DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Similar documents
Research Article A Robust Zero-Watermarking Algorithm for Audio

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

High capacity robust audio watermarking scheme based on DWT transform

Lossless Image Watermarking for HDR Images Using Tone Mapping

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio

A Blind EMD-based Audio Watermarking using Quantization

DWT based high capacity audio watermarking

An Enhanced Least Significant Bit Steganography Technique

Efficient and Robust Audio Watermarking for Content Authentication and Copyright Protection

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Localized Robust Audio Watermarking in Regions of Interest

Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates

FPGA implementation of DWT for Audio Watermarking Application

Introduction to Audio Watermarking Schemes

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Journal of mathematics and computer science 11 (2014),

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

Reversible Watermarking on Histogram Pixel Based Image Features

An Audio Fingerprint Algorithm Based on Statistical Characteristics of db4 Wavelet

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

Authentication of grayscale document images using shamir secret sharing scheme.

Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Keywords Secret data, Host data, DWT, LSB substitution.

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Abstract. Keywords: audio watermarking; robust watermarking; synchronization code; moving average

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Robust Watermarking Scheme Using Phase Shift Keying Embedding

Geometrically Invariant Digital Watermarking Using Robust Feature Detectors. Xiao-Chen Yuan. Doctor of Philosophy in Software Engineering

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking patient data in encrypted medical images

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

A Survey of Substantial Digital Image Watermarking Techniques

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Local prediction based reversible watermarking framework for digital videos

REVERSIBLE data hiding, or lossless data hiding, hides

2008/12/17. RST invariant digital image watermarking & digital watermarking based audiovisual quality evaluation. Outline

A Novel Approach for Signal Security and Video Transmission using Lower Bandwidth Technique

Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique

International Journal of Advance Research in Computer Science and Management Studies

Image Quality Estimation of Tree Based DWT Digital Watermarks

Mel Spectrum Analysis of Speech Recognition using Single Microphone

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Literature Survey on Image Manipulation Detection

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Tampering and Copy-Move Forgery Detection Using Sift Feature

A self-adaptive Contrast Enhancement Method Based on Gradient and Intensity Histogram for Remote Sensing Images

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

Robust Blind Complex Double Haar Wavelet Transform Based Watermarking Algorithm for Digital Images

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF

Armor on Digital Images Captured Using Photoelectric Technique by Absolute Watermarking Approach

Multiresolution Watermarking for Digital Images

HTTP Compression for 1-D signal based on Multiresolution Analysis and Run length Encoding

A Review Paper on Image Processing based Algorithms for De-noising and Enhancement of Underwater Images

EFFICIENT CONTRAST ENHANCEMENT USING GAMMA CORRECTION WITH MULTILEVEL THRESHOLDING AND PROBABILITY BASED ENTROPY

Transform Domain Technique in Image Steganography for Hiding Secret Information

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

A COMPARATIVE ANALYSIS OF DCT AND DWT BASED FOR IMAGE COMPRESSION ON FPGA

PRIOR IMAGE JPEG-COMPRESSION DETECTION

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Robust watermarking based on DWT SVD

Commutative reversible data hiding and encryption

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Introduction to Video Forgery Detection: Part I

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

A Reversible Data Hiding Scheme Based on Prediction Difference

Dynamic Collage Steganography on Images

A Novel Watermarking Technique Based on Visual Cryptography

Direct Binary Search Based Algorithms for Image Hiding

Blind Image Fidelity Assessment Using the Histogram

High Capacity Audio Watermarking Based on Fibonacci Series

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Printed Document Watermarking Using Phase Modulation

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

JPEG Image Transmission over Rayleigh Fading Channel with Unequal Error Protection

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

Adaptive Selection of Embedding. Spread Spectrum Watermarking of Compressed Audio

Audio watermarking robust against D/A and A/D conversions

Medical Image Watermarking using a Perceptual Similarity Metric

Improving DWT-DCT-Based Blind Audio Watermarking Using Perceptually Energy-Compensated QIM

CERIAS Tech Report

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

ICA & Wavelet as a Method for Speech Signal Denoising

Visual Secret Sharing Based Digital Image Watermarking

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

An Audio Watermarking Method Based On Molecular Matching Pursuit

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

Tampering Detection Algorithms: A Comparative Study

Digital Watermarking Using Homogeneity in Image

An Overview of Image Steganography Techniques

Audio Signal Compression using DCT and LPC Techniques

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm

Transcription:

