SlideShare a Scribd company logo
1 of 9
Download to read offline
http://www.iaeme.com/IJECET/index.asp 9 editor@iaeme.com
International Journal of Electronics and Communication Engineering & Technology
(IJECET)
Volume 6, Issue 6, Jun 2015, pp. 09-17, Article ID: IJECET_06_06_002
Available online at
http://www.iaeme.com/IJECETissues.asp?JTypeIJECET&VType=6&IType=6
ISSN Print: 0976-6464 and ISSN Online: 0976-6472
© IAEME Publication
___________________________________________________________________________
AUDIO FORENSIC USING DWT-LSB
R. Karteek and Dr. A. S. Srinivasarao
Department of Electronics and Communication Engineering, AITAM,
Tekkali (AP), India
ABSTRACT
Many effective watermarking algorithms have been proposed and
implemented for digital images and digital video, however, few algorithms
have been proposed for audio watermarking. This is due to the fact that, the
human audio system is far more complex and sensitive than the human visual
system. In this paper, an audio watermarking algorithm based on DWT-LSB is
proposed. The DWT transformation decomposes the audio signal into several
sub bands, enabling developers to locate the most appropriate sub-bad to
embed. The watermark bits are embedded into the high-resolution sub-band
by using LSB algorithm, so the satisfactory robustness and the imperceptibility
performances are obtained
Key words: DWT, LSB, Forensic Mark, Imperceptibility and Robustness
Cite this Article: Karteek, R. and Dr. Srinivasarao, A. S. Audio Forensic
using DWT-LSB. International Journal of Electronics and Communication
Engineering & Technology, 6(6), 2015, pp. 09-17.
http://www.iaeme.com/IJECET/issues.asp?JTypeIJECET&VType=6&IType=6
_____________________________________________________________________
1. INTRODUCTION
By virtue of the new advancements in computer and telecommunication networks,
multimedia files are produced, stored and distributed easily across the globe.
However, the ownership and copyright of multimedia files are not usually protected.
Digital watermarking has been proposed in recent years as a means of protecting
multimedia contents from intellectual piracy. This is achieved by modifying the
original content, by inserting a signature which can be extracted, when necessary, as a
proof of ownership.
Generally the watermark can be obtained by two techniques: watermarking and
finger printing. Watermarking is the process of embedding marks in digital documents
(sounds, images, binaries, etc.) exactly like the watermarks on currency notes.
Fingerprinting is the process of embedding a serial number into every copy of an
object. This serial number can be used to detect the break of a license agreement. In
both cases, the embedded information is supposed to be invisible and very difficult to
R. Karteek and Dr. A. S. Srinivasarao
http://www.iaeme.com/IJECET/index.asp 10 editor@iaeme.com
remove it. The difference between the two processes is that in the former process the
all copies of object are all marked the same way, but in the latter process every copy
of object has a different embedded serial number [1].
Few algorithms are proposed for hiding data in audio files such as MP3Stego,
which effectively hides arbitrary information. The windows wave format lets users
hide data using stego-hide [2].
Data hidden can be classified according to the domain where the watermarking or
steganography has been applied. The following sections discuss these domains [3, 4]:
1.1. Time domain audio steganography
In time domain technology, watermark is directly embedded into the audio signal,
where there are no transformations applied. Watermark signal is shaped before it is
going to embed to ensure the robustness [5].
Hiding the watermark into time domain engages several challenges related to
robustness and inaudibility. Shaping the watermark before embedding, enables the
system to maintain the original audio signal quality and renders the watermark
inaudible [2].
1.2. Frequency domain audio steganography
In this technique, first the input signal is transformed to frequency domain and then
the watermark is added to the input signal. Later the inverse transform is applied to
the signal in order to get the watermarked signal [1113].
The most common transforms used are DWT (discrete wavelet transform), DFT
(discrete Fourier transform), DCT (discrete cosine transform). Examples of
techniques for this domain are LSB, SVD, Phase coding, Spread spectrum, Echo data
hiding [2, 6, 7].
2. REQUIREMENTS
A steganography system, in general, is expected to meet three key requirements,
namely, imperceptibility of embedding, accurate recovery of embedded information,
and large payload. An effective steganography scheme should possess the following
desired characteristics:
Secrecy: A person should not be able to extract the covert data from the host medium
without the knowledge of the proper secret key used in the extracting procedure.
Imperceptibility: The digital watermark should not affect the quality of original
audio signal after it is watermarked. The imperceptibility of an audio signal is
obtained by calculating the SNR of the audio signal. The SNR is obtained by taking
the difference in between the host audio signal and the forensic marked audio signal.
Robustness: A digital watermark is called robust if it resists a designated class of
transformations. Robust watermarks may be used in copy protection applications to
carry copy and no access control information [8].
High capacity: The maximum length of the covert message that can be embedded
