SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 3 Issue 11 ǁ November. 2015 ǁ PP.40-48
www.ijres.org 40 | Page
Evaluation of Two-Set Algorithm in Embedding a Watermark
into an Audio Signal
C. Aquino1
,E. Perez2
, C. Aguilar3
1
esime Culhuacan, National Polytechnic Institute.
2
esime Culhuacan, National Polytechnic Institute.
3
esime Culhuacan, National Polytechnic Institute.
Abstract: The protection of multimedia data has become a necessity due to the generation of illegal copies,
thus, the purpose of this article was to analyze and evaluate the algorithm of two-set in embedding a watermark
into an audio signal. Metrics were analyzed as the Perceptual Evaluation of Audio Quality (PEAQ) by
calculating the Objective Difference Grade (ODG) to verify the inaudibility of the watermark and the robustness
of it against attacks from resampling and Additive White Gaussian Noise (AWGN) by estimating the Bit Error
Rate (BER). The process was applied to hundred Waveform Audio Format (WAV) clips classifieds in five
musical genders and we obtained an ODG value average of -0.83045 that according to the International
Telecommunication Union (ITU), the watermark is slightly perceptible if you listen with extreme care.
I. Introduction
Digital media has become a daily task, since these are new services required by people today, due to the
exchange of audio, images, text and video. The problem lies when these files are copied anddistributed without
permission of the author. To solve this problem there is digital watermarking, a technique to embed data in the
signal to be protected (in this case audio) as an identifier. There are several algorithms to insert watermarks for
images and video, however, few algorithms are dedicated to audio files because of the complexity of the Human
Auditory System (HAS)[1], hence the purpose of this research is to insert a watermark into audio signals,
interpret and evaluate the Two-Set algorithm using modified patchwork and verify the inaudibility and
robustness of the watermark to be used as an identifier of the copyright.
The watermark protects files permanently embedded in the audio signal so that the audio quality is not
impaired while ensuring that the watermark is imperceptible. On the other hand, the watermark should be robust
against attacks or manipulations that are carried out, at one point being the most common is resampling the
addition of noise and more to the original signal. Hardly a watermark can be extracted without affecting the
original signal; this creates a very attractive tool for copy protection[2]. Figure 1 shows the basic scheme of
embedding and detecting a watermark.
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 41 | Page
Figure1. Watermark embedding and detecting scheme
The embedding process is performed by the Modified Patchwork technique3] equations derived from the
original Patchwork method to increase the robustness (but it should be emphasized that this derivation is not
enough to be resistant to many attacks, so it should be possible to combine different watermarking methods),
working in the frequency domain under the Discrete Cosine Transform (DCT) and the detection process by
Inverse Discrete Cosine Transform (IDCT) and it is possible with a secret key.
Section 2 shows the mathematical development of the algorithm, divided in the embedding process, metrics
evaluation and detection process. In Section 3, the method is implemented, it shows the initial parameters and
comparing the original signal and the watermarked and checking the results of the PEAQ between different
types of audio files tagged and thus verify the inaudibility of the watermark embedded in them, furthermore, it
shows the attacks that the watermark survives and its corresponding BER. The conclusions are in Section 4 and
finally in Section 5 of the references consulted.
II. Development
The evaluation of the method was built of three parts: the first is the embedding of the watermark in the
audio signal; the second part is inaudibility tests and robustness to audio clips marked, finally it detects the
embedded watermark after attacks.
The authors of [3] proposed watermark embedding method is known as Two-Set, based on modified
patchwork algorithm. It works in the frequency domain and is based on the calculation of the DCT.
2.1. Watermark embedding
The watermark insertion steps[4] are summarized below:
The secret key and the digital watermark are associated to the seed of a random number generatorDivides the
audio file into blocks of size Nand DCT is applied to each block.
We define two subsets of the set processing, one called A and another B
(1)
(2)
Sample means and the statistical standard error are calculated according to the following equations:
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 42 | Page
(3)
(4)
(5)
The embeddingfunctions presented below introduce the watermark:
(6)
(7)
Where C is a constant and sign is the sign function what makes large values larger and small values smaller.
Finally, replace the selected itemsandrespectively apply the IDCT in theFrequency domain
2.2. Metrics evaluation
The evaluation metrics are to test the inaudibility of the watermark embedded in the audio clips and check
the robustness of it against attacks from resampling and AWGN.
Inaudibility test should evaluate the quality of the audio clips watermarked with the standard ITU BS.1387-
