as W(k) = W 0 (i), if mn k nn = W 0 (i), if (1 n)n k (1 m)n = 0, otherwise (15) here 0 i N w and 0 k N 1 and (0 < m < n < 0.5) to maintain symmetry of final watermark. Once location of embedding is decided, the watermark scaling factor a has to be calculated for each critical band to ensure inaudibility of the embedded watermark. The scale factor a z of zth critical band is obtained by dividing masking threshold Y(z) by the maximum magnitude component of the DFT coefficient in each critical band as Y(z) a z = A max( F(k) ), for z = 1, 2,, z t (16) Here A is the gain factor that controls the overall magnitude of the watermarked signal F (k) given in (5). The value of A varies from 0 to 1. The scaling factor a z decides how much the amplitude of watermark is to be suppressed in the selected critical band before adding it to the spectrum of host signal. The scaled watermark is now added according to rule F (k) = F(k) if F(k) Y(z) = F(k)(1 + a z W(k)) if F(k) <Y(z) (17) here 0 k N 1. The modified amplitude of DFT coefficient F (k) is now combined with their corresponding phases φ(k), to get watermarked DFT coefficients S (k). The corresponding time domain watermarked signal s (n) is obtained by calculating inverse discrete fourier transform (IDFT) of S (k) given by (3). 3.4 Optimal watermark detection The aim of watermark detection is to verify, whether or not the given watermark W d at receiver end resides in the test signal F t. The detection is blind i.e. secret key is the only information that detector has at the receiver end. The detector uses salient points for synchronizing the embedded information, so that audio can be analyzed for salient point extraction. Watermark detection can be considered as a binary hypothesis test, solved by means of a correlation detector [13] and log-likelihood ratio detector [2, 5]. However, few assumptions are done before performing the detector tests.

1439 Assumptions about the host signal and watermark It is assumed that magnitude of DFT coefficients of speech signal follows Weibull distribution. The Host signal F and the watermark W are independent and identically distributed i.i.d random variables, hence the detector is optimum. DFT magnitude is wide sense stationary process. For large number of samples likelihood ratio and correlation coefficient attain Gaussian distribution due to central limit theorem. 3.4.1 Likelihood ratio detector The watermarked signal F given in (5), may undergo various signal processing or noisy channel attacks before reaching the receiver end. The received signal F t is now used for watermark detection, by using log-likelihood ratio test. The best suited distribution for magnitude of DFT coefficients F =[f (1),, f (N)] is two parameter Weibull distribution [27] which is defined for positive real axis only. The probabilty density function (pdf) of Weibull distribution is defined as p F ( f ) = β ( ) [ f (i) β 1 ( ) ] f (i) β exp, (18) α α α here f (i) >0 for i = 1, 2,, N. Scaleparameter(α) and shape parameter (β) are positive real valued parameters, which control the mean, variance and shape of distribution. The mean μ f and variance σ 2 f can be written in terms of the scale and shape parameters as ( μ f = αɣ 1 + 1 ), β ( σ 2 f = α2 Ɣ 1 + 2 ) μ 2 f (19) β where gamma function Ɣ(x) is defined as Ɣ(x) = 0 t x 1 exp( t)dt (20) Once the underlying distribution has been chosen, the next step is the estimation of parameters that govern the characteristics of the selected probability function.the parameter estimation problem consists of finding the underlying distribution parameters by observing samples of random variable described in [26]. Given N sample values [ f (1),, f (N)], from the random variable F, which can be modeled by a two parameter Weibull distribution with a pdf as given by (18) the maximum likelihood estimators ˆα and ˆβ of α and β respectively [24] are known to satisfy the equations ˆα = ( 1 N N ( f (i)) ˆβ i=1 ) 1/ ˆβ (21)