should be as long as possible.
Resistance: The covert data should be able to survive when the host medium has been
manipulated, for example by some lossy compression scheme.
Accurate extraction: The extraction of the covert data from the medium should be
accurate and reliable.
Audio Forensic using DWT-LSB
http://www.iaeme.com/IJECET/index.asp 11 editor@iaeme.com
3. THE DISCRETE WAVELET TRANSFORM
Wavelets are special functions which, in a form analogous to sines and cosines in
Fourier analysis, are used as basal functions for representing signals. They provide
powerful multi-resolution tool for the analysis of non-stationary signals with good
time localization information. The coefficients of the discrete wavelet transform can
be calculated recursively and in a straight forward manner using the well-known
Mallat’s pyramid algorithm [14, 16]. Based on this algorithm, the one-dimensional
discrete wavelet coefficients of any stage can be computed from the coefficients of
the previous stage using the following iterative equations:
WL (n, j) = (1)
WH (n, j) = (2)
Where WL(n,j) is the nth
scaling coefficient at the jth
stage, WH(n,j) is the nth
wavelet
coefficient at the jth
stage, and h0(n) and h1(n) are the coefficients corresponding to the
scaling and wavelet functions. Equation (1) can then be used for obtaining the wavelet
coefficients of subsequent stages. In practice this decomposition is performed only for
a few stages. In order to reconstruct the original data, the discrete wavelet transform
coefficients are up-sampled and passed through another set of low pass and high
passfilters, which are expressed as:
∑ (3)
Where g0(n) and g1(n) are respectively the low-pass and high-pass synthesis filters
corresponding to mother wavelet. It is observed from Equation (3) that the jth
level
coefficients can be obtained from the (j+1)th
level coefficients.
Due to its excellent spatio-frequency localization properties, the DWT is very
suitable to identify areas in an audio signal where a watermark can be embedded
effectively. Some DWT-based audio watermarking techniques can be found in
literature [15, 17, 18].
4. LSB INSERTION TECHNIQUES
Low-bit encoding technique is considered as the earliest technique to add information
into digital audio signal. Low-bit encoding can be done by replacing the LSB of each
sample point by a coded string [2, 9].
In LSB insertion method, a random number generator is used to randomly
distribute and hide the bits of a secret message into the least significant bit of a cover
object, a common approach to achieve this is the random interval method. The
transmitting and receiving end share the stego key, the output is a random sequence
K1………..Kn where n is the length of message bits. The sequence is then used by the
sender to generate the sequence indices yi where,
y1 = K1 (4)
yi = yi-1 + Ki , i >2 (5)
Message bit, i would then be embedded into the LSB of the sample, yi and the
order in which the secret message bits are embedded would be determined pseudo
randomly. Since the receiver knows the seed k, he can reconstruct ki and therefore the
entire sequence of sample indices yi. In the random insertion method the random
R. Karteek and Dr. A. S. Srinivasarao
http://www.iaeme.com/IJECET/index.asp 12 editor@iaeme.com
location of the samples depends on a stego key, whose size k should be in the range n
< k < i. Where n is the size of message and i is the size of cover object. The method
commences by searching for the first prime number p that exceeds the key k, A
primitive root a, is then obtained, which is a number whose powers generate all the
distinct integers from 1 to (p-1) in some permuted order and distinct numbers, yi = ai
mod p, where i is the bit index of the secret message. Bit i of the secret message then
goes into LSB of pixel yi. In this way it is ensured that the bits of the secret message
are inserted into distinct LSBs.
4.1. Advantages of Low-bit encoding
1. High watermark channel bit rate
2. Low computational complexity
4.2. Disadvantage of Low-bit encoding
1. Low robustness, random changes of the LSB destroys the coded watermark.
2. The embedded watermark would survive analog to digital conversions and vice versa.
5. DWT BASED WATERMARKING
DWT based watermarking on audio signal has two procedures, one; watermarking
embedding and other; watermark extraction, as follows:
5.1. Algorithm for Watermark Embedding Process [10]
1. Consider the PCM encoded wave file.
2. Quantize the signal before it is applied DWT transformation.
3. Select the watermark text.
4. Convert watermark text into binary format.
5. Consider the high frequency part of the signal to perform LSB technique.
6. Start from a suitable position of the data bytes.
7. Edit the least significant bit with the data that have to be embedded.
8. Take every alternate sample and change the least significant bit to embed the whole
message. The data retrieving algorithm at the receiver’s end follows the same logic as
the embedding algorithm.
9. Apply IDWT transformation to get the Watermarked signal.
5.2. Algorithm for Watermark Extraction Process
1. Apply DWT to the Watermarked signal.
2. Leave the low frequency part and consider the high frequency part of the signal.
3. Apply inverse LSB on that to retrieve the hidden information.
4. Check every alternate sample and store the least significant bit in the previous queue
with a left shift of the previous bit.
5. Convert the binary values to decimal to get the ASCII values of the secret message.