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India. * Assistant Professor,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode- 638052,India. Abstract-In this paper an audio zero watermark scheme based on energy relationship between adjacent audio sections has been proposed. Because of audio watermarking algorithms are not easy to develop. The human ear is far more sensitive than other human sensory organs like eyes. The host audio signal is divided into number of sections. One level Discrete Wavelet Transform is applied to each audio data blocks. Then the relational value array has been generated by comparing the energy of neighbored approximation coefficients. Watermark bits are XORed with the relational value array in order to produce the secret key during embedding process. In extraction scheme the watermark bits are extracted by the reverse process of embedding. Index Terms-Audio zero watermark, Discrete Transform (DWT), Energy comparison. I.INTRODUCTION Wavelet Watermarking is a technique through which the information is carried without degrading the quality of the original signal. is used to increase the security, which does not allow any unauthorized users to manipulate or extract data. Watermarking technology is now helpful in the attention of protecting copyrights for the images. There are two types of watermarks are present. They are visible and invisible or transparent watermarks, which cannot be perceived by the human sensory system. Based on the embedding domain, watermarking system can be classified as spatial domain and transform domain [6]. An audio watermarking is a technology to hide information in an audio file without the information to the listener and without affecting the quality of the audio signal [9], [12]. The spatial domain watermarking system can directly alters the main data elements in an image to hide the watermark data. The transform domain watermarking system alters the transforms of data elements to hide the watermark data. This has proved to be more robust than the spatial domain watermarking [8], [11]. Some complexities are present in the execution process. To overcome those problems a new audio signal decomposition method called Discrete Wavelet Transform (DWT) is used in our method [1]. One was derived from low frequency DWT coefficients, and the other was constructed from DWT coefficients of log-polar mapping of the host image 38 [2].The audio embedded into watermark with the help of secret key and the watermarked image pass through the channel which several attacks like noise addition, re-sampling etc.,[4],[15] The same secret key after attacks in watermarked image to recover the original watermark image. Audio Watermark Embedding Attacks Internet Extraction Fig 1.Watermark system model Original watermark data Watermarking should be made in a way that they should provide the high robustness against various attacks such as the digital-to-analog and analog-to-digital conversions, noise addition, filtering, time scale modification, echo addition and sample rate conversion Watermarked signal should not lose the quality of the original signal [13]. It is called imperceptibility. Watermarking is employed on the original samples of the audio signal. Then for the transformation techniques, the discrete cosine transform and the discrete wavelet transform [3] etc., In transformation based approach the embedding is done on the samples of the host signal after they are transformed. Based on the application domain, the watermarks are classified into source based watermarks and destination-based watermarks. Sourcebased watermarks are desirable for authentication only. In destination based watermarks, each distributed copy gets a unique watermark identified by the particular buyer only [7],[14]. II. WATERMARK EMBEDDING The embedding process involves several steps of operations. The steps are explained in detail as follows [10]. They are segmentation of an audio signal, DWT based time decomposition of the segmented frames of an audio signal. The block diagram of watermark embedding is shown in Figure 2.

Divide into section s International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) Step 1: The audio signal gets divided into number of frames. The number of samples in each frame of a segmented audio signal is same for the purpose of watermark embedding. Audio data Section 1 Section 2 Section 3 ---- ---- Fig 4.Host audio signal (2) Step 2: Each sections are called audio data blocks. Each section has N samples. Audio data blocks DWT S(i) = sum(abs(yi(k))*abs(yi(k))) T value = 1 S(i)>S(i+1) F value = 0 value array Xor Binary Watermark image Fig 2.Flow chart for watermark embedding Fig 5.Segmented Frames Step 3: One level Discrete Wavelet Transform (DWT) is applied into samples in each sections. The signal divided into approximation and detailed coefficients. Then the approximation coefficients of one level DWT is obtained. Step 4: Energy will be calculated in approximation coefficients. S(i) = sum(abs(yi(k))*abs(yi(k))) (1) Fig 3.Host audio signal (1) 39 Fig 6.1D Discrete Wavelet Transform (DWT) The energy S(i) is sum of absolute values of approximation coefficients multiplied by other absolute values of approximation coefficients.

