SlideShare a Scribd company logo
1 of 4
Download to read offline
Audio Watermarking with Encryption
John Britto
Student, SPIT
Mumbai, India
M.Mani Roja
Professor, TSEC
Mumbai, India
Abstract—Watermarking is an effective means of hiding data,
thereby protecting the data from unauthorized or unwanted
viewing. Watermarks have been proposed previously as a way for
protecting the data. This digital signature could discourage
copyright violation, and may help determine the authenticity and
ownership of an image. In this paper, audio watermarking is
done with the help of Discrete Fourier Transform (DFT). To
enhance the security of the watermark, pseudo noise (PN) based
encryption is used.
Keywords—Water Marking; DFT; Encryption; PN sequence;
MSE
I. INTRODUCTION
Watermarking is “the practice of imperceptibly altering a
Work to embed a message about that Work” [1].
Watermarking is becoming increasingly popular, especially for
insertion of undetectable identifying marks, such as author or
copyright information to the host signal. Watermarking may
probably be best used in conjunction with another data-hiding
method such as steganography, cryptography etc. Such data
hiding schemes, when coupled with watermarking, can be a
part of an extensive layered security approach.
Audio watermarking is defined as secure communication
of data related to the host audio signal, which includes
embedding into, and extraction from, the host audio signal”
[2]. Watermarking, being ideally imperceptible, can be
essentially used to mask the very existence of the secret
message [3]. In this manner, watermarking is used to create a
covert channel to transmit confidential information [4]. Digital
audio watermarking involves the concealment of data within a
discrete audio file.
II. PROPOSED BLOCK DIAGRAM
Audio watermarking will be implemented using the
following steps
 Read the secret data to be hidden.
 Encrypt the secrete data using PN sequence
 Read the audio signal in which data is to be hidden.
 Take DFT of the audio signal
 Hide the data in the audio at the High frequency DFT
coefficients.
 Take IDFT
The proposed block diagram for audio watermarking is shown
in fig 1.
Figure 1: Watermarking Embedding
The block diagram for watermark extraction is shown in fig 2.
Figure 2: Watermarking Extraction
The extraction of hidden data at the receiver will be
implemented using the following steps
 Read the received Audio
 Find DFT
 Extract the watermark from the high frequency DFT
coefficients
 Decrypt the watermark
A. Audio Input
MATLAB® audio support provides the ability to:
 Read and write audio files in common formats such
as WAV, AVI, FLAC, MP3, and MPEG-4 AAC
 Playback and record audio files using the PC sound
card
In this research, an audio file with .wav extension is
considered as cover data and sampled at a rate of 44.1 kHz
with 16 bit analog to digital converter.
B. Discrete Fourier Transform [5,6]
The Fourier transform is simply a method of expressing a
function in terms of the sum of its projections onto a set of
basis functions. The DFT is a specific kind of discrete
transform, used in Fourier analysis. It transforms one function
into another, which is called the frequency domain
representation, or simply the DFT, of the original function
(which is often a function in the time domain). The DFT
requires an input function that is discrete.
The DFT transforms N complex numbers into another
sequence of complex numbers, which is defined by F(k) where
k=1,1 …N-1
Secrete Image Encryption
Audio Input DFT Water
Marking
IDFT
O/P
Audio Input DFT Image
Retrieval
Decryption
Audio Output
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
http://www.ijert.org
IJERTV6IS090174
(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by :
www.ijert.org
Vol. 6 Issue 09, September - 2017
344





1
0
2
)
(
)
(
N
n
N
kn
j
e
n
f
k
F

(1)
The inverse Fourier Transform can be calculated using the
following equation.