1440 Multimed Tools Appl (2014) 71:1431 1453 and ( N )( N ) 1 ˆβ = ( f (i)) ˆβ log f (i) ( f (i)) ˆβ 1 N i=1 i=1 N log f (i) i=1 1 (22) The value of ˆβ has to be obtained from (22) by the use of standard iterative procedures (i.e. Newton Raphson method) and then used in (21) to obtain ˆα. Although the optimum decoder structure requires knowledge of the distribution underlying the magnitude of the non-watermarked coefficients f i, this information is not present at the decoder side. Since decoding is done without resorting to the original audio, the decoder has no access to the original coefficients. Hence the distribution of the non-watermarked coefficients f i needs to be approximated by the distribution of the watermarked coefficients f i. As long as the embedding strength and thus the watermark power is kept small, the difference between the two distributions will be negligible. The values of α and β obtained from maximum likelihood estimator are 2.9369 and 0.6833 respectively. Having identified a suitable model for host feature, we now find the likelihood ratio, as given in [1]. Also, the performance of a log-likelihood based technique can be measured in terms of probability of false alarm P f and probability of misdetection P m. The plot of P f versus P m is called the Receiver Operating Characteristic (ROC) curve of the corresponding watermarking system. This curve conveys all the information required in order to judge the detection performance of a such a system. 3.4.2 Correlation detector The correlation detector, which is the Maximum Likelihood (ML) optimal detector, is applied to additive or multiplicative watermarking system. These detectors give optimal results while considering Gaussian distribution for the host signals. The correlation detection can be performed by computing the correlation c between pseudorandom sequence W and watermarked signal F t in time or frequency domain given as c = F t W =[F(1 + αw)]w = FW + αfww (23) The correlation is compared to a predefined threshold to determine whether watermark is present in the signal or not. Most popular pseudo-random sequence is the maximum length sequence (also known as M-sequence) [8]. The received signal F t is used for watermark detection, by using correlation test. 4 Experimental results To generate experimental results, a total of 10 standard audio test sequences are takenwhicharelistedintable1. These test sequences are adopted to analyze the performance of the proposed watermarking algorithm. Each signal was sampled at 44.1 khz, represented by 16 bits per sample, and 8 s in length. The DFT magnitude of audio signal was assumed to follow Weibull distribution and the value of the parameters was evaluated using maximum likelihood method as shape parameter, β = 0.6833 and scale parameter, α = 2.9369.

1441 Table 1 Audio test sequences (44.1 khz, 16 bit) TS. no. Audio TS. no. Audio 1 Drums 6 Clarinet 2 Flute 7 Waltz 3 Speech (mono) 8 Jazz 4 Speech (stereo) 9 Synth 5 Violin 10 Haffner 4.1 Experimental performance evaluation The value of scaling factor a is changed and its effect is seen on performance of likelihood ratio detector and correlation detector respectively. For this the values of a for various critical bands are obtained using (16). Effect on detection threshold In case of LLR detector, the effect of scale factor a is observed on detection threshold. First we have shown the curves between and P f keeping the value of a fixed. The upper and lower portion of Fig. 3 shows the variations of with respect to P f for two values of a, 0.0024 and 0.8 respectively. The first value, a = 0.0024, is obtained from MAS threshold and second value, 0.8 is selected close to the maximum limit of a to show the effects clearly visible. As can be seen from figure, for the same range of P f the variations in is only 0 < 0.08 when a = 0.0024. Whereas the variations are quite high (0 20) for a = 0.8. Next we analyse the variations of with respect to a for all the values in 0.08 0.06 Detection Threshold Λ Vs Probability of false alarm P f for LLR detector a=0.0024 Λ 0.04 0.02 0 10 10 10 8 10 6 10 4 10 2 10 0 P f 40 a=0.8 20 Λ 0 20 10 10 10 8 10 6 10 4 10 2 10 0 P f Fig. 3 Threshold versus probability of false detection for LLR detector for two values of scaling factor a

