SlideShare a Scribd company logo
1 of 3
Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.047-049
47 | P a g e
Audio Watermarking Using Lsb With Adjustment Method
Ansith.S1
, Priyanka Udayabhanu2
1(Assist. Prof., Department of Electronics and Communication Engineering, Mookambika Technical Campus,
Moovattupuzha)
2
(Assist. Prof., Department of Electronics and Communication Engineering, SNGCE, Kadayiruppu)
ABSTRACT
In this paper we are discussing
watermarking on audio signals. In this method
the recorded audio data is first sampled using a
sampling frequency of 22050 Hz. Then the
watermark message is watermarked into the
sampled data of the audio signal. In this method
the adjustment is done to increase the accuracy of
the watermarked signal. Finally we extract the
message from the audio data.
Keywords— Watermarking, LSB, Adjustment
method
I. INTRODUCTION
In this paper we are discussing
watermarking on audio signals. In this method the
recorded audio data is first sampled using a sampling
frequency of 22050 Hz. The sampled audio data is
then transformed into Discrete Cosine Transform
domain. Then the watermark message is
watermarked into the DCT coefficients of the audio
signal. In this method the adjustment is done to
increase the accuracy of the watermarked signal.
Finally we extract the message from the audio data
after performing Inverse Discrete Cosine Transform
to the watermarked audio signal.
.
II. WATERMARKING
In this method the watermarking is done
using LSB (least significant bit). First we capture the
audio data. Then the audio data is sampled using a
sampling frequency of 22050 Hz. The message
which is to be watermarked into the audio signal is
entered into the text box. Each letter in the message
is converted into its ascii value. The ascii values are
represented by 7 bit binary representation. These
binary bits are stored into a column vector. Each bit
is bitwise xored with the 2nd
bit of sampled audio
data. The resultant bits after bitwise xoring are the
watermark bits. These watermark bits are
watermarked into the 2nd
bit of each sampled audio
data.
III. ADJUSTMENT METHOD
Here let ‗a‘ be the value of original data
(sampled audio data), ‗b‘ be the value of
watermarked data. Then we choose a value ‗c‘ as the
watermarked data such that it is very close the value
of ‗a‘ and the watermark bit should remain as that of
the watermarked data ‗b‘. If a > b, then b ≤ c < a or
if a < b, then a < c ≤ b.
For example, consider an 8 bit
representation. Let the 3rd
bit is to be watermarked
by a watermark bit ‗1‘. Let ‗a‘=‗00001011‘ (11d) be
the sampled data of audio signal. After
watermarking ‗a‘ will become ‗b‘= ‗00001111‘
(15d). This watermarked data is adjusted to a new
value ‗c‘= ‗00001100‘ (12d). Here ‗c‘ is very close
to ‗a‘ and the watermark bit remains same as that of
‗b‘ ie; ‗1‘. Hence now we select the watermarked
data as ‗c‘.
a=00001011=11d
b=00001111=15d
c=00001100=12d
IV. EXTRACTION OF MESSAGE
We are using the property of bitwise xoring
for extraction of message from the watermarked
signal. If C= A xor B, then A= C xor B. Hence the
2nd
bits of watermarked audio data are bitwise xored
with 2nd
bits of sampled audio data before
watermarking. The resultant bits are the message bits
and are converted into the message data.
V. EXPERIMENTAL RESULTS
.
Fig 1: Block diagram of watermarking using LSB
with adjustment method
Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.047-049
