SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org ||Volume 5 Issue 11|| November 2016 || PP.61-65
www.ijesi.org 61 | Page
DWT-SVD Based Visual Cryptography Scheme for Audio
Watermarking
Mukul Y. Kantharia 1
, Nikhil P. Patel2
1
(EC Department, B & B Institute of Technology /GTU, India)
2
(EC Department, B & B Institute of Technology /GTU, India)
Abstract: Secured access to the Internet and data resources has a high impact in defense system. This
dependency has brought many threats to information security. As aresult, reliably secure mechanisms are
required to protect most untold and blueprint of defenseinformation against vulnerabilities like ID spoofing and
unauthorized access to top most system of country. In this paper, we proposed algorithm based on audio
watermarking using DWT-SVD algorithm with visually crypted image message. The army people may have
access to listen radio and communicate through walkie talkie which is audio format data. In proposed work we
are hiding visually crypted image massage in audio file which may decrypted by proving shared image and
extracted watermark image without affecting original audio. We did comparative analysis of various attacks on
audio file after watermarking and calculated robustness and SNR value to support out work.
Keywords- SVD, DWT, VC, SNR, Robustness, Audio watermarking
I. Introduction
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be
encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. One
of the best-known techniques has been credited to Moni Naor and Adi Shamir, who developed it in 1994. They
demonstrated a visual secret sharing scheme, where an image was broken up into n shares so that only someone
with all n shares could decrypt the image, while any n1 shares revealed no information about the original image.
Each share was printed on a separate transparency, and decryption was performed by overlaying the shares.
When all n shares were overlaid, the original image would appear. Applications that take full advantage of such
simple yet secure scheme[1]
. Audio Watermarking is a watermarking technique in which left and right channel of
audio file is modified based on watermark object (visually crypted image). Discrete wavelet transform is used to
find lowest frequency region of audio file. After that lowest frequency part (LL) region may processed with
singular vector decomposition (SVD). Low frequency region having least information of object so we can
modify singular part of decomposed vector for embedding the watermarked bit.
II. Visual Cryptography with Dwt-SVD Audio Watermarking
1.1 Visual Cryptography
Visual Cryptography Scheme (VCS) is an encryption method that usescombinatorial techniques to encode secret
text message. The idea is to convert the text massage into an image and encode this image into ‘N’ twilight
images. Thedecoding only requires only selecting some subset of these ‘N’ images, making intensity of hidden
part of them, and stacking them on top of each other. In this Paper,we will provide the readers an overview of
the basic VCS constructions, as well asseveral extended work in the area for audio watermarking purpose. In
addition, we also review several techniques with improved VCS (by selecting Exor and Exnor operation in
random manner) that take full advantage of such simple yet secure scheme.The simplest Visual Cryptography
Scheme is given by the following setup. Asecret image consists of a collection of dark(0) and bright(1) pixels
where each pixel isprocessed independently. To encode the secret, we divide the original image into n
modifiedversions (referred as shares) such that each pixel in a share now subdivides into m darkand bright sub-
pixels. To decode the image, we simply pick a subset S of those n sharesand copy each of them onto a
transparency. If S is a "qualified" subset, then stackingall these transparencies will allow visual recovery of the
secret.
Fig. 2.1 VCS scheme[1]
DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
www.ijesi.org 62 | Page
Figure 2.2 provides anexample of such construction. Suppose the secret image "GCET Engineering College" is
divided into 4 shares,which is denoted by Ǿ={1,2,3,4} and that the qualified sets are all subsets of
{1,2},{2,3} and {3,4}.Then the qualified sets are exactly the following:
Гqual = {{1,2},{2,3},{3,4},{1,2,3},{2,3,4},{1,3,4},{1,2,3,4}}………(2.1)
Fig 2.2 (a) Original Image (b),(c) Generated Shared image after VCS, (d) Recovered image from generated
shares
1.2 Audio Watermarking with SVD-DWT
The DWT will be used to find extreme low frequency region so after embedding least number of audio content
may be unaffected. In our paper , we proposed 3 level DWT for better imperceptible and robustness. The four
level DWT is shown in Fig. 2.3.
Fig. 2.3 Three Level DWT decomposition [2]
SVD is used to find singular vector of decomposed dwt vector. Proposed work is changing diagonal s value of s
matrix to embedded watermark image bit (after VCS).
Table 2.1 S matrix formation
S11 0 0 0
0 S22 0 0
0 0 S33 0
0 0 0 S44
III. Proposed Work
The proposed system having two basic parts, first one is Visual Cryptography of Secrete image and the will
forward for audio watermarking.
Fig 3.1 Watermark Embedding System.
DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
www.ijesi.org 63 | Page
In Embedding system, secrete image will firstly have processed for visual cryptography scheme, based on VCS
scheme share 1 and share 2 of secrete image is available for next procedure. Each share part in now
independently processed with Audio watermarking method based on improved DWT-SVD algorithm (proposed
by Al. Haj) with slight modification in extraction part.
The audio file is rearranging in to finite block structure for processed with discrete wavelet
transformation(DWT). In proposed work, 4-level DWT was processed to get less informative part of audio
signal in terms of most low frequency part of audio file so after watermarking main audio file is least changed
will reflect best SNR. Components of DWT is now processed with Singular vector decomposition (SVD) to
obtain S matrix. Modification of S matrix is taken place based on watermarked image bits (algorithm 1). Last
step of algorithm is to take inverse SVD and then Inverse DWD to obtain audio watermarked file with secrete
visually encrypted image. {both share images are passed through this process}
Algorithm 1 (Embedding Procedure) for both share1 & share2
---------------------------------------------------------------------------------------------------------------------------------------
I. Input Secrete image
II. Apply VCS system to get Share1(s1) & Share2(s2)& reform images in to vector form. (1x N)
III. Take Audio file (Mx2)- Left and RightChannel Part { [a,s]=audioread(‘name.mp3’).
IV. Divide Audio file in to finite blocks (15000 sample value/block taken)
V. Find DWT of selected block. ([da,db]=wavedec2(block)) and reform D matrix. [3]
VI. Process D matrix for SVD decomposition. ([U, S, V]=svd(D)].
VII. Modify S value based on watermark image bits i.e. Snew= Wn + α * S (Wn: Image bit n, α: intensity of
watermark)
VIII. Find inverse SVD ( U * Snew * VT
) and its inverse DWT(waverec).
(Final Audio File with Watermarked Image).
To get Encrypted image back we have to segregate audio file which we got after embedding process. Fig. 3.2 is
related with segregation of watermarked audio.
Fig 3.2 Watermark Segregation/Extraction System.
The Watermarked audio file is firstlydivided in to finite block for processing for discrete wavelet
transformation. The formatted D matrix is now processed for SVD decomposition for watermark extraction
process. Based on New S matrix value and old S(S vector of Extraction process), we may find watermarked
image bits(Wn) by implementing equation 3.1.
1, if 1
Sold
W n
Snew
  (3.1)
0, if 1
S o ld
W n
S n ew
 