1
0
2
)
(
1
)
(
N
n
N
kn
j
e
k
F
N
n
F

(2)
C. Water mark Selection
Audio Watermarking can be implemented in 3 ways:
 Audio in Audio
 Audio in Image
 Image in Audio
D. Need for Encryption[7,8]
Encryption is the process of transforming data into
scrambled unintelligible cipher text using a key. The role of
encryption is to secure information when it is stored or in
transit. However, it is relatively easier to crack single level
encryption by brute force or correlation, as compared to a
multi-level encryption scheme. Over the years, Data
transmission has been made very simple, fast and accurate
using the internet. However, one of the main problems
associated with transmission of data over the internet is that it
may pose a security threat, i.e., personal or confidential data
can be stolen or hacked in many ways. Therefore, it becomes
very important to take data security into consideration, as it is
one of the essential factors that need attention during the
process of data distribution.
Cryptography gained prominence during the Second World
War when the allied forces gained an upper hand after they
were able to break the German cipher machine, Enigma [9].
These days, it is recognized as one of the major components
for providing information security, controlling access to
resources and financial transactions. The original data to be
transmitted is called plain text which is readable by a person or
computer. When it is encrypted, it is known as Cipher Text.
The level of security of an encryption algorithm is given by
the size of its key space [10]. The larger the key space, the
more complicated the encryption algorithm is.
Cryptography keys are usually classified as symmetric and
asymmetric algorithms. In symmetric key algorithms, the
sender and receiver use the same keys for encryption as well
as decryption. Symmetric key encryption is also known as
secret key as both, the sender and receiver have to keep the
key protected [7,10]. The level of security entirely depends on
how well the sender and the receiver keep the key protected. If
the unauthorized person is able to get the key, he can easily
decipher the encryption using it. This is the major limitation of
the symmetric key algorithm.
In symmetric key encryption, a secure mechanism is
required to deliver keys properly while asymmetric keys result
in better key distribution. Symmetric key provides
confidentiality but not authenticity as the secret key is shared
[8]. Asymmetric keys on the other hand, provide both
authentication and confidentiality [7, 8].
III. IMPLEMENTATION
The input, i.e., spectrum of the original audio signal from the
song “Maa Tujhe Salam” has been considered as cover audio.
The “cameraman image from MATLAB directory is
considered as watermark. The cover audio undergoes Discrete
Fourier Transform and got converted back into frequency
domain. The maximum energy components lie near the origin
and low energy components lie at higher frequencies. Hence it
has been decided to embed the watermark in the high
frequency components of cover audio.
A. Need for Normalization
Since the cover signal is the audio signal, the amplitude
variations are within ±1V. Watermark is a grey level image
with 256 quantization levels where the pixels values lies
within the range [0, 255]. Hence it is necessary to normalize
the grey values within ±1 V so that without affecting the
magnitude spectrum, the stuffing of grey values can be
implemented.
B. Z - Score (ZS) Normalization[11]
Z-score normalization calculates the normalized scores
using arithmetic mean and standard deviation of the given
data. This method transforms the score ‘s’ to a distribution
with mean ‘0’ and a deviation of 1. Let mean (s) denote the
arithmetic mean of score range and std (s) denote the standard
deviation operators, respectively. Then the normalized score
(N) is calculated as
)
(
)
(
s
std
s
mean
s
N