48 | P a g e
Fig 2: Output window
The output window consists of push buttons
‗record‘, ‗Play Host‘, ‗process‘ and ‗Play
Watermarked‘ and the edit text box for typing the
message. The edit text box contains ‗msg‘ as default
watermark message. When we select the push
button ‗record‘, the recording takes place for 5
seconds of time. The extracted message will be
displayed in the text box provided for it.
Fig 3: Output window after recording finished
The original audio signal will be displayed
after the recording finished. We can check the
recorded audio data by selecting the ‗Play Host‘
push button.
Fig 4:The watermarked signal and extracted message
on the output window while using the adjustment
method
VI. ANALYSIS
Fig 5: Analysis
The mean squared error between the
original signal and the watermarked signal is
calculated for both the watermarking methods with
and without using the adjustment method. The mean
squared error can be calculated as follows.
Mean squared error =
1
𝑁
𝑌 𝑛 −𝑛=𝑁−1
𝑛=0
𝑋(𝑛)2
Where N-total number of data taken
Y(n)- watermarked data
X(n)- sampled audio data.
The mean squared errors for both the cases
are calculated for 7 audio test files. It can be seen
that the mean squared error is higher for the
Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.047-049
49 | P a g e
watermarking method without using the adjustment
method.
VII. CONCLUSION
In this paper we discussed about LSB
watermarking method. The watermarking is done
with and without using the adjustment method. In
both the cases the watermarking is performed on the
sampled audio data. The adjustment method is used
to increase the accuracy of the watermarking. An
analysis is carried out for seven audio files using the
three watermarking methods. The analysis is carried
out by calculating the mean squared error between
the watermarked signal and the original signal. From
the result we can conclude that the mean squared
error is less for watermarking using the adjustment
method. The accuracy is therefore more for the
watermarking using adjustment method.
REFERENCES
[1] F. Hartung and M. Kutter, ―Multimedia
Watermarking Techniques,‖ in
Proceedings of the IEEE, vol. 87, no.7, pp.
1079-1107, July 1999.
[2] Chi-Kwong Chan , L.M. Cheng ―Hiding
data in images by simple LSB
substitution ―Pattern Recognition 37 (2004)
469– 474 , ww.elsevier.com/locate/patcog.
[3] Dr.M.A.Dorairangaswamy ―A Robust
Blind Image Watermarking Scheme in
Spatial Domain for Copyright Protection‖
International Journal of Engineering and
Technology Vol. 1, No.3, August, 2009 ,
ISSN: 1793-8236 .
[4] I. Pitas,‖A method for signature casting on
digital images,‖Proceedings of IEEE
International Conference on Image
Processing,‖ Vol. 3, pp.215-318 ,1996.
[5] R. Wolfgang and E. Delp, ‖ A watermark
for digital images,‖ Proceeding of IEEE
International Conference on Image
Processing, Vol. 2, pp.319-222, 1996.
[6] Sanghyun Joo, Youngho Suh, Jaeho Shin,
and Hisakazu Kikuchi ―A New Robust
Watermark Embedding into Wavelet DC
Components ‖ ETRI Journal, Volume 24,
Number 5, October 2002.
[7] Sadi Vural, Hiromi Tomii, Hironori
Yamauchi ―DWT Based Robust
Watermarking Embeded Using CRC-32
Techniques‖ World Academy of Science,
Engineering and Technology 5 2005.
[8] Kundur D., and Hatzinakos, D., ‗A
Robust Digital Image Water- marking
Scheme using Wavelet-Based fusion,‘ Proc.
IEEE Int. Conf. On Image Processing,
Santa Barbara, California, vol. 1, pp. 544-
547, October 1997.