We can get both shares using same process and both shares are now passed through visual DE cryptographic
process by use of Ex-OR or Ex-NOR gate operation based on defined schemes. Output of that process is our
hidden secrete image behind audio file.
DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
www.ijesi.org 64 | Page
Algorithm 2 (Segregation/Extraction Process)
---------------------------------------------------------------------------------------------------------------------------------------
I. Input watermarked audio file.
II. Divide Audio file in to finite blocks (15000 sample value/block taken)
III. Find DWT of selected block. ([da,db]=wavedec2(block)) and reform D matrix. [3]
IV. Process D matrix for SVD decomposition. ([U, Snew, V]=svd(D)].
V. Find Wn value based on Equation 3.1.
VI. Reshape Wn (1 x N) vector into Matrix Image for display. (both shares)
VII. Do Ex-Oring or Ex-Nor operation using both shares which reforms original image.
IV. Results And Discussion
Robustness and SNR value is calculated based on Equation 4.1 and 4.2 [3]
1 0
2
1
' 2
1
( ) 1 0 lo g ; , '
(A )
n
i
n
i
A
S N R d b A o rig in a lA u d io A W a term a rked A u d io
A


  



(4.1)
1
2 2
1 1
'
(W n , ') ; , '
'
n
i i
i
n n
i i
i i
W n W n
W n W n O rig in a lW a term a rkb it W n E xtra cted B it
W n X W n
 