1[7] established by ITU for PEAQ provides accurate estimates of audio quality degradation occurring in the
watermarked signal compared with the original. This is based on the properties of the human auditory system,
modeling the psychoacoustic effects and is verified by calculating the Objective Difference Grade (ODG). The
ODG ranges from 0 to -4 and is defined as Table 1
Table 1. Odg values range
Impairment Description ODG
Imperceptible 0.0
Perceptible, but not annoying -1.0
Slightly annoying -2.0
Annoying -3.0
Very annoying -4.0
For robustness tests we resampled the signals watermarked by different sampling rates. This process was
done by changing the sampling frequency of thesignal watermarked and checking that the embedded bits were
the same in the detection process, it was calculated how many erroneous bits exist in the watermarked audio
clip, it is the number of bit errors divided by the total number of transferred bits during a studied time interval
and its correspondent BER [6] as a unit less performance measure, often expressed as a percentage.
Also, it was added an AWGN to the watermarked clips. The AWGN term refers to the fact that eventually
the noise is combined with the desired signal. As the noise gets added (and not multiplied) to the received
signal, the spectrum noise if flat for all frequencies and the values of the noise follows the Gaussian
probability distribution function:
(8)
Where;
(9)
(10)
It was verified that the watermark survives the AWGN; this was done by calculating the BER in order to
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 43 | Page
obtain the number of erroneous bits that exist in different intensities of Signal to Noise Ratio (SNR) of the
AWGN. Figure 2 shows the general outline of the AWGN, note that it is additive and not multiplicative
Figure 2. Awgn scheme
2.3. Watermark detection
The following algorithm[4] was used to verify whether the embedded watermark was the same in the
discovery process after the attacks. The decoding steps were as follows:
The secret key and the digital watermark are associated to the seed of a random number generator.
Obtain subsets y for bit insertion 0 and thesubsets
y for bit insertion 1.
Averages are calculated for each sample subsets and standard errors for 0 y 1.
We calculate test statistics S (see equation 7) andT2
(11)
T2
is defined as the highest values of the statisticsobtained.
The seed detected will be that for the parameter T2
is maximum.
Finally we generate the watermark associated with the seed, getting the embedded bits.
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 44 | Page
The process was to watermark audio clips;subject to attacks and to detect the survival of the watermark. Below
are the results of the evaluation algorithm.
III. Results
The algorithm was applied to a hundred audio clips of music (of which only twenty are reported) divided in
five categories, these files were WAV, the watermark embedded was W=[1 0 0 0 0 1 1 0]. First we compared
the original signals with the watermarked to verify that no significant alteration in the watermarked clips. Figure
3 shows the spectrum of an audio signal(watermarked and un-watermarked) and we notice a slight difference
between the two graphs.
Figure 3. Spectrum of an audio clip, original and watermarked
The red color in the first graph shows the original signal and the second graph the red
representswatermarked signal, note a difference between the two tones.
Figure 4 plots the difference between the originalsignal and the watermarked signal.
Figure 4. Difference watermarked and un-watermarked signals
Note that the difference between the two signals is the order of 10-5
.
To demonstrate the inaudibility of the embedded watermark, we performed the calculation of ODG for each
audio clip, which are shown in Table 2.
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 45 | Page
Table 2. Odg of the audio clips
Category Track name ODG
Dopamina (by Belinda) -0.753
Contigo (by Yuridia) -0.895
Pop
Nada puede cambiarme
(by Paulina Rubio) -0.101
MentirasPiadosas
(by Alejandra Guzmán) -0.832
Las pequeñas
-2.761
cosas (by Jot Dog)
Lentamente (Fey) -1.676
Electronic Nada de más (by Belanova) -2.183
Provócame (by Fey) -1.752
Y tú (by Julión Álvarez) -0.166
Mujeresdivinas (by Vicente
Banda Fernández) -0.108
No me quedamás(by Selena) -0.126
Ya no (by Limon) -0.178
Note that the difference between the two signals is the order of 10
-5
.
To demonstrate the inaudibility of the embedded watermark, we performed the calculation of ODG for each
audio clip, which are shown in Table 2.
Table 2. Odg of the audio clips
Chiquitita (by Abba) -0.419
Cantacorazón (by
Alejandro Fernández) -0.610
Ballad
Sortilegio (by Il divo) -0.291
Hasta mi final (by
-0.523
Il divo)
I feel good (by
-1.361
James Brown)
Absolutamente
-0.594
(by Fangoria)
Rock
Lejosestamos
-0.431
mejor (by Motel)
Frágil (by Allison) -0.849
The ODG average value obtained was -0.83045 for twenty clips above, this result indicates that the
watermark is slightly perceptible only if you listen carefully but it is not annoying to the human ear.
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 46 | Page
Comparing the hundred ODG values with Table 1 we obtain Table 3 shows the percentage obtained for
each impairment established by the ITU.
Table 3. Obtained percent of the odg
We could see that most of the embedded watermarks are to be imperceptible. Figure 5 shows the average