(3)
After normalization, the high frequency components of
cover audio are replaced with normalized values of watermark
pixel grey values. After completing the process, IDFT is taken
for the combined data so that the signal comes back to time
domain. This signal almost resembles the original signal as
shown in fig.3.
For the extraction of the watermark, the DFT of the
received audio has been taken and from the high frequency
components, the watermark gets extracted as shown in fig.3
C. PN sequence based Encryption[13]
PN sequences look like random noise but they are not
purely random in nature. When we multiply the PN sequence
with an image, the resulting image resembles noise. However,
during decryption, this noise-like signal can be used to exactly
reconstruct the original image by multiplying it by the same
pseudorandom sequence. Using this scheme, the initial seed
state which is nothing but the key is only needed to generate
exactly the same sequence of length. We have decided the
following algorithm to generate the seed state for the PN
sequence generator.
 Decide the password.
 Generate the seed state from the password
Since the seed state is known only to the authorized user,
an intruder trying to access the database will not be able to
decrypt the templates.
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
http://www.ijert.org
IJERTV6IS090174
(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by :
www.ijert.org
Vol. 6 Issue 09, September - 2017
345
Figure 3. Watermark Extraction
The encryption scheme using PN sequence is done as
given below [13]:
 Let the watermark be image K
 Generate the Pseudo image R using the seed state.
The size of R image should be same as image K
 Do the bit Ex-OR operations on both the images and
find out the resultant image C as
C= bit XOR(R, K) (4)
The decryption scheme using PN sequence is done with the
help of following steps [13]:
 Generate the Pseudo image R using the seed state.
The size of R image should be same as extracted
image C
 Do the bit Ex-OR operations on both the images R
and C
 The watermark is extracted as
W= bit XOR(R, C) (5)
The watermarked image is encrypted using PN sequence
and the resultant encrypted image is transmitted to the receiver
along with cover audio. At the receiver side, first the encrypted
watermark is extracted from the cover audio and then
decryption using PN sequence is done on the extracted image
as shown in fig.4
Figure 4: Encrypted Watermark extraction
IV. RESULT ANALYSIS
For all practical purposes, it is preferable to have a
quantitative measurement to provide an objective judgment of
the extracting fidelity. This is done by calculating the
following parameters in each case. Results, thus obtained,
have been tabulated. For performance evaluation, an audio
clipping with one minute duration is considered as cover data.
A. Mean Square Error
Mean Square Error (MSE) [14], first introduced by C. F.
Gauss, serves as an important parameter in gauging the
performance of the watermarking system. MSE is essentially a
signal fidelity measure [15, 16]. The goal of a signal fidelity
measure is to compare two signals by providing a quantitative
score that describes the degree of similarity/fidelity. Suppose
that
x = {xi | i = 1, 2, N} and
y = {yi| i = 1, 2, N} are two finite-lengths, discrete
signals, The MSE between the signals are given by the
following formula:




N
i
i
i Y
X
N
MSE
1
2
)
(
1 (6)
where, N is the number of signal samples, xi is the value of the
ith
sample in x. yi is the value of the ith
sample in y.
B. Entropy
The entropy H of a discrete random variable X is given as
))
(
(
)
( x
I
E
x
H  (7)
Here ‘E’ is the expected value, and ‘I’ is the information
content of X. If ‘p’ denotes the probability mass function of X
then the entropy can be explicitly written as:
)
(
log
)
(
)
(
)
(
)
( 2
1
1
i
n
i
i
i
n
i
i x
p
x
p
x
I
x
p
x
H 
 