 
  

 
(4.2)
For results and comparative analysis, we had considered so many attacks like ECHO, Cropping and Amplifying
on watermarked audio file. Table 4.1 shows comparative analysis of such attacks with robustness and SNR
values.
Table 4.1 Comparative analysis of Robustness value and SNR for Different attacks.
Attacks 0.1  0.2  0.3 
Cropping ρ = 1 , SNR= 76.7 ρ = 1, SNR= 68.7 ρ = 1, SNR= 66.90
Amplify ρ =1, SNR= 78.9 ρ = 1. SNR= 78.9 ρ = 1, SNR= 65.29
Echo ρ = 0.95. SNR= 72.9 ρ = 0.95. SNR= 68.57 ρ = 0.95, SNR= 64.19
Bass Boost ρ = 0.96, SNR= 73.2 ρ = 0.96. SNR= 68.86 ρ = 1, SNR= 64.11
AWGN Noise ρ = 1, SNR= 74.2 ρ = 1, SNR= 68.29 ρ = 1, SNR= 60.19
Random Noise ρ = 1, SNR= 70.1 ρ = 1, SNR= 67.69 ρ = 1, SNR= 62.45
4.1 Results
Fig. 4.1 Results of DWT-SVD based Audio watermarking image (VCS output) and Reconstruction
DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking
www.ijesi.org 65 | Page
V. Conclusion
Digital Audio watermarking has its own advantages to protect copyright content on internet or elsewhere. Our
Aim in this proposed work is simply focused on defense system for military protected, surveillance area to
communicate in secured and safe manner. Hiding digital text / image data in audio file is more challenging as
audio file is vector format and image is matrix (array structure). In further security, we deploy
visualcryptography concept in DWT-SVD based robust method for perfect & secured communication system
for army. Beauty of this algorithm is one can send encrypted message via radio broadcasting without any special
military equipment. We have checked robustness and SNR value for all attacks with comparative analysis. In
future one can focus on improvement of visual cryptography algorithm along with DWT-SVD Algorithm.
References
Journal Papers:
[1] F. Liu, C.K. Wu, X.J. Lin , Color visual cryptography schemes,IET Information Security, 2(4), 2008, 151 – 165.
[2] Ali Al-Haj, An imperceptible and robust audio watermarking algorithm, EURASIP Journal on Audio, Speech, and Music
Processing (Springer journal), 2014.
[3] Khalid A. Darabkh, Imperceptible and Robust DWT-SVD-Based Digital Audio Watermarking Algorithm, Journal of Software
Engineering and Applications, 7,2014, 859-871.
[4] M. Naor and A. Shamir, Visual cryptography II: improving the contrast via the cover base, in "Security Protocols", M. Lomas, ed.,
Lecture Notes in Computer Science ,1189 ,1997,, 197-202.
[5] K Bhat, I Sengupta, A Das, An adaptive audio watermarking based on the singular value decomposition in the wavelet domain.
Digital Signal Process. 20, 2010, 1547–1558.
[6] M Hsieh, D Tseng, Y Huang, Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans. Ind. Electron.m
48(5),2001, 875–882.

More Related Content

What's hot

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESijiert bestjournal
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSdebasis sahoo
 
Deep learning and its application
Deep learning and its applicationDeep learning and its application
Deep learning and its applicationSrishty Saha
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingParag Agarwal
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics IJECEIAES
 
CS 354 Interaction
CS 354 InteractionCS 354 Interaction
CS 354 InteractionMark Kilgard
 
A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...IDES Editor
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domainA blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domainAbhishek Nath
 
U_N.o.1T: A U-Net exploration, in Depth
U_N.o.1T: A U-Net exploration, in DepthU_N.o.1T: A U-Net exploration, in Depth
U_N.o.1T: A U-Net exploration, in DepthManuel Nieves Sáez
 

What's hot (19)

A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUESA NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
A NOVEL APPROACH FOR IMAGE WATERMARKING USING DCT AND JND TECHNIQUES
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
 
Deep learning and its application
Deep learning and its applicationDeep learning and its application
Deep learning and its application
 
1918 1923
1918 19231918 1923
1918 1923
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
[IJET V2I4P2] Authors:Damanbir Singh, Guneet Kaur
 
A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics A Blind Multiple Watermarks based on Human Visual Characteristics
A Blind Multiple Watermarks based on Human Visual Characteristics
 
Paper_KST
Paper_KSTPaper_KST
Paper_KST
 
CS 354 Interaction
CS 354 InteractionCS 354 Interaction
CS 354 Interaction
 
A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
Hardware Implementation of Genetic Algorithm Based Digital Colour Image Water...
 