ODG for each musical category
Average Objective DifferenceGrade
Figure 5. Average odg for each category
Table 4. Ber for each resampling rate
Category Sampling Erroneous Bit
Frequency Bits / Total Error
(kHz) Embedded Rate
Bits (%BER)
22.05 1/8 12.5
88.2 0/8 0
Pop 176.4 0/8 0
192 2/8 25
22.05 2/8 25
Electronic 88.2 1/8 12.5
176.4 2/8 25
192 3/8 37.5
22.05 0/8 0
88.2 0/8 0
Banda 176.4 0/8 0
192 1/8 12.5
22.05 1/8 12.5
88.2 0/8 0
Ballad 176.4 1/8 12.5
192 2/8 25
22.05 1/8 12.5
88.2 0/8 0
Rock 176.4 0/8 0
192 2/8 25
Impairment Obtained
Description Percent (%)
Imperceptible 52.5
Perceptible, but not
23
annoying
Slightly annoying 19.5
Annoying 5
Very annoying 0
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 47 | Page
The watermark is more perceptible in the electronic music (Figure 5).
To check the robustness of the watermark[5], we subjected the processed signal to an attack by changing
the resampling rate as shown in Table 4 and AWGN attack with different intensities of Signal to Noise Ratio
(SNR) showing the results Table 5.
Table 4 shows that most of the clips watermarkedsuffer a distortion in the embedded watermark when
resampled to 192kHz and we said that the larger the resampling rate, the greater the distortion of the watermark
embed it on audio clips.
The watermark, subject to resampling, was more robust in banda music, pop and rock, and less robust in
electronic music and ballads.
In the following table we can see the number of bit errors and their respective BER for different intensities
of SNR applied to AWGN was attached to each signal and in which we also see that while the intensity
increases the distortion is most noticeable in the watermark as it also increases the power of AWGN. It is noted
that for an AWGN signal strength of 1dB and 5dB the watermark is not distorted, instead to an intensity of
10dB and 15dB are a number of erroneous bits.
Being more resistant to resampling the musical categories of pop and band (see Table 5).
Table 5. Beer for each intensities for awgn
Category SNR
Erroneo
us Bit
Intensitie
s
Bits /
Total Error
for
AWGN
Embedde
d Rate
(dB) Bits (%
BER)
1 0/8 0
5 0/8 0
Pop 10 0/8 0
15 1/8 12.5
1 0/8 0
5 0/8 0
Electronic
10 1/8 12.5
15 2/8 25
1 0/8 0
5 0/8 0
Banda 10 0/8 0
15 1/8 12.5
1 0/8 0
5 0/8 0
Ballad 10 0/8 0
15 2/8 25
1 0/8 0
5 0/8 0
Rock 10 1/8 12.5
15 2/8 25
Compare the original signal with the watermarked signal, and it was subjected to attacks by resampling and
AWGN attacks. The following are conclusions.
IV. Conclusions
A comparison of the signal before being processed and the signal after being processed to verify the visual
difference between them.
We tested the ITU BS.1387-1 standard established inaudibility standards applied in this case, to the
watermark, checking that it is slightly perceptible, if and only if, listening with dedicated attention.
The sampling frequency of the signals before processing was 44.1kHz but to test the robustness of the
method was decreased, and increased the frequency in order to verify what is mentioned in [5] and check if it
was more robust with other rates sampling.
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 48 | Page
Also verify the behavior of the watermark against the addition of AWGN with different SNR intensities.
It is recommended that the watermark is inserted into the top of each block, because if not done in this
way, the watermark will be easy to detect and extract.
Below are the references consulted, among the items displayed, a book and a standard ITU.
References
[1] M. Hrncar, J. Krajcovic, “Principles of Audio Watermarking”, BytcickaZilina, Slovak Republic, 2005, pp. 1-3.
[2] Nedeljko, C., T. Seppanen, Digital Audio WatermarkingTechniquesand Technologies: Applications andBenchmarks, Information
Science Reference, Hershey NewYork, 2007.
[3] I.K. Yeo, H.J. Kim, “Modified Patchwork Algorithm: A Novel Audio Watermarking Scheme”, IEEE, Transactions on Speech
and Audio Proceesing, Korea, July 2003, pp. 1-6.
[4] D.G. Hong, S.H. Park, and J. Shin, “A Public Key Audio Watermarking using Patchwork Algorithm”, Department of Electronic
Engineering, Dongguk University, Seoul Korea, 2004, pp. 3-4.
[5] H.J. Kim, S. Xiang, and S. Maitra, “Robustness Analysis of Patchwork Watermarking Schemes”, IEEE, Transactions on Speech
and Audio Proceesing, Seoul Korea, 2001, pp. 1-2.
[6] J.E. Gilley, “Bit Error Rate Simulation using Matlab”,Transcrypt International, Inc., August 2003, pp. 1-7.
[7] Recommendation ITU-R BS.1387-1 Method for objective measurements of perceived audio quality, 2001.
AUTHOR PROFILE:
Carlos Aquino Ruiz was born in Mexico on April 2, 1973 is in Communications and Electronics
Engineering from the National Polytechnic Institute IPN, a research professor and areas of
development are applied computing, data networking and security.
Eduardo Pérez Orta. He is a methodological research and has master's. Nowadays it is a research
professor at the School of Mechanical and Electrical Engineering (ESIME) in Mexico. Her areas
of development are assessment and project development, scientific writing and methodology of
science
Celedonio Enrique Aguilar Meza Was Born In Mexico On March 3, 1959 And Holds A Degree In
Communications And Electronics From The National Polytechnic Institute Ipn, Is Currently
Research Professor And Development Areas Are The Processing And Handling, Coding And
Compression, Safety And Efficient Transmission.