6. From the ASCII find the secret message.
7. Apply IDWT to retain the original signal.
Audio Forensic using DWT-LSB
http://www.iaeme.com/IJECET/index.asp 13 editor@iaeme.com
6. RESULTS
To evaluate the performance of the DWT based audio watermarking algorithm, a
standard audio signal was used. A WAV file with 10 seconds of duration and was
taken sampled at 44.1 kHz width 16 bits per sample. The size of the text watermark
has taken into consideration after length of the audio signal is considered.
For different audio signals, the imperceptibility test was done (Figure 1 to 6,
shows original audio signal and corresponding audio signal after water marking
process) and the calculated SNR values are presented in Table 1. The SNR values are
calculated from:
Figure 1(a) Original ‘POP’ audio signal.
Figure 1(b) Forensic marked ‘POP’ audio signal.
Figure 2(a) Original ‘ROCK’ audio signal.
Figure 2(b) Forensic marked ‘ROCK’ audio signal.
R. Karteek and Dr. A. S. Srinivasarao
http://www.iaeme.com/IJECET/index.asp 14 editor@iaeme.com
Figure 3(a) Original ‘FOLKCOUNTRY’ audio signal.
Figure 3(b) Forensic marked ‘FOLKCOUNTRY’ audio signal.
Figure 4(a) Original ‘BLUE’ audio signal.
Figure 4(b) Forensic marked ‘BLUE’ audio signal.
Audio Forensic using DWT-LSB
http://www.iaeme.com/IJECET/index.asp 15 editor@iaeme.com
Figure 5(a) Original ‘FUNKSOULRNB’ audio signal.
Figure 5(b) Forensic marked ‘FUNKSOULRNB’ audio signal.
Figure 6(a) Original ‘RAPHIPPOP’ audio signal.
Figure 6(b) Forensic marked ‘RAPHIPPOP’ audio signal.
Table 1 SNR values for audio signals after water marking process.
Type of Signal SNR
POP 58.1317
ROCK 57.1049
FOLKCOUNTRY 56.6982
BLUE 58.7308
FUNKSOULRNB 53.7404
RAPHIPPOP 59.6167
R. Karteek and Dr. A. S. Srinivasarao
http://www.iaeme.com/IJECET/index.asp 16 editor@iaeme.com
7. CONCLUSION
Audio watermarking is an active research area that has been derived as a solution to
copyright protection of digital audio products. Many audio watermarking techniques
have been proposed and proved as effective. However, due to the challenging nature
of audio signal processing, there remains much to do. In this paper, an audio
watermarking technique by implementing DWT transformation is proposed. The
spectrum of the host audio signal was decomposed to locate the most appropriate
region to embed the watermark bits, to achieve the robustness and imperceptibility.
REFERENCES
[1] Singh, P. K. and Aggrawal, R. K. Enhancement of LSB based Steganography for
Hiding Information in Audio. International Journal on Computer Science and
Engineering, 2(5), 2010, pp. 1652–1658.
[2] Mat Kiah, M. L., Zaidan B. B, Zaidan A. A., Mohammed Ahmed, A. and Al-
bakri, S. H. A review of audio based steganography and digital watermarking.
International Journal of the Physical Sciences, 6(16), 2011, pp. 3837–3850.
[3] Acevedo, A. Digital Watermarking for Audio Data in Techniques and
Applications of Digital Watermarking and Content Protection. USA: Artech
House, 2003.
[4] Arnold, M. Audio Watermarking: Features, Applications and algorithms. IEEE
International Conference on Multimedia and Expo, 2000, pp. 1013–1016.
[5] Bassia, P. and Pitas, I. Robust Audio Watermarking in the Time Domain. IEEE
Transactions on Multimedia, 3(2), 2001, pp. 232–241.
[6] Bender, W., Gruhl, D., Morimoto N. and Lu, A. Techniques for Data Hiding.
IBM System Journal, 35, 1996, pp. 313–336.
[7] Cox I., Kilian J., Leighton T. and Shamoon T. Secure Spread Spectrum
Watermarking for Multimedia. IEEE Transactions on Image Processing, 6(12),
1997, pp. 1673–1687.
[8] Cox I., Miller M. and Bloom J. Digital Watermarking. USA: Academic Pressing,
2002.
[9] Cvejic, N. and Seppänen, T. Increasing the Capacity of LSB-Based Audio
Steganography. IEEE International Workshop on Multimedia Signal Processing,
2002, pp. 336–338.
[10] Erelebi, E. and Bataki, L. Audio Watermarking Scheme Based on Embedding
Strategy in Low Frequency Components with a Binary Image. Digital Signal
Processing, 19(2), 2009, pp. 265–277.
[11] Katzenbeisser, S. and Petitcolsd, F. Information Hiding Techniques for
Steganography and Digital Watermarking. Boston, USA: Artech House, 2000.
[12] Malik, H., Ansari, R. and Khokhar, Robust, A. Audio Watermarking Using
Frequency-Selective Spread Spectrum. IET Information Security, 2(4), 2008, pp.
129–150.
[13] Patil, M. V. and Chitode, J. S. Audio Watermarking: A Way to Copyright
Protection. International Journal of Engineering Research & Technology, 1(6),
2012.
[14] Mallat, S. A Theory for Multi-Resolution Signal Decomposition: The Wavelet
Representation. IEEE Transactions on Pattern Analysis and Machine
Intelligence, 11(7), 1989, pp. 674–693.
Audio Forensic using DWT-LSB
http://www.iaeme.com/IJECET/index.asp 17 editor@iaeme.com
[15] Deshmukh, R. S. Video Watermarking Schemes Based on DWT and PCA
Algorithm  A Novel Approach. International Journal of Advanced Research in
Engineering & Technology (IJARET), 5(5), 2014, pp. 107–116.
[16] Ozer, H., Sankur B. and Memon N. An SVD Based Audio Watermarking
Technique. In Proceedings of the Multimedia and Security Workshop, New York,
2005, pp. 51–56.
[17] Khatri, G. B. and Dr. Chaudhari, D. S. A High Capacity Digital Audio
Watermarking Using Discrete Wavelet and Cosine Transform. International
Journal of Electronics and Communication Engineering &Technology (IJECET),
4(6), 2013, pp. 71–84.
[18] Swanson, M., Zhu, B., Tewfik A. and Boney, L. Robust Audio Watermarking
Using Perceptual Masking. Signal Processing, 66(3), 1998, pp. 337–355.