1442 Multimed Tools Appl (2014) 71:1431 1453 lambda 15 14 13 12 Scaling factor versus detection threshold Lambda 11 10 9 8 7 6 5 4 3 2 1 0 10 4 10 3 10 2 10 1 10 0 scaling factor Pf=10 6 Lambda Fig. 4 Threshold versus scaling factor for Log-LLR detector for P f = 10 6 the range of 0 < a 1. Figure4 shows the variation of with respect to a for a fixed value of P f ( 10 6 ). From the plot we observe that the value of remains constant for a 0.04. However, as the value of a is increased beyond 0.04 a steep rise in is obtained. Another observation from figure is that with decreasing a, the value of detection threshold also decreases which in turn degrades the detector response. In case of correlation detector the effect of a is observed on detection threshold T c. A plot between T c and P f for two different values of a (i.e. 0.0024 and 0.8) is shown in upper and lower portion of Fig. 5. From the figure we observe that 0.5 Detection Threshold T c Vs Probability of false alarm P f for correlation detector a=0.0024 T c 0 0.5 10 8 10 6 10 4 10 2 10 0 10 2 P f 0.3 0.2 a=0.8 T c 0.1 0 0.1 10 4 10 3 10 2 10 1 10 0 10 1 P f Fig. 5 Threshold versus probability of false detection for correlation detector for two values of scaling factor a

1443 T c = 0.27 when P f = 10 3 for both the values of a. Also the value of threshold lies within the range of 0 T c 0.5 for a wide variation of a (i.e. 0 a 1). Hence it can be inferred from the curves that the output of correlation detector is not much effected by scaling factor a. Instead the output depends mainly on pn sequence, taken as watermark during the embedding process. Effect on ROC The Receiver Operating Characteristic (ROC) curve is obtained from likelihood ratio and correlation watermark detectors, as shown in Fig. 6 respectively. The results are compared with actual experimental curve for both detectors with two different values of a, i.e.0.0024 and 0.8. It is observed that for a = 0.0024 the three curves nearly coincide with each other, whereas the same is not true for the case a = 0.8. For the proposed value of a, given in Section 3.2, the statistical detectors give optimum results which are close to actual experimental value. Further we observe that LLR detector gives better approximation to Fig. 6 Receiver operating characteristic curve for scaling factor α = 0.0024 (upper curve) andα = 0.4 (lower curve), respectively 10 0 ROC curve for Correlation and likelihood detector 10 2 Correlation detector Likelihood ratio detector Experimental curve Pf z 10 4 10 6 SCALING FACTOR = 0.0024 10 8 10 8 10 6 10 4 10 2 10 0 Pm 10 0 ROC curve for correlation and llr detector 10 1 10 2 10 3 Correlation detector Likelihood ratio detector Experimental results Pf z 10 4 10 5 10 6 10 7 SCALING FACTOR = 0.4 10 8 10 8 10 6 10 4 10 2 10 0 Pm

1444 Multimed Tools Appl (2014) 71:1431 1453 Fig. 7 Subjective quality evaluation of watermarked audio experimental results as compared to correlation detector, for all values of scaling factor. 4.2 Objective and subjective quality evaluation Subjective and objective quality tests are performed to evaluate the quality of watermarked audio signal [20]. The subjective audio quality of watermarked audio is evaluated by double-blind A-B-C triple-stimulus hidden reference comparison test. Stimulus A contains the reference signal, whereas B and C are pseudo-randomly selected from the watermarked and the reference signal. After listening to all three, the subject was asked to identify either B or C as the hidden reference, and then grade the watermarked signal relative to the reference stimulus using the SDG. The standard [14] specifies 20 subjects as an adequate size for the listening panel. Since expert listeners participated in the test, the number of listeners has been reduced to 10 for an informal test. A training session preceded the grading session where a trial was conducted for each signal. The tests were performed with headphones in a special cabin dedicated to listening tests. Ten test signals - selected from the sound with a length of 10 20 s have been presented to the listeners. The results of the listening test are shown in Fig. 7. For the different audio files, the mean SDG value and the 95 % confidence interval are plotted as a function of the different audio tracks to clearly reveal the distance to transparency (SDG= 0). It is observed from the above results that the quality degradation of the proposed watermarking scheme is very small for the vast majority of the test items, given in Table 1. For all test items the SDG is within 0.7 to 0.065 which indicates that there is no significant distortion introduced by this scheme.