More Related Content

Viewers also liked

Poster case studies
Poster case studiesPoster case studies
Poster case studiesSadiyya96
 
01 pengenalan algoritma
01   pengenalan algoritma01   pengenalan algoritma
01 pengenalan algoritmakua
 
11 operasi dasar masukan dan keluaran
11   operasi dasar masukan dan keluaran11   operasi dasar masukan dan keluaran
11 operasi dasar masukan dan keluarankua
 
Materi kuliah 15 array part 1
Materi kuliah 15   array part 1Materi kuliah 15   array part 1
Materi kuliah 15 array part 1kua
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29rosu555
 
10 operator dan ungkapan part 2
10   operator dan ungkapan part 210   operator dan ungkapan part 2
10 operator dan ungkapan part 2kua
 
Em defesa do Twitter
Em defesa do TwitterEm defesa do Twitter
Em defesa do TwitterMoreno Barros
 
Tanishka Latest Stills
Tanishka Latest Stills Tanishka Latest Stills
Tanishka Latest Stills telugustop.com
 
Pesquisa de mercado- Infoglobo XD
Pesquisa de mercado- Infoglobo XDPesquisa de mercado- Infoglobo XD
Pesquisa de mercado- Infoglobo XDEric Schmidt
 
Controversia en los sistemas de informacion contable integrados
Controversia en los sistemas de informacion contable integradosControversia en los sistemas de informacion contable integrados
Controversia en los sistemas de informacion contable integradosolgalucia32
 

Viewers also liked (20)

Dh33653657
Dh33653657Dh33653657
Dh33653657
 
Di33658661
Di33658661Di33658661
Di33658661
 
Du33731735
Du33731735Du33731735
Du33731735
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
 
Sistema de computo
Sistema de computoSistema de computo
Sistema de computo
 
El roi en la prensa
El roi en la prensaEl roi en la prensa
El roi en la prensa
 
Poster case studies
Poster case studiesPoster case studies
Poster case studies
 
01 pengenalan algoritma
01   pengenalan algoritma01   pengenalan algoritma
01 pengenalan algoritma
 
11 operasi dasar masukan dan keluaran
11   operasi dasar masukan dan keluaran11   operasi dasar masukan dan keluaran
11 operasi dasar masukan dan keluaran
 
Materi kuliah 15 array part 1
Materi kuliah 15   array part 1Materi kuliah 15   array part 1
Materi kuliah 15 array part 1
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
 
10 operator dan ungkapan part 2
10   operator dan ungkapan part 210   operator dan ungkapan part 2
10 operator dan ungkapan part 2
 
Juegos olímpicos informatica,,
Juegos olímpicos informatica,,Juegos olímpicos informatica,,
Juegos olímpicos informatica,,
 
Em defesa do Twitter
Em defesa do TwitterEm defesa do Twitter
Em defesa do Twitter
 
Unilabor Novedades 2013
Unilabor Novedades 2013Unilabor Novedades 2013
Unilabor Novedades 2013
 
Treballdels nuvols
Treballdels nuvolsTreballdels nuvols
Treballdels nuvols
 
Tanishka Latest Stills
Tanishka Latest Stills Tanishka Latest Stills
Tanishka Latest Stills
 
Impress 3 a
Impress 3 aImpress 3 a
Impress 3 a
 
Pesquisa de mercado- Infoglobo XD
Pesquisa de mercado- Infoglobo XDPesquisa de mercado- Infoglobo XD
Pesquisa de mercado- Infoglobo XD
 
Controversia en los sistemas de informacion contable integrados
Controversia en los sistemas de informacion contable integradosControversia en los sistemas de informacion contable integrados
Controversia en los sistemas de informacion contable integrados
 

Similar to Audio Watermarking Using LSB Adjustment Method

Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalEvaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalIJRES Journal
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking MethodsIRJET Journal
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital ImagesIRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital ImagesIRJET Journal
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfKalyan Anugu
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumCSCJournals
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
 
Denoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transformDenoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transformeSAT Publishing House
 
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...ijwmn
 
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...ijwmn
 
J03502050055
J03502050055J03502050055
J03502050055theijes
 
Performance analysis of bio-Signal processing in ocean Environment using soft...
Performance analysis of bio-Signal processing in ocean Environment using soft...Performance analysis of bio-Signal processing in ocean Environment using soft...
Performance analysis of bio-Signal processing in ocean Environment using soft...IJECEIAES
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsCSCJournals
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner ijcisjournal
 
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNERNOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNERIJCI JOURNAL
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlabeSAT Journals
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlabeSAT Publishing House
 