More Related Content

What's hot

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Resume of Gaurang Rathod, Embedded Software Developer
Resume of Gaurang Rathod, Embedded Software DeveloperResume of Gaurang Rathod, Embedded Software Developer
Resume of Gaurang Rathod, Embedded Software DeveloperGaurang Rathod
 
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...ijcseit
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsCSCJournals
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networksIJECEIAES
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnseSAT Publishing House
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channelsiosrjce
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...cscpconf
 
IRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET Journal
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAssociate Professor in VSB Coimbatore
 
Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...IOSR Journals
 
Partial encryption of compresed video
Partial encryption of compresed videoPartial encryption of compresed video
Partial encryption of compresed videoeSAT Publishing House
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
 

What's hot (19)

115 118
115 118115 118
115 118
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
270 273
270 273270 273
270 273
 
Resume of Gaurang Rathod, Embedded Software Developer
Resume of Gaurang Rathod, Embedded Software DeveloperResume of Gaurang Rathod, Embedded Software Developer
Resume of Gaurang Rathod, Embedded Software Developer
 
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
 
252 256
252 256252 256
252 256
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
Accelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsnsAccelerated broadcast authentication with signature amortization for wsns
Accelerated broadcast authentication with signature amortization for wsns
 
Hv3114921496
Hv3114921496Hv3114921496
Hv3114921496
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
 
IRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based Steganography
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
 
Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...Implementation of error correcting methods to the asynchronous Delay Insensit...
Implementation of error correcting methods to the asynchronous Delay Insensit...
 