1445 Table 2 Results of ODG and scaling factor for multiplicative embedding in DFT magnitude of audio signals S. no. ODG a 1 1.624 0.8 11.8741 2 1.436 0.4 6.2374 3 0.999 0.1 1.9353 4 0.710 0.05 1.0094 5 0.641 0.005 0.1050 6 0.065 0.0024 0.0505 7 +0.045 0.001 0.0211 8 +0.145 0.0005 0.0105 For objective quality measure, software PQevalAudio for perceptual evaluation of audio quality (PEAQ) is utilized to evaluate an objective difference grade (ODG), which is an objective measurement of SDG. Table 2 lists the average value of PEAQ/ODG with the give test items for varying value of a. It shows that as value of scaling factor a decreases, perceptual quality of watermarked audio becomes better. However, if the value of scaling factor is lowered below the value obtained from MAS (0.0024), ODG obtained is positive. The ITU recommendation does not allow positive ODGs, because this could also happen in listening tests, where the file under test is rated better than the reference file. The value of ODGobtained from watermarkedaudio is 0.065 for the optimum value of a = 0.0024. From ROCs plotted in Fig. 6 and the objective quality given in Table 2 we observe that for small values of a the detector response is poor, but perceptual quality is within acceptable limits. On the contrary, for larger values of scale factor (a 0.04) the detector response improves, but then the perceptual transparency is deteriorated. It can be inferred from these results that proposed technique gives a good tradeoff between perceptual transparency and detector performance. 4.3 Watermark embedding capacity The proposed scheme provides high watermark embedding capacity with least perceptual distortions. Table 3 compares the embedding capacity and perceptual quality of proposed scheme with other schemes present in literature. The scheme of Megías et al. [18] achieves value of ODG between 0.5 and 2, which is not an acceptable range. The technique proposed by Fujimoto et al. [10] provides high watermark embedding rate of 1 kbps and is simple to implement. However, the scheme only considers mp3 compression attack and ODG value is not mentioned. The algorithm proposed by Fallahpour and Megias [9] achieved a high capacity of about 3 kbps and it is robust against most attacks. The average ODG score achieved is 0.5, which is not too satisfactory. This could be due to the fact that the manipulation based on the estimated FFT coefficients introduces distortions. Table 3 Comparison of ODG and watermark embedding capacity between available literature schemes Technique ODG Embedding capacity Megías et al. [18] 0.5 to 2 61 bps Fujimoto et al. [10] 1 kbps Fallahpour and Megias [9] 0.5 3 kbps Proposed 0.065 to 0.7 1.42 4 kbps

1446 Multimed Tools Appl (2014) 71:1431 1453 The embedding capacity of proposed scheme was found to be 1.4 kbps, with (ODG = 0.065), when embedding was done in only one critical band. The average watermark capacity increased to 4 kbps, with ODG = 0.7), when embedding was performed in more then one critical bands (i.e. 3). As compared to HAS, MAS enables relatively higher watermark embedding rate in DFT magnitude within acceptable limits of perceptual quality. The proposed method is thus able to provide large capacity whilst keeping imperceptibility in the admitted range ( 1 to 0). 4.4 Robustness to attacks The other major issue in watermarking is robustness to various attacks. We will now present the robustness of watermark against additive white gaussian noise (AWGN) noise and presence of multiple watermarks. Fig. 8 Upper curve shows percentage watermark recovery with respect to SNR and lower curve shows correlation detector response for scaling factor a = 0.0024 percentage watermark recovery 100 90 80 70 60 50 40 percentage watermark recovery and Eb/No 30 20 10 1 2 3 4 5 6 7 8 9 10 Eb/No 0.4 Correlation detector response to 1001 random watermarks correct watermark is 501th 0.35 watermark detector response 0.3 0.25 0.2 0.15 0.1 0.05 0 200 400 600 800 1000 1200 watermarks