More Related Content

What's hot

AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...wadzani umaru
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...INFOGAIN PUBLICATION
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 
Filtration and synthesis of different types of human voice signals
Filtration and synthesis of different types of human voice signalsFiltration and synthesis of different types of human voice signals
Filtration and synthesis of different types of human voice signalsAlexander Decker
 
A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
 
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKSDIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKSbehzad66
 
Scientech trainer kit catalog
Scientech trainer kit catalogScientech trainer kit catalog
Scientech trainer kit catalogABHAYTAVPSC
 
Wireless digital communication and coding techniques new
Wireless digital communication and coding techniques newWireless digital communication and coding techniques new
Wireless digital communication and coding techniques newClyde Lettsome
 
Mp3 player working by digital signal processing
Mp3 player working by digital signal processingMp3 player working by digital signal processing
Mp3 player working by digital signal processingDipanjon Halder
 
Introduction to dsp by bibhu prasad ganthia
Introduction to dsp by bibhu prasad ganthiaIntroduction to dsp by bibhu prasad ganthia
Introduction to dsp by bibhu prasad ganthiaDr. Bibhu Prasad Ganthia
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET Journal
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video ForensicsDipika Sengupta
 
Introduction to digital signal processing 2
Introduction to digital signal processing 2Introduction to digital signal processing 2
Introduction to digital signal processing 2Hossam Hassan
 
Audio Essentials for Broadcast and Multiscreen
Audio Essentials for Broadcast and MultiscreenAudio Essentials for Broadcast and Multiscreen
Audio Essentials for Broadcast and MultiscreenEllis Reid
 
Introduction to DSP
Introduction to DSPIntroduction to DSP
Introduction to DSPshinychristo
 

What's hot (20)

AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
Speech technology basics
Speech technology   basicsSpeech technology   basics
Speech technology basics
 
Speech encoding techniques
Speech encoding techniquesSpeech encoding techniques
Speech encoding techniques
 
Filtration and synthesis of different types of human voice signals
Filtration and synthesis of different types of human voice signalsFiltration and synthesis of different types of human voice signals
Filtration and synthesis of different types of human voice signals
 
A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection
 
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKSDIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
 