Partial encryption of compresed video
Partial encryption of compresed videoPartial encryption of compresed video
Partial encryption of compresed video
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 

Similar to Ijecet 06 06_002

A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...eSAT Journals
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos basedeSAT Publishing House
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmeSAT Publishing House
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps IJECEIAES
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
 
Hiding data in images using steganography techniques with compression algorithms
Hiding data in images using steganography techniques with compression algorithmsHiding data in images using steganography techniques with compression algorithms
Hiding data in images using steganography techniques with compression algorithmsTELKOMNIKA JOURNAL
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
 
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmModified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmTELKOMNIKA JOURNAL
 
A typical analysis of hybrid covert channel using constructive entropy analy...
A typical analysis of hybrid covert channel using constructive  entropy analy...A typical analysis of hybrid covert channel using constructive  entropy analy...
A typical analysis of hybrid covert channel using constructive entropy analy...IJECEIAES
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...INFOGAIN PUBLICATION
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
 
Design of high speed reconfigurable coprocessor for interleaver and de interl...
Design of high speed reconfigurable coprocessor for interleaver and de interl...Design of high speed reconfigurable coprocessor for interleaver and de interl...
Design of high speed reconfigurable coprocessor for interleaver and de interl...IAEME Publication
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganographyAlexander Decker
 
Hiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissionHiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissioneSAT Journals
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...IRJET Journal
 
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...VLSICS Design
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxFAIZAN SHAFI
 

Similar to Ijecet 06 06_002 (20)

A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos based
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdm
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
Hiding data in images using steganography techniques with compression algorithms
Hiding data in images using steganography techniques with compression algorithmsHiding data in images using steganography techniques with compression algorithms
Hiding data in images using steganography techniques with compression algorithms
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
 
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmModified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
 
A typical analysis of hybrid covert channel using constructive entropy analy...
A typical analysis of hybrid covert channel using constructive  entropy analy...A typical analysis of hybrid covert channel using constructive  entropy analy...
A typical analysis of hybrid covert channel using constructive entropy analy...
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
Design of high speed reconfigurable coprocessor for interleaver and de interl...
Design of high speed reconfigurable coprocessor for interleaver and de interl...Design of high speed reconfigurable coprocessor for interleaver and de interl...
Design of high speed reconfigurable coprocessor for interleaver and de interl...
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
Hiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissionHiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmission
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
A Low Power VITERBI Decoder Design With Minimum Transition Hybrid Register Ex...
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptx
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Ijecet 06 06_002