Divide into sections International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) Step 5: Compare the energy of each coefficients. The energy S(i) is greater than next energy values S(i)+1 then the condition is TRUE. In TRUE condition the relational value get 1.The energy S(i) is less then next energy values S(i)+1 then the condition is FALSE. In FALSE condition the relational value get 0.The relational values gotten between each adjacent section is called relational value array. Step 6: The binary-pixel watermark image and relational value array on perform exclusive OR operation to get a key. With this key the watermark can be extracted. Send this key to the extracting side. Audio data Section 1 Section 2 Section 3 ---- ---- Audio data blocks DWT S(i) = sum(abs(yi(k))*abs(yi(k))) T S(i)>S(i+1) F Fig 7.Watermark image value = 1 value array Xor value = 0 Watermark image Fig 9.Flow chart for extraction method Fig 8. III.WATERMARK EXTRACTION The watermark extraction is the reverse process of watermark embedding. The watermarked audio signal is processed and finally the watermarked image is extracted. Step 1: The audio signal is divided into number of sections. Step 5: Compare the energy of each coefficients. The energy S(i) is greater than next energy values S(i)+1 then the condition is TRUE. In TRUE condition the relational value get 1.The energy S(i) is less than next energy values S(i)+1 then the condition is FALSE. In FALSE condition the relational value get 0. The relational values gotten between each adjacent section is called relational value array. Step 6: The relational value array and key on perform exclusive OR operation to recover the original watermark image in the extraction side. Step 2: Each sections are called audio data blocks. Each section has N samples. Step 3: One level Discrete Wavelet Transform (DWT) is applied to every segmented frame. The approximation coefficients of one level DWT is obtained. Step 4: Energy will be calculated in approximation coefficients. Fig 10.Recovered image IV.RESULTS AND DISCUSSIONS 40

The audio signal is taken for the simulation process. It is sampled at the rate of 44.1kHz.The 5 X 6 binary watermark image embedded into the audio signal to get a secret key. In extraction method the audio signal and generated key is Xored to recover the original watermark image. Our simulation results are analyzed by calculating Signal to Noise Ratio (SNR), Bit Error Rate (BER) and Normalized Cross Correlation (NC) values for different audio signals. Signal to Noise Ratio (SNR) is a specification that measures the level of the audio signal compared to the level of noise present in the signal. It is important sound level measurement used in describing the capabilities and qualities of many electronic sound components. It is used to calculate for original and watermarked audio signals. Table I.SNR values for different audio signals Methods S. Wu S., J. Huang J., D. Huang et al. Noise addition Re-sampling SNR NC BER SNR NC BER 13.15 0.93 1 23.17 1 0 L. Liang et al. 13.24 0.88 3 32.36 1 0 Audio signal SNR(dB) Classic 20.22 Handel 19.10 Proposed method 14.19 0.83 5 20.22 1 0 Pop 14.19 The bit error rate (BER) is the number of bit errors per unit time. The bit error ratio is the number of bit errors divided by the total number of transferred bits during a studied time interval.ber is a unit less performance measure, often expressed as a percentage. The bit error ratio can be considered as an approximate estimate is accurate for a long time interval and high number of bit errors. Table II. BER and NC values of different audio various attacks. signals against Chart I.SNR values for different audio signals 25 20 15 Audio 1 10 Audio 2 5 Audio 3 0 SNR V.CONCLUSION In this proposed method, watermark bits are embedded into an audio signal by modifying their DWT coefficients. The proposed scheme does not require any additional information to discover the watermark from test image. High robustness is ensured by the proposed scheme together with the usage of selected higher energy region and DWT based watermark embedding. The proposed method offers strong robustness against several kinds of attacks such as Noise addition, Resampling and etc., REFERENCES [1] L. Liang and S. Qi, A new SVD-DWT composite watermarking, in Proc. of IEEE Int. Conf. on Signal Processing, eds. X Z Wei (Beijing, China, 2006), pp. 365-372. 41