Scientech trainer kit catalog
Scientech trainer kit catalogScientech trainer kit catalog
Scientech trainer kit catalog
 
Wireless digital communication and coding techniques new
Wireless digital communication and coding techniques newWireless digital communication and coding techniques new
Wireless digital communication and coding techniques new
 
Mp3 player working by digital signal processing
Mp3 player working by digital signal processingMp3 player working by digital signal processing
Mp3 player working by digital signal processing
 
Introduction to dsp by bibhu prasad ganthia
Introduction to dsp by bibhu prasad ganthiaIntroduction to dsp by bibhu prasad ganthia
Introduction to dsp by bibhu prasad ganthia
 
SPEECH CODING
SPEECH CODINGSPEECH CODING
SPEECH CODING
 
Introduction to dsp
Introduction to dspIntroduction to dsp
Introduction to dsp
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video Forensics
 
Introduction to digital signal processing 2
Introduction to digital signal processing 2Introduction to digital signal processing 2
Introduction to digital signal processing 2
 
Audio Essentials for Broadcast and Multiscreen
Audio Essentials for Broadcast and MultiscreenAudio Essentials for Broadcast and Multiscreen
Audio Essentials for Broadcast and Multiscreen
 
Lecture 18 (5)
Lecture 18 (5)Lecture 18 (5)
Lecture 18 (5)
 
Introduction to DSP
Introduction to DSPIntroduction to DSP
Introduction to DSP
 

Similar to Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal

DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking MethodsIRJET Journal
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applicationsIAEME Publication
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approachijsrd.com
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
 
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUESECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUESIRJET Journal
 
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...theijes
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domainpaperpublications3
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarkingSaurabh Kaushik
 
Effect of Speech enhancement using spectral subtraction on various noisy envi...
Effect of Speech enhancement using spectral subtraction on various noisy envi...Effect of Speech enhancement using spectral subtraction on various noisy envi...
Effect of Speech enhancement using spectral subtraction on various noisy envi...IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal (20)

DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking Methods
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
50120140506015
5012014050601550120140506015
50120140506015
 
J33047049
J33047049J33047049
J33047049
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
 
F5242832
F5242832F5242832
F5242832
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUESECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
 
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
40120130406010 2-3-4-5-6
40120130406010 2-3-4-5-640120130406010 2-3-4-5-6
40120130406010 2-3-4-5-6
 
Jk3516211625
Jk3516211625Jk3516211625
Jk3516211625
 
Effect of Speech enhancement using spectral subtraction on various noisy envi...
Effect of Speech enhancement using spectral subtraction on various noisy envi...Effect of Speech enhancement using spectral subtraction on various noisy envi...
Effect of Speech enhancement using spectral subtraction on various noisy envi...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

More from IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresIJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
 