  • 1. http://www.iaeme.com/IJECET/index.asp 9 editor@iaeme.com International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 6, Jun 2015, pp. 09-17, Article ID: IJECET_06_06_002 Available online at http://www.iaeme.com/IJECETissues.asp?JTypeIJECET&VType=6&IType=6 ISSN Print: 0976-6464 and ISSN Online: 0976-6472 © IAEME Publication ___________________________________________________________________________ AUDIO FORENSIC USING DWT-LSB R. Karteek and Dr. A. S. Srinivasarao Department of Electronics and Communication Engineering, AITAM, Tekkali (AP), India ABSTRACT Many effective watermarking algorithms have been proposed and implemented for digital images and digital video, however, few algorithms have been proposed for audio watermarking. This is due to the fact that, the human audio system is far more complex and sensitive than the human visual system. In this paper, an audio watermarking algorithm based on DWT-LSB is proposed. The DWT transformation decomposes the audio signal into several sub bands, enabling developers to locate the most appropriate sub-bad to embed. The watermark bits are embedded into the high-resolution sub-band by using LSB algorithm, so the satisfactory robustness and the imperceptibility performances are obtained Key words: DWT, LSB, Forensic Mark, Imperceptibility and Robustness Cite this Article: Karteek, R. and Dr. Srinivasarao, A. S. Audio Forensic using DWT-LSB. International Journal of Electronics and Communication Engineering & Technology, 6(6), 2015, pp. 09-17. http://www.iaeme.com/IJECET/issues.asp?JTypeIJECET&VType=6&IType=6 _____________________________________________________________________ 1. INTRODUCTION By virtue of the new advancements in computer and telecommunication networks, multimedia files are produced, stored and distributed easily across the globe. However, the ownership and copyright of multimedia files are not usually protected. Digital watermarking has been proposed in recent years as a means of protecting multimedia contents from intellectual piracy. This is achieved by modifying the original content, by inserting a signature which can be extracted, when necessary, as a proof of ownership. Generally the watermark can be obtained by two techniques: watermarking and finger printing. Watermarking is the process of embedding marks in digital documents (sounds, images, binaries, etc.) exactly like the watermarks on currency notes. Fingerprinting is the process of embedding a serial number into every copy of an object. This serial number can be used to detect the break of a license agreement. In both cases, the embedded information is supposed to be invisible and very difficult to
  • 2. R. Karteek and Dr. A. S. Srinivasarao http://www.iaeme.com/IJECET/index.asp 10 editor@iaeme.com remove it. The difference between the two processes is that in the former process the all copies of object are all marked the same way, but in the latter process every copy of object has a different embedded serial number [1]. Few algorithms are proposed for hiding data in audio files such as MP3Stego, which effectively hides arbitrary information. The windows wave format lets users hide data using stego-hide [2]. Data hidden can be classified according to the domain where the watermarking or steganography has been applied. The following sections discuss these domains [3, 4]: 1.1. Time domain audio steganography In time domain technology, watermark is directly embedded into the audio signal, where there are no transformations applied. Watermark signal is shaped before it is going to embed to ensure the robustness [5]. Hiding the watermark into time domain engages several challenges related to robustness and inaudibility. Shaping the watermark before embedding, enables the system to maintain the original audio signal quality and renders the watermark inaudible [2]. 1.2. Frequency domain audio steganography In this technique, first the input signal is transformed to frequency domain and then the watermark is added to the input signal. Later the inverse transform is applied to the signal in order to get the watermarked signal [1113]. The most common transforms used are DWT (discrete wavelet transform), DFT (discrete Fourier transform), DCT (discrete cosine transform). Examples of techniques for this domain are LSB, SVD, Phase coding, Spread spectrum, Echo data hiding [2, 6, 7]. 2. REQUIREMENTS A steganography system, in general, is expected to meet three key requirements, namely, imperceptibility of embedding, accurate recovery of embedded information, and large payload. An effective steganography scheme should possess the following desired characteristics: Secrecy: A person should not be able to extract the covert data from the host medium without the knowledge of the proper secret key used in the extracting procedure. Imperceptibility: The digital watermark should not affect the quality of original audio signal after it is watermarked. The imperceptibility of an audio signal is obtained by calculating the SNR of the audio signal. The SNR is obtained by taking the difference in between the host audio signal and the forensic marked audio signal. Robustness: A digital watermark is called robust if it resists a designated class of transformations. Robust watermarks may be used in copy protection applications to carry copy and no access control information [8]. High capacity: The maximum length of the covert message that can be embedded should be as long as possible. Resistance: The covert data should be able to survive when the host medium has been manipulated, for example by some lossy compression scheme. Accurate extraction: The extraction of the covert data from the medium should be accurate and reliable.