20575-38936-1-PB.pdf
20575-38936-1-PB.pdf20575-38936-1-PB.pdf
20575-38936-1-PB.pdfIjictTeam
 

Similar to Audio Watermarking Using LSB Adjustment Method (20)

Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalEvaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking Methods
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Jk3516211625
Jk3516211625Jk3516211625
Jk3516211625
 
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital ImagesIRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
Denoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transformDenoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transform
 
F5242832
F5242832F5242832
F5242832
 
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
 
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
 
J03502050055
J03502050055J03502050055
J03502050055
 
Performance analysis of bio-Signal processing in ocean Environment using soft...
Performance analysis of bio-Signal processing in ocean Environment using soft...Performance analysis of bio-Signal processing in ocean Environment using soft...
Performance analysis of bio-Signal processing in ocean Environment using soft...
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
 
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNERNOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
 
20575-38936-1-PB.pdf
20575-38936-1-PB.pdf20575-38936-1-PB.pdf
20575-38936-1-PB.pdf
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Audio Watermarking Using LSB Adjustment Method

  • 1. Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.047-049 47 | P a g e Audio Watermarking Using Lsb With Adjustment Method Ansith.S1 , Priyanka Udayabhanu2 1(Assist. Prof., Department of Electronics and Communication Engineering, Mookambika Technical Campus, Moovattupuzha) 2 (Assist. Prof., Department of Electronics and Communication Engineering, SNGCE, Kadayiruppu) ABSTRACT In this paper we are discussing watermarking on audio signals. In this method the recorded audio data is first sampled using a sampling frequency of 22050 Hz. Then the watermark message is watermarked into the sampled data of the audio signal. In this method the adjustment is done to increase the accuracy of the watermarked signal. Finally we extract the message from the audio data. Keywords— Watermarking, LSB, Adjustment method I. INTRODUCTION In this paper we are discussing watermarking on audio signals. In this method the recorded audio data is first sampled using a sampling frequency of 22050 Hz. The sampled audio data is then transformed into Discrete Cosine Transform domain. Then the watermark message is watermarked into the DCT coefficients of the audio signal. In this method the adjustment is done to increase the accuracy of the watermarked signal. Finally we extract the message from the audio data after performing Inverse Discrete Cosine Transform to the watermarked audio signal. . II. WATERMARKING In this method the watermarking is done using LSB (least significant bit). First we capture the audio data. Then the audio data is sampled using a sampling frequency of 22050 Hz. The message which is to be watermarked into the audio signal is entered into the text box. Each letter in the message is converted into its ascii value. The ascii values are represented by 7 bit binary representation. These binary bits are stored into a column vector. Each bit is bitwise xored with the 2nd bit of sampled audio data. The resultant bits after bitwise xoring are the watermark bits. These watermark bits are watermarked into the 2nd bit of each sampled audio data. III. ADJUSTMENT METHOD Here let ‗a‘ be the value of original data (sampled audio data), ‗b‘ be the value of watermarked data. Then we choose a value ‗c‘ as the watermarked data such that it is very close the value of ‗a‘ and the watermark bit should remain as that of the watermarked data ‗b‘. If a > b, then b ≤ c < a or if a < b, then a < c ≤ b. For example, consider an 8 bit representation. Let the 3rd bit is to be watermarked by a watermark bit ‗1‘. Let ‗a‘=‗00001011‘ (11d) be the sampled data of audio signal. After watermarking ‗a‘ will become ‗b‘= ‗00001111‘ (15d). This watermarked data is adjusted