1447 4.4.1 Addition of AWGN noise The performance of watermark channel is evaluated in the presence of AWGN. A plot between BER and percentage watermark recovery is shown by upper curve in Fig. 8. As can be seen from figure more then 99 % of watermark recovery is achieved for SNR value of 6 db and above. This implies high robustness of watermark against AWGN noise. 4.4.2 Presence of multiple watermark To see the effect of presence of multiple watermark 1,000 normally distributed pseudo-random sequences, with mean 0 and variance 1, are generated. These sequences are used as test sequences W t for watermark detection process. The correct test watermark W d was used at 501th iteration. Further both types of detectors i.e. likelihood ratio and correlation detectors, are used. In case of LLR detector the value of obtained is 9.8 for P f = 10 6 with scaling factor a = 0.8. The LLR detector output is shown for high value of a, as the response of this detector is poor for small values of a, as can be seen from Fig.4. Log-likelihood ratio of correct watermark obtained is above 9.8 whereas the LLR ratio of other watermarks is well below the threshold. Similarly in case of correlation detector the value of threshold T c obtained statistically was 0.271. As can be seen from lower curve of Fig. 8 the correct watermark at 501th can be very easily distinguished from other watermarks. The correlation coefficient c ofcorrectwatermarkisabove0.271 whereasotherwatermarksarequite below the threshold. Hence the threshold values evaluated statistically matches with the experimental results. 4.5 Robustness to common audio manipulations Further, we test the robustness of our work against several kinds of common audio manipulations (or attacks). The audio editing tools adopted in our experiment are Cool Edit Pro v2.1 and Goldwave v5.10 to generate all the following Table 4 Robustness to common audio processing operations Attacks Correlation Correlation Correlation (mono) (drum) (flute) Time stretch (preserve pitch) 0.9129 0.8660 0.8660 Pitch Shift (preserve tempo) 0.8774 0.7773 0.7519 Resample (preserve neither) 0.7994 0.7790 0.7999 Low pass filter 0.8272 0.8022 0.8024 High pass filter 1 0.9553 0.9522 MP3 (128 kbps) 0.8972 0.955 0.9079 Resample (16 k/16 bps) 0.7994 0.8320 0.8054 Cropping (with half left) 0.9102 0.92 0.9501 Delay (10.2 ms) 0.7962 0.8938 0.7961 Invert 0.9351 0.9523 0.9975

1448 Multimed Tools Appl (2014) 71:1431 1453 attacks. The correlation of template matching is given in Table 4 to show the applicability of the proposed scheme in searching for watermark protected audio clips. MP3 compression: To test the robustness against lossy compression, the watermarked audio is compressed and decompressed by MPEG-I Layer 3 (MP3) at 128 kbps. Results indicate high values of the correlation. Re-sampling: The watermarked audio with original 44,100 Hz sampling rate and 16 bits/sample is re-sampled down to 16,000 Hz and 16 bits per sample. Then the low-resolution audio is up-sampled to 44,100 Hz and re-quantizated to 16 bits/sample. Although the above procedure caused audible noise, there is almost no effect on the correlation of template matching and the extracted owner s information is hardly affected. Low-pass filtering: To test the robustness against filtering, a low-pass filter was applied to the watermarked audio sampled at 44,100 Hz. A lowpass filter with less than 3 db of ripple in the passband defined from 0 to 4kHz and at least 40 db of ripple in the stopband defined from 6 khz to the Nyquist frequency (22,050 Hz) was designed. The loss of high frequency components is clearly audible; however, the symmetrically embedded watermark can be detected successfully from the low frequency components. Random cropping: The watermarked audio is randomly cropped and left a half segment in length. Due to the fact that each slice is an independent processing unit, we can extract watermarks from the remaining frames after block synchronization. We can successfully recognize the hidden information and the correlations of template matching are reasonably high. High Pass Filter: A 6th-order highpass Butterworth filter with cutoff frequency of 7,000 Hz was applied on watermarked data sampled at 44,100 Hz. The symmetrically embedded watermark can be detected successfully from the high frequency components. Time scaling: The watermarked audio is scaled by 1.2 % for testing, including the following three different kinds: time stretching (preserves pitch), pitch stretching (preserves tempo) and resampling (preserves neither). The time scaling of resampling attacks, time stretching and pitch stretching attacks has very low effect on our extracting scheme. The shifting and scaling of each slice can be detected by template matching. It has been observed from the results that due to symmetrically embedded watermark in DFT magnitude, proposed scheme is robust against most signal processing attacks. 4.6 Robustness to Stirmark Audio Benchmark Stirmark for Audio [23] is a standard robustness evaluation benchmark tool for audio watermarking techniques. The test results for all test functions in Stirmark Benchmark for Audio V0.2 are listed in Table 5 and are performed with the default parameters included in the version of the tool available online [23]. For that experiment, we have selected 10 standard audio clips (Table 1), watermarked it, and then detected watermarks in the original, the marked copy, and all 49 clips created by