More from IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 3 Issue 11 ǁ November. 2015 ǁ PP.40-48 www.ijres.org 40 | Page Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal C. Aquino1 ,E. Perez2 , C. Aguilar3 1 esime Culhuacan, National Polytechnic Institute. 2 esime Culhuacan, National Polytechnic Institute. 3 esime Culhuacan, National Polytechnic Institute. Abstract: The protection of multimedia data has become a necessity due to the generation of illegal copies, thus, the purpose of this article was to analyze and evaluate the algorithm of two-set in embedding a watermark into an audio signal. Metrics were analyzed as the Perceptual Evaluation of Audio Quality (PEAQ) by calculating the Objective Difference Grade (ODG) to verify the inaudibility of the watermark and the robustness of it against attacks from resampling and Additive White Gaussian Noise (AWGN) by estimating the Bit Error Rate (BER). The process was applied to hundred Waveform Audio Format (WAV) clips classifieds in five musical genders and we obtained an ODG value average of -0.83045 that according to the International Telecommunication Union (ITU), the watermark is slightly perceptible if you listen with extreme care. I. Introduction Digital media has become a daily task, since these are new services required by people today, due to the exchange of audio, images, text and video. The problem lies when these files are copied anddistributed without permission of the author. To solve this problem there is digital watermarking, a technique to embed data in the signal to be protected (in this case audio) as an identifier. There are several algorithms to insert watermarks for images and video, however, few algorithms are dedicated to audio files because of the complexity of the Human Auditory System (HAS)[1], hence the purpose of this research is to insert a watermark into audio signals, interpret and evaluate the Two-Set algorithm using modified patchwork and verify the inaudibility and robustness of the watermark to be used as an identifier of the copyright. The watermark protects files permanently embedded in the audio signal so that the audio quality is not impaired while ensuring that the watermark is imperceptible. On the other hand, the watermark should be robust against attacks or manipulations that are carried out, at one point being the most common is resampling the addition of noise and more to the original signal. Hardly a watermark can be extracted without affecting the original signal; this creates a very attractive tool for copy protection[2]. Figure 1 shows the basic scheme of embedding and detecting a watermark.
  • 2. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 41 | Page Figure1. Watermark embedding and detecting scheme The embedding process is performed by the Modified Patchwork technique3] equations derived from the original Patchwork method to increase the robustness (but it should be emphasized that this derivation is not enough to be resistant to many attacks, so it should be possible to combine different watermarking methods), working in the frequency domain under the Discrete Cosine Transform (DCT) and the detection process by Inverse Discrete Cosine Transform (IDCT) and it is possible with a secret key. Section 2 shows the mathematical development of the algorithm, divided in the embedding process, metrics evaluation and detection process. In Section 3, the method is implemented, it shows the initial parameters and comparing the original signal and the watermarked and checking the results of the PEAQ between different types of audio files tagged and thus verify the inaudibility of the watermark embedded in them, furthermore, it shows the attacks that the watermark survives and its corresponding BER. The conclusions are in Section 4 and finally in Section 5 of the references consulted. II. Development The evaluation of the method was built of three parts: the first is the embedding of the watermark in the audio signal; the second part is inaudibility tests and robustness to audio clips marked, finally it detects the embedded watermark after attacks. The authors of [3] proposed watermark embedding method is known as Two-Set, based on modified patchwork algorithm. It works in the frequency domain and is based on the calculation of the DCT. 2.1. Watermark embedding The watermark insertion steps[4] are summarized below: The secret key and the digital watermark are associated to the seed of a random number generatorDivides the audio file into blocks of size Nand DCT is applied to each block. We define two subsets of the set processing, one called A and another B (1) (2) Sample means and the statistical standard error are calculated according to the following equations:
  • 3. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 42 | Page (3) (4) (5) The embeddingfunctions presented below introduce the watermark: (6) (7) Where C is a constant and sign is the sign function what makes large values larger and small values smaller. Finally, replace the selected itemsandrespectively apply the IDCT in theFrequency domain 2.2. Metrics evaluation The evaluation metrics are to test the inaudibility of the watermark embedded in the audio clips and check the robustness of it against attacks from resampling and AWGN. Inaudibility test should evaluate the quality of the audio clips watermarked with the standard ITU BS.1387- 1[7] established by ITU for PEAQ provides accurate estimates of audio quality degradation occurring in the watermarked signal compared with the original. This is based on the properties of the human auditory system, modeling the psychoacoustic effects and is verified by calculating the Objective Difference Grade (ODG). The ODG ranges from 0 to -4 and is defined as Table 1 Table 1. Odg values range Impairment Description ODG Imperceptible 0.0 Perceptible, but not annoying -1.0 Slightly annoying -2.0 Annoying -3.0 Very annoying -4.0 For robustness tests we resampled the signals watermarked by different sampling rates. This process was done by changing the sampling frequency of thesignal watermarked and checking that the embedded bits were the same in the detection process, it was calculated how many erroneous bits exist in the watermarked audio clip, it is the number of bit errors divided by the total number of transferred bits during a studied time interval and its correspondent BER [6] as a unit less performance measure, often expressed as a percentage. Also, it was added an AWGN to the watermarked clips. The AWGN term refers to the fact that eventually the noise is combined with the desired signal. As the noise gets added (and not multiplied) to the received signal, the spectrum noise if flat for all frequencies and the values of the noise follows the Gaussian probability distribution function: (8) Where; (9) (10) It was verified that the watermark survives the AWGN; this was done by calculating the BER in order to
  • 4. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 43 | Page obtain the number of erroneous bits that exist in different intensities of Signal to Noise Ratio (SNR) of the AWGN. Figure 2 shows the general outline of the AWGN, note that it is additive and not multiplicative Figure 2. Awgn scheme 2.3. Watermark detection The following algorithm[4] was used to verify whether the embedded watermark was the same in the discovery process after the attacks. The decoding steps were as follows: The secret key and the digital watermark are associated to the seed of a random number generator. Obtain subsets y for bit insertion 0 and thesubsets y for bit insertion 1. Averages are calculated for each sample subsets and standard errors for 0 y 1. We calculate test statistics S (see equation 7) andT2 (11) T2 is defined as the highest values of the statisticsobtained. The seed detected will be that for the parameter T2 is maximum. Finally we generate the watermark associated with the seed, getting the embedded bits.
  • 5. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 44 | Page The process was to watermark audio clips;subject to attacks and to detect the survival of the watermark. Below are the results of the evaluation algorithm. III. Results The algorithm was applied to a hundred audio clips of music (of which only twenty are reported) divided in five categories, these files were WAV, the watermark embedded was W=[1 0 0 0 0 1 1 0]. First we compared the original signals with the watermarked to verify that no significant alteration in the watermarked clips. Figure 3 shows the spectrum of an audio signal(watermarked and un-watermarked) and we notice a slight difference between the two graphs. Figure 3. Spectrum of an audio clip, original and watermarked The red color in the first graph shows the original signal and the second graph the red representswatermarked signal, note a difference between the two tones. Figure 4 plots the difference between the originalsignal and the watermarked signal. Figure 4. Difference watermarked and un-watermarked signals Note that the difference between the two signals is the order of 10-5 . To demonstrate the inaudibility of the embedded watermark, we performed the calculation of ODG for each audio clip, which are shown in Table 2.
  • 6. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 45 | Page Table 2. Odg of the audio clips Category Track name ODG Dopamina (by Belinda) -0.753 Contigo (by Yuridia) -0.895 Pop Nada puede cambiarme (by Paulina Rubio) -0.101 MentirasPiadosas (by Alejandra Guzmán) -0.832 Las pequeñas -2.761 cosas (by Jot Dog) Lentamente (Fey) -1.676 Electronic Nada de más (by Belanova) -2.183 Provócame (by Fey) -1.752 Y tú (by Julión Álvarez) -0.166 Mujeresdivinas (by Vicente Banda Fernández) -0.108 No me quedamás(by Selena) -0.126 Ya no (by Limon) -0.178 Note that the difference between the two signals is the order of 10 -5 . To demonstrate the inaudibility of the embedded watermark, we performed the calculation of ODG for each audio clip, which are shown in Table 2. Table 2. Odg of the audio clips Chiquitita (by Abba) -0.419 Cantacorazón (by Alejandro Fernández) -0.610 Ballad Sortilegio (by Il divo) -0.291 Hasta mi final (by -0.523 Il divo) I feel good (by -1.361 James Brown) Absolutamente -0.594 (by Fangoria) Rock Lejosestamos -0.431 mejor (by Motel) Frágil (by Allison) -0.849 The ODG average value obtained was -0.83045 for twenty clips above, this result indicates that the watermark is slightly perceptible only if you listen carefully but it is not annoying to the human ear.