[2] S. Wu S., J. Huang J., D. Huang and Y. Q, Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission, IEEE Trans Broadcast, Vol.51, No.1, pp. 69-76, 2005. [3] V. K. Bhat, I. Sengupta, and A. Das, An Adaptive Audio Watermarking Based on the Singular Value Decomposition in the Wavelet Domain, Digital Signal Processing, vol. 20, no. 6, pp. 1547-1558, 2010. [4] J. Huang, Y. Wang, and Y. Q. Shi, A blind audio watermarking algorithm with self-synchronization, in Proc. IEEE Int. Symp. Circuits and Systems, vol. 3, 2002, pp. 627 630. [5] Q. Wen, T.-F. Sun, and S.-X. Wang, Concept and application of zerowatermark, Tien Tzu Hsueh Pao/Acta Electronica Sinica, vol. 31, no. 2, pp.214 216, 2003. [6] Dhar, P.K., Shimamura T, Entropy-based audio watermarking using singular value decomposition and log-polar transformation, Circuits and Systems (MWSCAS), 2013 IEEE 56 th. [7] Yang Yu, Lei Min, Cheng Mingzhi, Liu Bohuai, Lin Guoyuan, Xiao Da, An Audio Zero-Watermark Scheme Based on Energy Comparing, information security, china communications,2014. [8] Wang X, Peng H, Audio Watermarking Approach Based on Energy Relation in Wavelet Domain, Journal of Xihua University Natural Science, Vol.28, No.3,2009. [9] D. Kiroveski and S. Malvar, Robust Spread Spectrum Audio Watermarking, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 01), pp. 1345-1348, 2001. [10] X.-Y. Wang and H. Zhao, A novel synchronization invariant audio watermarking scheme based on DWT and DCT, IEEE Transactions on Signal Processing, vol. 54, no. 12, pp. 4835 4840, 2006. [11] R. Wang, D. Xu, J. Chen, and C. Du, Digital Audio Watermarking Algorithm Based on Linear Predictive Coding in Wavelet Domain, IEEE International Conference on Signal Processing (ICSP 04), vol.1,pp. 2393-2396, 2004. [12] S. Xiang and J. Huang, Histogram Based Audio Watermarking Against Time Scale Modification and Cropping Attacks, IEEE Trans.Multimedia, vol. 9, no. 7, pp. 1357-1372,2007. [13] S. Xiang, H. J. Kim, and J. Huang, Audio Watermarking Robust Against Time Scale Modification and MP3 Compression, Signal Processing, vol. 88, no. 10, pp. 2372-2387, 2008. [14] P. K. Dhar and T. Shimamura, Audio Watermarking in Transform Domain Based on Singular Value Decomposition and Quantization, Asia-Pacific Conference on Communication (APCC 12), pp. 516-521,2012. [15] Q. Wang, X. Zheng, G. Liu, Y. Zhao, N. Li, A DWT Domain Digital Audio Watermarking Algorithm Based On Energy Quantization, Network and Information Security, Vol.3, 2006. [16] W. Li and X. Y. Xue, An audio watermarking technique that is robust against random cropping, J. Comput. Music, vol. 27, no. 4, pp. 58 68,Dec. 2003. [17] R. Tachibana, S. Shimizu, T. Nakamura, and S. Kobayashi, An audio watermarking method robust against time and frequency fluctuation, in Proc. SPIE lnt. Conf. Security and Watermarking of Multimedia Contents III, vol. 4314, 2001, pp. 104 115. [18] L. Wei, Y. Yi-Qun, L. Xiao-Qiang, X. Xiang-Yang, and L. Pei- Zhong, Overview of digital audio watermarking, J. Commun., vol. 26, no. 2,pp. 100 111, 2005. [19] D. Kirovski and H. S. Malvar, Spread spectrum watermarking of audio signals, IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1020 1033,Apr. 2003. [20] J. Seok, J. Hong, and J. Kim, A novel audio watermarking algorithm for copyright protection of digital audio, ETRI J., vol. 24, no. 3, pp.181 189, 2002. K.Thamizhazhakan Received B.E degree in Electronics and Communication Engineering from Anna University chennai on 2014 and pursuing M.E in Applied Electronics at Kongu Engineering College, Anna University Chennai, India. He had attended two conferences. His area of interest includes Watermarking and Wavelets. S. Maheswari Received B.E degree in Electrical and Electronics Engineering from the University of Madras on 2001 and M.E degree in Applied Electronics in Anna University Chennai on 2005. She has received Ph.D in the faculty of information and communication engineering in Anna University, Chennai on November 2013. She has teaching experience of 11 years. She is presently working as an assistant professor in the department of electrical and electronics engineering at Kongu engineering college, Perundurai, Tamilnadu, India. She has presented 16 papers in international conferences and 5 papers in national conferences and she has published 11 papers in international journals. Her current research interests are in the areas of Wavelets, Watermarking and Image processing. 42