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
BLIND WATERMARKING SCHEME BASED ON RDWT-DCT FOR COLOR IMAGES
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Digital Water marking
Digital Water markingDigital Water marking
Digital Water marking
 
A blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domainA blind and robust video watermarking scheme in the DT CWT and SVD domain
A blind and robust video watermarking scheme in the DT CWT and SVD domain
 
U_N.o.1T: A U-Net exploration, in Depth
U_N.o.1T: A U-Net exploration, in DepthU_N.o.1T: A U-Net exploration, in Depth
U_N.o.1T: A U-Net exploration, in Depth
 

Viewers also liked

Plan buen viver 178
Plan buen viver 178Plan buen viver 178
Plan buen viver 178Steffy Vivar
 
Bucadores,metetabuscadores y nAVEGADORES
Bucadores,metetabuscadores y nAVEGADORESBucadores,metetabuscadores y nAVEGADORES
Bucadores,metetabuscadores y nAVEGADORESRobertocarlosc
 
Present Situation of Women Empowerment in Bangladesh
Present Situation of Women Empowerment in BangladeshPresent Situation of Women Empowerment in Bangladesh
Present Situation of Women Empowerment in Bangladeshinventionjournals
 
Didáctica de la lengua castellana y la literatura r.bikandi
Didáctica de la lengua castellana y la literatura r.bikandiDidáctica de la lengua castellana y la literatura r.bikandi
Didáctica de la lengua castellana y la literatura r.bikandiLuz Valcarcel
 
Contribution of Tomography Electrical Resistivity in Hydrogeological at the M...
Contribution of Tomography Electrical Resistivity in Hydrogeological at the M...Contribution of Tomography Electrical Resistivity in Hydrogeological at the M...
Contribution of Tomography Electrical Resistivity in Hydrogeological at the M...inventionjournals
 
Las tic y la inclusión educativa
Las tic y la inclusión educativaLas tic y la inclusión educativa
Las tic y la inclusión educativaEvelynreina
 
Public Personnel Performance Appraisal System (PPPAS)
Public Personnel Performance Appraisal System (PPPAS)Public Personnel Performance Appraisal System (PPPAS)
Public Personnel Performance Appraisal System (PPPAS)inventionjournals
 
AGRISSÊNIOR NOTÍCIAS - Nº 599 an 23 novembro_2016.
AGRISSÊNIOR NOTÍCIAS - Nº 599 an 23 novembro_2016.AGRISSÊNIOR NOTÍCIAS - Nº 599 an 23 novembro_2016.
AGRISSÊNIOR NOTÍCIAS - Nº 599 an 23 novembro_2016.Roberto Rabat Chame
 
Functions of a music video
Functions of a music videoFunctions of a music video
Functions of a music videoRR17
 
November 28 december 2
November 28   december 2November 28   december 2
November 28 december 2Lisa Pixley
 
Comparative macroscopic study between Oil extracted Annona seed AlGaInP Laser...
Comparative macroscopic study between Oil extracted Annona seed AlGaInP Laser...Comparative macroscopic study between Oil extracted Annona seed AlGaInP Laser...
Comparative macroscopic study between Oil extracted Annona seed AlGaInP Laser...inventionjournals
 
Brain Derived Neurotrophic Factor increases during recovery from psychologica...
Brain Derived Neurotrophic Factor increases during recovery from psychologica...Brain Derived Neurotrophic Factor increases during recovery from psychologica...
Brain Derived Neurotrophic Factor increases during recovery from psychologica...inventionjournals
 