  • 3. Audio Forensic using DWT-LSB http://www.iaeme.com/IJECET/index.asp 11 editor@iaeme.com 3. THE DISCRETE WAVELET TRANSFORM Wavelets are special functions which, in a form analogous to sines and cosines in Fourier analysis, are used as basal functions for representing signals. They provide powerful multi-resolution tool for the analysis of non-stationary signals with good time localization information. The coefficients of the discrete wavelet transform can be calculated recursively and in a straight forward manner using the well-known Mallat’s pyramid algorithm [14, 16]. Based on this algorithm, the one-dimensional discrete wavelet coefficients of any stage can be computed from the coefficients of the previous stage using the following iterative equations: WL (n, j) = (1) WH (n, j) = (2) Where WL(n,j) is the nth scaling coefficient at the jth stage, WH(n,j) is the nth wavelet coefficient at the jth stage, and h0(n) and h1(n) are the coefficients corresponding to the scaling and wavelet functions. Equation (1) can then be used for obtaining the wavelet coefficients of subsequent stages. In practice this decomposition is performed only for a few stages. In order to reconstruct the original data, the discrete wavelet transform coefficients are up-sampled and passed through another set of low pass and high passfilters, which are expressed as: ∑ (3) Where g0(n) and g1(n) are respectively the low-pass and high-pass synthesis filters corresponding to mother wavelet. It is observed from Equation (3) that the jth level coefficients can be obtained from the (j+1)th level coefficients. Due to its excellent spatio-frequency localization properties, the DWT is very suitable to identify areas in an audio signal where a watermark can be embedded effectively. Some DWT-based audio watermarking techniques can be found in literature [15, 17, 18]. 4. LSB INSERTION TECHNIQUES Low-bit encoding technique is considered as the earliest technique to add information into digital audio signal. Low-bit encoding can be done by replacing the LSB of each sample point by a coded string [2, 9]. In LSB insertion method, a random number generator is used to randomly distribute and hide the bits of a secret message into the least significant bit of a cover object, a common approach to achieve this is the random interval method. The transmitting and receiving end share the stego key, the output is a random sequence K1………..Kn where n is the length of message bits. The sequence is then used by the sender to generate the sequence indices yi where, y1 = K1 (4) yi = yi-1 + Ki , i >2 (5) Message bit, i would then be embedded into the LSB of the sample, yi and the order in which the secret message bits are embedded would be determined pseudo randomly. Since the receiver knows the seed k, he can reconstruct ki and therefore the entire sequence of sample indices yi. In the random insertion method the random
  • 4. R. Karteek and Dr. A. S. Srinivasarao http://www.iaeme.com/IJECET/index.asp 12 editor@iaeme.com location of the samples depends on a stego key, whose size k should be in the range n < k < i. Where n is the size of message and i is the size of cover object. The method commences by searching for the first prime number p that exceeds the key k, A primitive root a, is then obtained, which is a number whose powers generate all the distinct integers from 1 to (p-1) in some permuted order and distinct numbers, yi = ai mod p, where i is the bit index of the secret message. Bit i of the secret message then goes into LSB of pixel yi. In this way it is ensured that the bits of the secret message are inserted into distinct LSBs. 4.1. Advantages of Low-bit encoding 1. High watermark channel bit rate 2. Low computational complexity 4.2. Disadvantage of Low-bit encoding 1. Low robustness, random changes of the LSB destroys the coded watermark. 2. The embedded watermark would survive analog to digital conversions and vice versa. 5. DWT BASED WATERMARKING DWT based watermarking on audio signal has two procedures, one; watermarking embedding and other; watermark extraction, as follows: 5.1. Algorithm for Watermark Embedding Process [10] 1. Consider the PCM encoded wave file. 2. Quantize the signal before it is applied DWT transformation. 3. Select the watermark text. 4. Convert watermark text into binary format. 5. Consider the high frequency part of the signal to perform LSB technique. 6. Start from a suitable position of the data bytes. 7. Edit the least significant bit with the data that have to be embedded. 8. Take every alternate sample and change the least significant bit to embed the whole message. The data retrieving algorithm at the receiver’s end follows the same logic as the embedding algorithm. 9. Apply IDWT transformation to get the Watermarked signal. 5.2. Algorithm for Watermark Extraction Process 1. Apply DWT to the Watermarked signal. 2. Leave the low frequency part and consider the high frequency part of the signal. 3. Apply inverse LSB on that to retrieve the hidden information. 4. Check every alternate sample and store the least significant bit in the previous queue with a left shift of the previous bit. 5. Convert the binary values to decimal to get the ASCII values of the secret message. 6. From the ASCII find the secret message. 7. Apply IDWT to retain the original signal.