to a new value ‗c‘= ‗00001100‘ (12d). Here ‗c‘ is very close to ‗a‘ and the watermark bit remains same as that of ‗b‘ ie; ‗1‘. Hence now we select the watermarked data as ‗c‘. a=00001011=11d b=00001111=15d c=00001100=12d IV. EXTRACTION OF MESSAGE We are using the property of bitwise xoring for extraction of message from the watermarked signal. If C= A xor B, then A= C xor B. Hence the 2nd bits of watermarked audio data are bitwise xored with 2nd bits of sampled audio data before watermarking. The resultant bits are the message bits and are converted into the message data. V. EXPERIMENTAL RESULTS . Fig 1: Block diagram of watermarking using LSB with adjustment method
  • 2. Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.047-049 48 | P a g e Fig 2: Output window The output window consists of push buttons ‗record‘, ‗Play Host‘, ‗process‘ and ‗Play Watermarked‘ and the edit text box for typing the message. The edit text box contains ‗msg‘ as default watermark message. When we select the push button ‗record‘, the recording takes place for 5 seconds of time. The extracted message will be displayed in the text box provided for it. Fig 3: Output window after recording finished The original audio signal will be displayed after the recording finished. We can check the recorded audio data by selecting the ‗Play Host‘ push button. Fig 4:The watermarked signal and extracted message on the output window while using the adjustment method VI. ANALYSIS Fig 5: Analysis The mean squared error between the original signal and the watermarked signal is calculated for both the watermarking methods with and without using the adjustment method. The mean squared error can be calculated as follows. Mean squared error = 1 𝑁 𝑌 𝑛 −𝑛=𝑁−1 𝑛=0 𝑋(𝑛)2 Where N-total number of data taken Y(n)- watermarked data X(n)- sampled audio data. The mean squared errors for both the cases are calculated for 7 audio test files. It can be seen that the mean squared error is higher for the
  • 3. Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.047-049 49 | P a g e watermarking method without using the adjustment method. VII. CONCLUSION In this paper we discussed about LSB watermarking method. The watermarking is done with and without using the adjustment method. In both the cases the watermarking is performed on the sampled audio data. The adjustment method is used to increase the accuracy of the watermarking. An analysis is carried out for seven audio files using the three watermarking methods. The analysis is carried out by calculating the mean squared error between the watermarked signal and the original signal. From the result we can conclude that the mean squared error is less for watermarking using the adjustment method. The accuracy is therefore more for the watermarking using adjustment method. REFERENCES [1] F. Hartung and M. Kutter, ―Multimedia Watermarking Techniques,‖ in Proceedings of the IEEE, vol. 87, no.7, pp. 1079-1107, July 1999. [2] Chi-Kwong Chan , L.M. Cheng ―Hiding data in images by simple LSB substitution ―Pattern Recognition 37 (2004) 469– 474 , ww.elsevier.com/locate/patcog. [3] Dr.M.A.Dorairangaswamy ―A Robust Blind Image Watermarking Scheme in Spatial Domain for Copyright Protection‖ International Journal of Engineering and Technology Vol. 1, No.3, August, 2009 , ISSN: 1793-8236 . [4] I. Pitas,‖A method for signature casting on digital images,‖Proceedings of IEEE International Conference on Image Processing,‖ Vol. 3, pp.215-318 ,1996. [5] R. Wolfgang and E. Delp, ‖ A watermark for digital images,‖ Proceeding of IEEE International Conference on Image Processing, Vol. 2, pp.319-222, 1996. [6] Sanghyun Joo, Youngho Suh, Jaeho Shin, and Hisakazu Kikuchi ―A New Robust Watermark Embedding into Wavelet DC Components ‖ ETRI Journal, Volume 24, Number 5, October 2002. [7] Sadi Vural, Hiromi Tomii, Hironori Yamauchi ―DWT Based Robust Watermarking Embeded Using CRC-32 Techniques‖ World Academy of Science, Engineering and Technology 5 2005. [8] Kundur D., and Hatzinakos, D., ‗A Robust Digital Image Water- marking Scheme using Wavelet-Based fusion,‘ Proc. IEEE Int. Conf. On Image Processing, Santa Barbara, California, vol. 1, pp. 544- 547, October 1997.