Note on Sidharth's Unification of Electromagnetism and Gravitation
Note on Sidharth's Unification of Electromagnetism and GravitationNote on Sidharth's Unification of Electromagnetism and Gravitation
Note on Sidharth's Unification of Electromagnetism and Gravitationinventionjournals
 
A Note on Pseudo Operations Decomposable Measure
A Note on Pseudo Operations Decomposable MeasureA Note on Pseudo Operations Decomposable Measure
A Note on Pseudo Operations Decomposable Measureinventionjournals
 
Evaluation Study of National Examination and Student New Admission in Efforts...
Evaluation Study of National Examination and Student New Admission in Efforts...Evaluation Study of National Examination and Student New Admission in Efforts...
Evaluation Study of National Examination and Student New Admission in Efforts...inventionjournals
 

Viewers also liked (20)

Plan buen viver 178
Plan buen viver 178Plan buen viver 178
Plan buen viver 178
 
Bucadores,metetabuscadores y nAVEGADORES
Bucadores,metetabuscadores y nAVEGADORESBucadores,metetabuscadores y nAVEGADORES
Bucadores,metetabuscadores y nAVEGADORES
 
Present Situation of Women Empowerment in Bangladesh
Present Situation of Women Empowerment in BangladeshPresent Situation of Women Empowerment in Bangladesh
Present Situation of Women Empowerment in Bangladesh
 
Didáctica de la lengua castellana y la literatura r.bikandi
Didáctica de la lengua castellana y la literatura r.bikandiDidáctica de la lengua castellana y la literatura r.bikandi
Didáctica de la lengua castellana y la literatura r.bikandi
 
Contribution of Tomography Electrical Resistivity in Hydrogeological at the M...
Contribution of Tomography Electrical Resistivity in Hydrogeological at the M...Contribution of Tomography Electrical Resistivity in Hydrogeological at the M...
Contribution of Tomography Electrical Resistivity in Hydrogeological at the M...
 
Las tic y la inclusión educativa
Las tic y la inclusión educativaLas tic y la inclusión educativa
Las tic y la inclusión educativa
 
Public Personnel Performance Appraisal System (PPPAS)
Public Personnel Performance Appraisal System (PPPAS)Public Personnel Performance Appraisal System (PPPAS)
Public Personnel Performance Appraisal System (PPPAS)
 
AGRISSÊNIOR NOTÍCIAS - Nº 599 an 23 novembro_2016.
AGRISSÊNIOR NOTÍCIAS - Nº 599 an 23 novembro_2016.AGRISSÊNIOR NOTÍCIAS - Nº 599 an 23 novembro_2016.
AGRISSÊNIOR NOTÍCIAS - Nº 599 an 23 novembro_2016.
 
Asma
AsmaAsma
Asma
 
Functions of a music video
Functions of a music videoFunctions of a music video
Functions of a music video
 
TAREA 7
TAREA 7TAREA 7
TAREA 7
 
November 28 december 2
November 28   december 2November 28   december 2
November 28 december 2
 
Comparative macroscopic study between Oil extracted Annona seed AlGaInP Laser...
Comparative macroscopic study between Oil extracted Annona seed AlGaInP Laser...Comparative macroscopic study between Oil extracted Annona seed AlGaInP Laser...
Comparative macroscopic study between Oil extracted Annona seed AlGaInP Laser...
 
The Pink Card
The Pink CardThe Pink Card
The Pink Card
 
Brain Derived Neurotrophic Factor increases during recovery from psychologica...
Brain Derived Neurotrophic Factor increases during recovery from psychologica...Brain Derived Neurotrophic Factor increases during recovery from psychologica...
Brain Derived Neurotrophic Factor increases during recovery from psychologica...
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Note on Sidharth's Unification of Electromagnetism and Gravitation
Note on Sidharth's Unification of Electromagnetism and GravitationNote on Sidharth's Unification of Electromagnetism and Gravitation
Note on Sidharth's Unification of Electromagnetism and Gravitation
 
A Note on Pseudo Operations Decomposable Measure
A Note on Pseudo Operations Decomposable MeasureA Note on Pseudo Operations Decomposable Measure
A Note on Pseudo Operations Decomposable Measure
 
Evaluation Study of National Examination and Student New Admission in Efforts...
Evaluation Study of National Examination and Student New Admission in Efforts...Evaluation Study of National Examination and Student New Admission in Efforts...
Evaluation Study of National Examination and Student New Admission in Efforts...
 