  • 5. Audio Forensic using DWT-LSB http://www.iaeme.com/IJECET/index.asp 13 editor@iaeme.com 6. RESULTS To evaluate the performance of the DWT based audio watermarking algorithm, a standard audio signal was used. A WAV file with 10 seconds of duration and was taken sampled at 44.1 kHz width 16 bits per sample. The size of the text watermark has taken into consideration after length of the audio signal is considered. For different audio signals, the imperceptibility test was done (Figure 1 to 6, shows original audio signal and corresponding audio signal after water marking process) and the calculated SNR values are presented in Table 1. The SNR values are calculated from: Figure 1(a) Original ‘POP’ audio signal. Figure 1(b) Forensic marked ‘POP’ audio signal. Figure 2(a) Original ‘ROCK’ audio signal. Figure 2(b) Forensic marked ‘ROCK’ audio signal.
  • 6. R. Karteek and Dr. A. S. Srinivasarao http://www.iaeme.com/IJECET/index.asp 14 editor@iaeme.com Figure 3(a) Original ‘FOLKCOUNTRY’ audio signal. Figure 3(b) Forensic marked ‘FOLKCOUNTRY’ audio signal. Figure 4(a) Original ‘BLUE’ audio signal. Figure 4(b) Forensic marked ‘BLUE’ audio signal.
  • 7. Audio Forensic using DWT-LSB http://www.iaeme.com/IJECET/index.asp 15 editor@iaeme.com Figure 5(a) Original ‘FUNKSOULRNB’ audio signal. Figure 5(b) Forensic marked ‘FUNKSOULRNB’ audio signal. Figure 6(a) Original ‘RAPHIPPOP’ audio signal. Figure 6(b) Forensic marked ‘RAPHIPPOP’ audio signal. Table 1 SNR values for audio signals after water marking process. Type of Signal SNR POP 58.1317 ROCK 57.1049 FOLKCOUNTRY 56.6982 BLUE 58.7308 FUNKSOULRNB 53.7404 RAPHIPPOP 59.6167
  • 8. R. Karteek and Dr. A. S. Srinivasarao http://www.iaeme.com/IJECET/index.asp 16 editor@iaeme.com 7. CONCLUSION Audio watermarking is an active research area that has been derived as a solution to copyright protection of digital audio products. Many audio watermarking techniques have been proposed and proved as effective. However, due to the challenging nature of audio signal processing, there remains much to do. In this paper, an audio watermarking technique by implementing DWT transformation is proposed. The spectrum of the host audio signal was decomposed to locate the most appropriate region to embed the watermark bits, to achieve the robustness and imperceptibility. REFERENCES [1] Singh, P. K. and Aggrawal, R. K. Enhancement of LSB based Steganography for Hiding Information in Audio. International Journal on Computer Science and Engineering, 2(5), 2010, pp. 1652–1658. [2] Mat Kiah, M. L., Zaidan B. B, Zaidan A. A., Mohammed Ahmed, A. and Al- bakri, S. H. A review of audio based steganography and digital watermarking. International Journal of the Physical Sciences, 6(16), 2011, pp. 3837–3850. [3] Acevedo, A. Digital Watermarking for Audio Data in Techniques and Applications of Digital Watermarking and Content Protection. USA: Artech House, 2003. [4] Arnold, M. Audio Watermarking: Features, Applications and algorithms. IEEE International Conference on Multimedia and Expo, 2000, pp. 1013–1016. [5] Bassia, P. and Pitas, I. Robust Audio Watermarking in the Time Domain. IEEE Transactions on Multimedia, 3(2), 2001, pp. 232–241. [6] Bender, W., Gruhl, D., Morimoto N. and Lu, A. Techniques for Data Hiding. IBM System Journal, 35, 1996, pp. 313–336. [7] Cox I., Kilian J., Leighton T. and Shamoon T. Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing, 6(12), 1997, pp. 1673–1687. [8] Cox I., Miller M. and Bloom J. Digital Watermarking. USA: Academic Pressing, 2002. [9] Cvejic, N. and Seppänen, T. Increasing the Capacity of LSB-Based Audio Steganography. IEEE International Workshop on Multimedia Signal Processing, 2002, pp. 336–338. [10] Erelebi, E. and Bataki, L. Audio Watermarking Scheme Based on Embedding Strategy in Low Frequency Components with a Binary Image. Digital Signal Processing, 19(2), 2009, pp. 265–277. [11] Katzenbeisser, S. and Petitcolsd, F. Information Hiding Techniques for Steganography and Digital Watermarking. Boston, USA: Artech House, 2000. [12] Malik, H., Ansari, R. and Khokhar, Robust, A. Audio Watermarking Using Frequency-Selective Spread Spectrum. IET Information Security, 2(4), 2008, pp. 129–150. [13] Patil, M. V. and Chitode, J. S. Audio Watermarking: A Way to Copyright Protection. International Journal of Engineering Research & Technology, 1(6), 2012. [14] Mallat, S. A Theory for Multi-Resolution Signal Decomposition: The Wavelet Representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 11(7), 1989, pp. 674–693.
  • 9. Audio Forensic using DWT-LSB http://www.iaeme.com/IJECET/index.asp 17 editor@iaeme.com [15] Deshmukh, R. S. Video Watermarking Schemes Based on DWT and PCA Algorithm  A Novel Approach. International Journal of Advanced Research in Engineering & Technology (IJARET), 5(5), 2014, pp. 107–116. [16] Ozer, H., Sankur B. and Memon N. An SVD Based Audio Watermarking Technique. In Proceedings of the Multimedia and Security Workshop, New York, 2005, pp. 51–56. [17] Khatri, G. B. and Dr. Chaudhari, D. S. A High Capacity Digital Audio Watermarking Using Discrete Wavelet and Cosine Transform. International Journal of Electronics and Communication Engineering &Technology (IJECET), 4(6), 2013, pp. 71–84. [18] Swanson, M., Zhu, B., Tewfik A. and Boney, L. Robust Audio Watermarking Using Perceptual Masking. Signal Processing, 66(3), 1998, pp. 337–355.