1449 Table 5 Watermark detection results on audio clips attacked with the Stirmark Audio Benchmark Attacks Correlation Attacks Correlation Attacks Correlation addbrumm_100 0.7681 addbrumm_1100 0.7741 addbrumm_2100 0.8553 addbrumm_3100 0.7958 addbrumm_4100 0.7958 addbrumm_5100 0.8361 addbrumm_6100 0.8065 addbrumm_7100 0.7516 addbrumm_8100 0.7092 addbrumm_9100 0.7092 addbrumm_10100 0.7851 addfftnoise 0.8573 addnoise_100 0.7730 addnoise_300 0.8756 addnoise_500 0.7448 addnoise_700 0.7946 addnoise_900 0.8066 addsinus 0.9029 amplify 0.5774 compressor 0.9037 copysample 0.7698 cutsamples 1 dynnoise 0.7997 echo 0.7715 exchange 0.6251 extrastereo_30 1 extrastereo_50 1 extrastereo_70 1 fft_hlpass 0.8117 fft_invert 0.7707 fft_real_reverse 0.7730 fft_stat1 1 fft_test 1 flippsample 0.7645 invert 0.8525 lsbzero 1 normalize 1 nothing 1 original 0.4008 rc_highpass 0.7180 rc_lowpass 1 resampling 0.8660 smooth 0.8660 smooth2 0.7303 stat1 fail stat2 fail voiceremove fail zerocross 1 zerolength 0.5774 zeroremove 1

1450 Multimed Tools Appl (2014) 71:1431 1453 Table 6 Comparison of execution time between proposed and existing model Execution time Mono (speech) Drum Flute Stereo (ms) (ms) (ms) (ms) Global masking threshold 7.89 8.2057 6.4116 7.0668 Maximum amplitude spread 2.49 2.46 2.4336 2.776 the Stirmark Audio suite of attacks. The detection results are presented in Table 5. The detection threshold is set to T c = 0.27, which results in an estimated probability of a false positive smaller than 10 3 for a variety of audio clips. From Table 5, we observe that most of the attacks had minimal effect on the correlation value. The attacks that reduced significantly the correlation value or removed the watermark (such as Stat1, Stat2 and VoiceRemove), had a strong impact on the fidelity of the recording, so that the attacked clip almost did not resemble the original. The attack Stat1 and Stat2 averages the sample with its next neighbors and hence changes the DFT magnitude. Similarly VoiceRemove attack removes the mono part of the file. If the audio signal isn t multichannel (mono) then everything will be removed. Hence the test failed when speech(mono) is used. 4.7 Computational complexity The execution time (etime) for evaluating masking threshold from existing psychoacoustic model and from proposed model on MATLAB 7.7 using Intel Core i3 CPU, 32 bit operating system was evaluated. Table 6 shows that computation time required for evaluating masking threshold from DFT magnitude (proposed technique) is much less then the execution time for frequency masking threshold of MPEG/audio psychoacoustic model. 5 Conclusion The proposed multiplicative spread spectrum based audio watermarking technique embeds watermark in DFT magnitude of audio signal. In order to improve two parameters, the embedding capacity and the computational complexity, a new perceptual model for magnitude of DFT coefficients is developed. This model finds the regions of highest watermark embedding capacity with least perceptual distortion. Also the proposed method reduces computations by bypassing the complex psychoacoustic modeling, required for fulfilling the condition of transparency. Further the scheme uses blind watermark detection i.e. detector does not require original copy of the audio signal to detect watermark from the received audio signal. Theoretical evaluation of detector performance using correlation detector and likelihood ratio detector is undertaken under the assumption that host feature (DFT magnitude) follows Weibull distribution. The performance of scheme is investigated experimentally and statistically and results are compared with the existing schemes in terms of perceptual quality and embedding capacity. The results shown that proposed scheme gives higher embedding capacity as compared to existing high watermark embedding techniques keeping the perceptual quality well within limits. Also, it was observed