Dn12 u3 a12_sgaa
Dn12 u3 a12_sgaaDn12 u3 a12_sgaa
Dn12 u3 a12_sgaa
 

Similar to DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking

DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...cscpconf
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...IJERA Editor
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...IDES Editor
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfKalyan Anugu
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET Journal
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
 
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDIRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...sipij
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTEditor IJMTER
 
Annotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia SecurityAnnotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia SecurityBrenda Higgins
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...ijcisjournal
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...ijcisjournal
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...ijcisjournal
 

Similar to DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking (20)

DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUA...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
 
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
A New Watermarking Algorithm Based on Image Scrambling and SVD in the Wavelet...
 
20120140505013
2012014050501320120140505013
20120140505013
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
 
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD TechniquesIRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVDWatermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
 
A0360105
A0360105A0360105
A0360105
 
Secured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWTSecured Video Watermarking Based On DWT
Secured Video Watermarking Based On DWT
 
Annotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia SecurityAnnotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia Security
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptib...
 
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
MULTIPLE IMAGE WATERMARKING BASED ON SVD : IMPROVING CAPACITY AND IMPERCEPTIB...
 
50120140506015
5012014050601550120140506015
50120140506015
 
Watermarkingppt
WatermarkingpptWatermarkingppt
Watermarkingppt
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org ||Volume 5 Issue 11|| November 2016 || PP.61-65 www.ijesi.org 61 | Page DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking Mukul Y. Kantharia 1 , Nikhil P. Patel2 1 (EC Department, B & B Institute of Technology /GTU, India) 2 (EC Department, B & B Institute of Technology /GTU, India) Abstract: Secured access to the Internet and data resources has a high impact in defense system. This dependency has brought many threats to information security. As aresult, reliably secure mechanisms are required to protect most untold and blueprint of defenseinformation against vulnerabilities like ID spoofing and unauthorized access to top most system of country. In this paper, we proposed algorithm based on audio watermarking using DWT-SVD algorithm with visually crypted image message. The army people may have access to listen radio and communicate through walkie talkie which is audio format data. In proposed work we are hiding visually crypted image massage in audio file which may decrypted by proving shared image and extracted watermark image without affecting original audio. We did comparative analysis of various attacks on audio file after watermarking and calculated robustness and SNR value to support out work. Keywords- SVD, DWT, VC, SNR, Robustness, Audio watermarking I. Introduction Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. One of the best-known techniques has been credited to Moni Naor and Adi Shamir, who developed it in 1994. They demonstrated a visual secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n1 shares revealed no information about the original image. Each share was printed on a separate transparency, and decryption was performed by overlaying the shares. When all n shares were overlaid, the original image would appear. Applications that take full advantage of such simple yet secure scheme[1] . Audio Watermarking is a watermarking technique in which left and right channel of audio file is modified based on watermark object (visually crypted image). Discrete wavelet transform is used to find lowest frequency region of audio file. After that lowest frequency part (LL) region may processed with singular vector decomposition (SVD). Low frequency region having least information of object so we can modify singular part of decomposed