  • 7. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 46 | Page Comparing the hundred ODG values with Table 1 we obtain Table 3 shows the percentage obtained for each impairment established by the ITU. Table 3. Obtained percent of the odg We could see that most of the embedded watermarks are to be imperceptible. Figure 5 shows the average ODG for each musical category Average Objective DifferenceGrade Figure 5. Average odg for each category Table 4. Ber for each resampling rate Category Sampling Erroneous Bit Frequency Bits / Total Error (kHz) Embedded Rate Bits (%BER) 22.05 1/8 12.5 88.2 0/8 0 Pop 176.4 0/8 0 192 2/8 25 22.05 2/8 25 Electronic 88.2 1/8 12.5 176.4 2/8 25 192 3/8 37.5 22.05 0/8 0 88.2 0/8 0 Banda 176.4 0/8 0 192 1/8 12.5 22.05 1/8 12.5 88.2 0/8 0 Ballad 176.4 1/8 12.5 192 2/8 25 22.05 1/8 12.5 88.2 0/8 0 Rock 176.4 0/8 0 192 2/8 25 Impairment Obtained Description Percent (%) Imperceptible 52.5 Perceptible, but not 23 annoying Slightly annoying 19.5 Annoying 5 Very annoying 0
  • 8. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 47 | Page The watermark is more perceptible in the electronic music (Figure 5). To check the robustness of the watermark[5], we subjected the processed signal to an attack by changing the resampling rate as shown in Table 4 and AWGN attack with different intensities of Signal to Noise Ratio (SNR) showing the results Table 5. Table 4 shows that most of the clips watermarkedsuffer a distortion in the embedded watermark when resampled to 192kHz and we said that the larger the resampling rate, the greater the distortion of the watermark embed it on audio clips. The watermark, subject to resampling, was more robust in banda music, pop and rock, and less robust in electronic music and ballads. In the following table we can see the number of bit errors and their respective BER for different intensities of SNR applied to AWGN was attached to each signal and in which we also see that while the intensity increases the distortion is most noticeable in the watermark as it also increases the power of AWGN. It is noted that for an AWGN signal strength of 1dB and 5dB the watermark is not distorted, instead to an intensity of 10dB and 15dB are a number of erroneous bits. Being more resistant to resampling the musical categories of pop and band (see Table 5). Table 5. Beer for each intensities for awgn Category SNR Erroneo us Bit Intensitie s Bits / Total Error for AWGN Embedde d Rate (dB) Bits (% BER) 1 0/8 0 5 0/8 0 Pop 10 0/8 0 15 1/8 12.5 1 0/8 0 5 0/8 0 Electronic 10 1/8 12.5 15 2/8 25 1 0/8 0 5 0/8 0 Banda 10 0/8 0 15 1/8 12.5 1 0/8 0 5 0/8 0 Ballad 10 0/8 0 15 2/8 25 1 0/8 0 5 0/8 0 Rock 10 1/8 12.5 15 2/8 25 Compare the original signal with the watermarked signal, and it was subjected to attacks by resampling and AWGN attacks. The following are conclusions. IV. Conclusions A comparison of the signal before being processed and the signal after being processed to verify the visual difference between them. We tested the ITU BS.1387-1 standard established inaudibility standards applied in this case, to the watermark, checking that it is slightly perceptible, if and only if, listening with dedicated attention. The sampling frequency of the signals before processing was 44.1kHz but to test the robustness of the method was decreased, and increased the frequency in order to verify what is mentioned in [5] and check if it was more robust with other rates sampling.
  • 9. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 48 | Page Also verify the behavior of the watermark against the addition of AWGN with different SNR intensities. It is recommended that the watermark is inserted into the top of each block, because if not done in this way, the watermark will be easy to detect and extract. Below are the references consulted, among the items displayed, a book and a standard ITU. References [1] M. Hrncar, J. Krajcovic, “Principles of Audio Watermarking”, BytcickaZilina, Slovak Republic, 2005, pp. 1-3. [2] Nedeljko, C., T. Seppanen, Digital Audio WatermarkingTechniquesand Technologies: Applications andBenchmarks, Information Science Reference, Hershey NewYork, 2007. [3] I.K. Yeo, H.J. Kim, “Modified Patchwork Algorithm: A Novel Audio Watermarking Scheme”, IEEE, Transactions on Speech and Audio Proceesing, Korea, July 2003, pp. 1-6. [4] D.G. Hong, S.H. Park, and J. Shin, “A Public Key Audio Watermarking using Patchwork Algorithm”, Department of Electronic Engineering, Dongguk University, Seoul Korea, 2004, pp. 3-4. [5] H.J. Kim, S. Xiang, and S. Maitra, “Robustness Analysis of Patchwork Watermarking Schemes”, IEEE, Transactions on Speech and Audio Proceesing, Seoul Korea, 2001, pp. 1-2. [6] J.E. Gilley, “Bit Error Rate Simulation using Matlab”,Transcrypt International, Inc., August 2003, pp. 1-7. [7] Recommendation ITU-R BS.1387-1 Method for objective measurements of perceived audio quality, 2001. AUTHOR PROFILE: Carlos Aquino Ruiz was born in Mexico on April 2, 1973 is in Communications and Electronics Engineering from the National Polytechnic Institute IPN, a research professor and areas of development are applied computing, data networking and security. Eduardo Pérez Orta. He is a methodological research and has master's. Nowadays it is a research professor at the School of Mechanical and Electrical Engineering (ESIME) in Mexico. Her areas of development are assessment and project development, scientific writing and methodology of science Celedonio Enrique Aguilar Meza Was Born In Mexico On March 3, 1959 And Holds A Degree In Communications And Electronics From The National Polytechnic Institute Ipn, Is Currently Research Professor And Development Areas Are The Processing And Handling, Coding And Compression, Safety And Efficient Transmission.