1451 from experimental results that proposed scheme is robust to various signal processing attacks like presence of multiple watermarks, AWGN and MP3 compression. References 1. Barni M, Bartolini F (2004) Watermarking systems engineering: enabling digital assets security and other applications. Marcel Dekker, New York 2. Barni M, Bartolini F, De Rosa A, Piva A (2001) A new decoder for the optimum recovery of nonadditive watermarks. IEEE Trans Image Process 10(5):755 766 3. Bassia P, Pitas I, Nikolaidis NN (2001) Robust audio watermarking in the time domain. IEEE Trans Multimedia 3:232 241 4. Boney L, Tewfik AH, Hamdy KN (1996) Digital watermarks for audio signal. In: Proc. IEEE int. conf. multimedia comput. syst. (ICMCS), Hiroshima, Japan, pp 473 490 5. Cheng Q, Huang TS (2003) Robust optimum detection of transform domain multiplicative watermarks. IEEE Trans Signal Process 51(4):906 924 6. Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673 1687 7. Cvejic N, Seppänen T (2004) Spread spectrum audio watermarking using frequency hopping and attack characterization. Signal Process 84(1):207 213 8. Cvejic N, Keskinarkaus A, Seppänen T (2001) Audio watermarking using m-sequences and temporal masking. In: Proceedings of IEEE workshops on applications of signal processing to audio and acoustics, New Paltz, New York, pp 227 230 9. Fallahpour M, Megias D (2009) High capacity audio watermarking using FFT amplitude interpolation. IEICE Electronics Express 6(14):1057 1063 10. Fujimoto R, Iwaki M, Kiryu T (2006) A method of high bit rate data hiding in music using spline interpolation. In: Proceedings of the 2006 international conference on intelligent information hiding and multimedia signal processing (IIH-MSP 06), pp 11 14 11. Garcia RA (1999) Digital watermarking of audio signals using a psychoacoustic auditory model and spread spectrum theory. In: 107th convention: Audio Engineering Society, New York 12. Garcia-Hernandez JJ, Nakano M, Perez-Meana H (2008) Data hiding in audio signal using rational dither modulation. IEICE Electronics Express 5(7):217 222 13. Hyun KW, Dooseop C, Hyuk C, Taejeong K (2010) Selective correlation detector for additive spread spectrum watermarking in transform domain. Signal Process 90(8):2605 2610 14. ITU-R (1993) Recommendation BS.1116. Methods for the subjective assessment of small impairments in audio systems including multichannel sound systems. Technical report, ITU 15. Kirovski D, Malvar H (2003) Spread-spectrum watermarking of audio signals. IEEE Trans Signal Process 51(4):1020 1033 16. Lee S-K, Ho Y-S (2000) Digital audio watermarking in Cepstral domain. IEEE Trans Consumer Electron 46(3):744 750 17. Malik H, Ansari R, Khokhar A (2008) Robust audio watermarking using frequency-selective spread spectrum. Inf Secur (IET) 2(4):129 150 18. Megías D, Herrera J, Minguillón J (2005) Total disclosure of the embedding and detection algorithms for a secure digital watermarking scheme for audio. In: Information and communications security. Lecture notes in computer science, vol 3783, pp 427 440 19. Megías D, Serra-Ruiz J, Fallahpour M (2010) Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification. Signal Process 90(12):3078 3092 20. Neubauer C, Herre J (1998) Digital watermarking and its influence on audio quality. In: Proceedings of 105th Audio engineering society convention, San Francisco, CA 21. Painter EM, Spanias AS (1997) A review of algorithms for perceptual coding of digital audio signals. In: 13th international conference on digital signal processing proceedings DSP-97, vol 1, pp 179 208 22. Schroeder MR, Atal BS, Hall JL (1979) Optimizing digital speech coders by exploiting properties of the human ear. J Acoust Soc Am 66(6):1647 1652 23. Steinebach M, Petitcolas FAP, Raynal F, Dittmann J, Fontaine C, Seibel S, Fates N, Ferr LC (2001) StirMark benchmark: audio watermarking attacks. In: Proceedings international conference information technology: coding and computing, pp 49 54