vector for embedding the watermarked bit. II. Visual Cryptography with Dwt-SVD Audio Watermarking 1.1 Visual Cryptography Visual Cryptography Scheme (VCS) is an encryption method that usescombinatorial techniques to encode secret text message. The idea is to convert the text massage into an image and encode this image into ‘N’ twilight images. Thedecoding only requires only selecting some subset of these ‘N’ images, making intensity of hidden part of them, and stacking them on top of each other. In this Paper,we will provide the readers an overview of the basic VCS constructions, as well asseveral extended work in the area for audio watermarking purpose. In addition, we also review several techniques with improved VCS (by selecting Exor and Exnor operation in random manner) that take full advantage of such simple yet secure scheme.The simplest Visual Cryptography Scheme is given by the following setup. Asecret image consists of a collection of dark(0) and bright(1) pixels where each pixel isprocessed independently. To encode the secret, we divide the original image into n modifiedversions (referred as shares) such that each pixel in a share now subdivides into m darkand bright sub- pixels. To decode the image, we simply pick a subset S of those n sharesand copy each of them onto a transparency. If S is a "qualified" subset, then stackingall these transparencies will allow visual recovery of the secret. Fig. 2.1 VCS scheme[1]
  • 2. DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking www.ijesi.org 62 | Page Figure 2.2 provides anexample of such construction. Suppose the secret image "GCET Engineering College" is divided into 4 shares,which is denoted by Ǿ={1,2,3,4} and that the qualified sets are all subsets of {1,2},{2,3} and {3,4}.Then the qualified sets are exactly the following: Гqual = {{1,2},{2,3},{3,4},{1,2,3},{2,3,4},{1,3,4},{1,2,3,4}}………(2.1) Fig 2.2 (a) Original Image (b),(c) Generated Shared image after VCS, (d) Recovered image from generated shares 1.2 Audio Watermarking with SVD-DWT The DWT will be used to find extreme low frequency region so after embedding least number of audio content may be unaffected. In our paper , we proposed 3 level DWT for better imperceptible and robustness. The four level DWT is shown in Fig. 2.3. Fig. 2.3 Three Level DWT decomposition [2] SVD is used to find singular vector of decomposed dwt vector. Proposed work is changing diagonal s value of s matrix to embedded watermark image bit (after VCS). Table 2.1 S matrix formation S11 0 0 0 0 S22 0 0 0 0 S33 0 0 0 0 S44 III. Proposed Work The proposed system having two basic parts, first one is Visual Cryptography of Secrete image and the will forward for audio watermarking. Fig 3.1 Watermark Embedding System.
  • 3. DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking www.ijesi.org 63 | Page In Embedding system, secrete image will firstly have processed for visual cryptography scheme, based on VCS scheme share 1 and share 2 of secrete image is available for next procedure. Each share part in now independently processed with Audio watermarking method based on improved DWT-SVD algorithm (proposed by Al. Haj) with slight modification in extraction part. The audio file is rearranging in to finite block structure for processed with discrete wavelet transformation(DWT). In proposed work, 4-level DWT was processed to get less informative part of audio signal in terms of most low frequency part of audio file so after watermarking main audio file is least changed will reflect best SNR. Components of DWT is now processed with Singular vector decomposition (SVD) to obtain S matrix. Modification of S matrix is taken place based on watermarked image bits (algorithm 1). Last step of algorithm is to take inverse SVD and then Inverse DWD to obtain audio watermarked file with secrete visually encrypted image. {both share images are passed through this process} Algorithm 1 (Embedding Procedure) for both share1 & share2 --------------------------------------------------------------------------------------------------------------------------------------- I. Input Secrete image II. Apply VCS system to get Share1(s1) & Share2(s2)& reform images in to vector form. (1x N) III. Take Audio file (Mx2)- Left and RightChannel Part { [a,s]=audioread(‘name.mp3’). IV. Divide Audio file in to finite blocks (15000 sample value/block taken) V. Find DWT of selected block. ([da,db]=wavedec2(block)) and reform D matrix. [3] VI. Process D matrix for SVD decomposition. ([U, S, V]=svd(D)]. VII. Modify S value based on watermark image bits i.e. Snew= Wn + α * S (Wn: Image bit n, α: intensity of watermark) VIII. Find inverse SVD ( U * Snew * VT ) and its inverse DWT(waverec). (Final Audio File with Watermarked Image). To get Encrypted image back we have to segregate audio file which we got after embedding process. Fig. 3.2 is related with segregation of watermarked audio. Fig 3.2 Watermark Segregation/Extraction System. The Watermarked audio file is firstlydivided in to finite block for processing for discrete wavelet transformation. The formatted D matrix is now processed for SVD decomposition for watermark extraction process. Based on New S matrix value and old S(S vector of Extraction process), we may find watermarked image bits(Wn) by implementing equation 3.1. 