1452 Multimed Tools Appl (2014) 71:1431 1453 24. Stone GC, Van HG (1977) Parameter estimation for the Weibull distribution. IEEE Trans Electr Insul EI-12(4):253 261 25. Swanson MD, Zhu B, Tewfik AH, Boney L (1998) Robust audio watermarking using perceptual masking. Signal Process 66(3):337 355 26. van Trees HL (1968) Detection, estimation and modulation theory, part I. Wiley, New York 27. Weibull W (1951) A statistical distribution function of wide applicability. J Appl Mech 18(3): 293 297 Jyotsna Singh received her B. Tech degree in Electronics from Harcourt Butler Technological Institute, Kanpur, India in 1995 and M. Tech degree in Signal Processing from Netaji Subhas Institute of Technology, Delhi University, Delhi, India, in 2001. She is working as Assistant Professor in Netaji Subhas Institute of Technology, Delhi University, New Delhi since 2001. She is currently working towards the Ph.D degree in Electronics and Communication Engineering from the University of Delhi, India. Her research interests include Speech Recognition and Digital Watermarking of Multimedia. Parul Garg received B.Sc.(Engg.) and M.Sc.(Engg.) degrees from Aligarh Muslim University, Aligarh, India,in 1990 and 1994, respectively, all in Electronics Engineering and her Ph. D. degree in Electrical Engineering from Indian Institute of Technology, Delhi in 2005. From May 1996 to July 2000 she worked as a faculty member at the Institute of Engineering and Technology, Lucknow, India. Since July 2000, she has been working as a faculty member at the Netaji Subhas Institute of Technology, New Delhi, India. Her current work mainly focuses on different aspects of wireless communications with emphasis on channel estimation, diversity techniques, cooperative communication, network coding and cognitive radio. She is also working on data hiding in audio signals.

1453 Dr. Aloknath De is Country Director for ST-Ericsson India. He holds B.Tech. from Indian Institute of Technology (IIT), Kharagpur; M.E. from Indian Institute of Science (IISc), Bangalore; and Ph.D. from McGill University, Montreal. He is a recipient of Alexander Graham Bell Prize in Canada for his research work in Speech Communication area. He has received IETE Memorial Awards in 2003 and 2008 for distinguished contributions in the fields Electronics and Communication with emphasis on Industrial R&D and Mobile Communication, respectively. Dr. De has over twenty years of industrial and research experiences including BEL, Nortel (Montreal), Hughes and STMicroelectronics prior to leading ST-Ericsson in India. He has been chair (1999-2003) for Media Processing group of International Multimedia Telecommunication Consortium (IMTC), California. He has also been in the technical program committees of various international conferences such as Eurospeech, Supercomm India, VLSI Conf., IEEE CCNC, IEEE Intl Conf on Communications, IEEE Globecom Workshop and others. In late-2009, he co-chaired an INAE workshop on Making India Powerhouse for Semiconductor Design. He s a Senior Member of IEEE and a Fellow of IE, IETE and Indian National Academy of Engg (INAE). He has held an AICTE-INAE Distinguished Visiting Professorship with IIT-Roorkee for 2005-08 and is currently an Adjunct Professor with IIT-Delhi. His current thrust is on system-on-chip (SoC) and embedded solutions for mobile devices and other multimedia communication appliances.