1, if 1 Sold W n Snew   (3.1) 0, if 1 S o ld W n S n ew   We can get both shares using same process and both shares are now passed through visual DE cryptographic process by use of Ex-OR or Ex-NOR gate operation based on defined schemes. Output of that process is our hidden secrete image behind audio file.
  • 4. DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking www.ijesi.org 64 | Page Algorithm 2 (Segregation/Extraction Process) --------------------------------------------------------------------------------------------------------------------------------------- I. Input watermarked audio file. II. Divide Audio file in to finite blocks (15000 sample value/block taken) III. Find DWT of selected block. ([da,db]=wavedec2(block)) and reform D matrix. [3] IV. Process D matrix for SVD decomposition. ([U, Snew, V]=svd(D)]. V. Find Wn value based on Equation 3.1. VI. Reshape Wn (1 x N) vector into Matrix Image for display. (both shares) VII. Do Ex-Oring or Ex-Nor operation using both shares which reforms original image. IV. Results And Discussion Robustness and SNR value is calculated based on Equation 4.1 and 4.2 [3] 1 0 2 1 ' 2 1 ( ) 1 0 lo g ; , ' (A ) n i n i A S N R d b A o rig in a lA u d io A W a term a rked A u d io A         (4.1) 1 2 2 1 1 ' (W n , ') ; , ' ' n i i i n n i i i i W n W n W n W n O rig in a lW a term a rkb it W n E xtra cted B it W n X W n           (4.2) For results and comparative analysis, we had considered so many attacks like ECHO, Cropping and Amplifying on watermarked audio file. Table 4.1 shows comparative analysis of such attacks with robustness and SNR values. Table 4.1 Comparative analysis of Robustness value and SNR for Different attacks. Attacks 0.1  0.2  0.3  Cropping ρ = 1 , SNR= 76.7 ρ = 1, SNR= 68.7 ρ = 1, SNR= 66.90 Amplify ρ =1, SNR= 78.9 ρ = 1. SNR= 78.9 ρ = 1, SNR= 65.29 Echo ρ = 0.95. SNR= 72.9 ρ = 0.95. SNR= 68.57 ρ = 0.95, SNR= 64.19 Bass Boost ρ = 0.96, SNR= 73.2 ρ = 0.96. SNR= 68.86 ρ = 1, SNR= 64.11 AWGN Noise ρ = 1, SNR= 74.2 ρ = 1, SNR= 68.29 ρ = 1, SNR= 60.19 Random Noise ρ = 1, SNR= 70.1 ρ = 1, SNR= 67.69 ρ = 1, SNR= 62.45 4.1 Results Fig. 4.1 Results of DWT-SVD based Audio watermarking image (VCS output) and Reconstruction
  • 5. DWT-SVD Based Visual Cryptography Scheme for Audio Watermarking www.ijesi.org 65 | Page V. Conclusion Digital Audio watermarking has its own advantages to protect copyright content on internet or elsewhere. Our Aim in this proposed work is simply focused on defense system for military protected, surveillance area to communicate in secured and safe manner. Hiding digital text / image data in audio file is more challenging as audio file is vector format and image is matrix (array structure). In further security, we deploy visualcryptography concept in DWT-SVD based robust method for perfect & secured communication system for army. Beauty of this algorithm is one can send encrypted message via radio broadcasting without any special military equipment. We have checked robustness and SNR value for all attacks with comparative analysis. In future one can focus on improvement of visual cryptography algorithm along with DWT-SVD Algorithm. References Journal Papers: [1] F. Liu, C.K. Wu, X.J. Lin , Color visual cryptography schemes,IET Information Security, 2(4), 2008, 151 – 165. [2] Ali Al-Haj, An imperceptible and robust audio watermarking algorithm, EURASIP Journal on Audio, Speech, and Music Processing (Springer journal), 2014. [3] Khalid A. Darabkh, Imperceptible and Robust DWT-SVD-Based Digital Audio Watermarking Algorithm, Journal of Software Engineering and Applications, 7,2014, 859-871. [4] M. Naor and A. Shamir, Visual cryptography II: improving the contrast via the cover base, in "Security Protocols", M. Lomas, ed., Lecture Notes in Computer Science ,1189 ,1997,, 197-202. [5] K Bhat, I Sengupta, A Das, An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digital Signal Process. 20, 2010, 1547–1558. [6] M Hsieh, D Tseng, Y Huang, Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans. Ind. Electron.m 48(5),2001, 875–882.