(8)
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
http://www.ijert.org
IJERTV6IS090174
(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by :
www.ijert.org
Vol. 6 Issue 09, September - 2017
346
C. Moment
In image processing, computer vision and related fields, an
image moment is a certain particular weighted average
(moment) of the image pixels intensities, or a function of such
moments, usually chosen to have some attractive property or
interpretation. For a gray scale image with pixel intensities I(x,
y), raw image moments are calculated by:
)
,
( y
x
I
y
x
M j
x y
i
ij 
 (9)
Table I. Performance Evaluation (1minute audio)
Parameter Simple
Watermark
Encrypted
watermark
Entropy 7 7
Moment 9
10
17
.
1  9
10
17
.
1 
MSE 0 0
Embedding Time 1.16s 1.49s
Extraction Time 0.18s 0.77s
MSE in Audio 4
10
2
.
2  4
10
11
.
5 
V. CONCLUSION
In this paper, an audio watermarking scheme based on
Discrete Fourier Transform has been implemented. To
enhance the security of the system, A PN sequence based
encryption has also been considered. The proposed algorithms
were implemented using MATLAB 2010a on an Intel core i3
based platform. For a cover audio of size one minute, the
average time taken for extraction simple watermarking with an
image of size 256 × 256 was 0.18 seconds and 0.77 seconds
using the PN sequence scheme. In terms of performance, the
calculated values of MSE, entropy and moment are found to
be the same for both the schemes. Since the MSE between
original audio and watermarked audio was very high, the
clarity of the audio at the receiver decreased. As a future
scope, this MSE can be reduced with the help of some other
watermarking techniques.
REFERENCES
[1] I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital
Watermarking and Steganography, 2nd Edition, Morgan Kaufmann,
2008, p. 31
[2] N. Cvejic, Academic Dissertation, Faculty of Technology, University of
Oulu, “Algorithms for audio watermarking and steganography,” p. 5.
[3] S. Shiyamala and Dr. V. Rajamani, “A Novel Area Efficient Folded
Modified Convolutional Interleaving Architecture for MAP Decoder,”
International Journal of Computer Applications (IJCA), Vol. 9, No. 9, p.
1, November 2010.
[4] Shahreza S.S. and Shalmani M.T.M., “Adaptive wavelet domain audio
steganography with high capacity and low error rate,” Proceedings of the
IEEE International Conference on Information and Emerging
Technologies, (ICIET„07), pp. 1729-1732, 2007.
[5] Rafel C.Gonzalez and Richard Woods, “Digital Image Processing,” 9th
edition, Printice Hall, NewYork, September, 2009.
[6] Anil Jain, “Fundamentals of Image Processing,” 4th edition, Pearson
publications, 2002.
[7] Aman Chadha, Sandeep Gangundi, Rishabh Goel, Hiren Dave, M. Mani
Roja,“ Audio Watermarking with Error Correction”, (IJACSA)
International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 9, 2011
[8] William Stallings, “Cryptography and Network Security,” Pearson
Education, 5th edition, 2011.
[9] D. Kahn, “Cryptography Goes Public”, IEEE Communications
Magazine, Vol. 18, 19–28, 1980.
[10] G. White, “All-in-One Security+ Certification Exam Guide”, McGraw-
Hill, 2003
[11] Anil Jain, Karthik Nandakumar and Arun Ross, “Score normalization in
Multimodal Biometric Systems,” Pattern Recognition, vol.38, no.12,
pp.2270 – 2285, 2005.
[12] R. Mutagi, "Pseudo Noise Sequences for Engineers," Electronics &
Communication Engineering Journal, vol.8, no.2, pp.79-87, April, 1996.
[13] L. Trevisan, "CS276 Lecture 5: Encryption Using Pseudorandom
Functions", (in theory), [online] 2009, https://lucatrevisan.
wordpress.com/2009/02/13/cs276lecture-5-encryption-using-
pseudorandom-functions/ (Accessed: 8 February 2015).
[14] Z. Wang and A. C. Bovik, “Mean squared error: love it or leave it? - A
new look at signal fidelity measures,” IEEE Signal Processing
Magazine, Vol. 26, No. 1, pp. 98-117, January 2009.
[15] G. Casella and E.L. Lehmann, Theory of Point Estimation. New York:
Springer-Verlag, 1999.
[16] T. N. Pappas, R. J. Safranek and J. Chen, “Perceptual criteria for image
quality evaluation,” in Handbook of Image and Video Processing, 2nd
ed.,
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
http://www.ijert.org
IJERTV6IS090174
(This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by :
www.ijert.org
Vol. 6 Issue 09, September - 2017
347

More Related Content

Similar to audio-watermarking-with-encryption-IJERTV6IS090174.pdf

DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcscpconf
 
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingTELKOMNIKA JOURNAL
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...AM Publications,India
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at restijccsa
 
A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE neirew J
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...IRJET Journal
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarkingSaurabh Kaushik
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust ChannelsIRJET Journal
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...IAEME Publication
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
IRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET Journal
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
 

Similar to audio-watermarking-with-encryption-IJERTV6IS090174.pdf (20)

DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at rest
 
A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
IRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based Steganography
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 

More from Kalyan Anugu

FINAL DOCUMENT Abs (Autosaved).pdf
FINAL DOCUMENT Abs (Autosaved).pdfFINAL DOCUMENT Abs (Autosaved).pdf
FINAL DOCUMENT Abs (Autosaved).pdfKalyan Anugu
 
E&HV DIGITAL NOTES.pdf
E&HV DIGITAL NOTES.pdfE&HV DIGITAL NOTES.pdf
E&HV DIGITAL NOTES.pdfKalyan Anugu
 
73633714-E-Waste-Report-Final.pdf
73633714-E-Waste-Report-Final.pdf73633714-E-Waste-Report-Final.pdf
73633714-E-Waste-Report-Final.pdfKalyan Anugu
 
234793275-Aluminum-Electrolytic-Capacitors.pdf
234793275-Aluminum-Electrolytic-Capacitors.pdf234793275-Aluminum-Electrolytic-Capacitors.pdf
234793275-Aluminum-Electrolytic-Capacitors.pdfKalyan Anugu
 
76832073-3d-Machine-Vision-Systems.doc
76832073-3d-Machine-Vision-Systems.doc76832073-3d-Machine-Vision-Systems.doc
76832073-3d-Machine-Vision-Systems.docKalyan Anugu
 

More from Kalyan Anugu (6)

FINAL DOCUMENT Abs (Autosaved).pdf
FINAL DOCUMENT Abs (Autosaved).pdfFINAL DOCUMENT Abs (Autosaved).pdf
FINAL DOCUMENT Abs (Autosaved).pdf
 
E&HV DIGITAL NOTES.pdf
E&HV DIGITAL NOTES.pdfE&HV DIGITAL NOTES.pdf
E&HV DIGITAL NOTES.pdf
 
73633714-E-Waste-Report-Final.pdf
73633714-E-Waste-Report-Final.pdf73633714-E-Waste-Report-Final.pdf
73633714-E-Waste-Report-Final.pdf
 
234793275-Aluminum-Electrolytic-Capacitors.pdf
234793275-Aluminum-Electrolytic-Capacitors.pdf234793275-Aluminum-Electrolytic-Capacitors.pdf
234793275-Aluminum-Electrolytic-Capacitors.pdf
 
Diamond.pdf
Diamond.pdfDiamond.pdf
Diamond.pdf
 
76832073-3d-Machine-Vision-Systems.doc
76832073-3d-Machine-Vision-Systems.doc76832073-3d-Machine-Vision-Systems.doc
76832073-3d-Machine-Vision-Systems.doc
 

Recently uploaded

Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 

Recently uploaded (20)

Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service PuneVIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Kirti 8617697112 Independent Escort Service Pune
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 

audio-watermarking-with-encryption-IJERTV6IS090174.pdf

  • 1. Audio Watermarking with Encryption John Britto Student, SPIT Mumbai, India M.Mani Roja Professor, TSEC Mumbai, India Abstract—Watermarking is an effective means of hiding data, thereby protecting the data from unauthorized or unwanted viewing. Watermarks have been proposed previously as a way for protecting the data. This digital signature could discourage copyright violation, and may help determine the authenticity and ownership of an image. In this paper, audio watermarking is done with the help of Discrete Fourier Transform (DFT). To enhance the security of the watermark, pseudo noise (PN) based encryption is used. Keywords—Water Marking; DFT; Encryption; PN sequence; MSE I. INTRODUCTION Watermarking is “the practice of imperceptibly altering a Work to embed a message about that Work” [1]. Watermarking is becoming increasingly popular, especially for insertion of undetectable identifying marks, such as author or copyright information to the host signal. Watermarking may probably be best used in conjunction with another data-hiding method such as steganography, cryptography etc. Such data hiding schemes, when coupled with watermarking, can be a part of an extensive layered security approach. Audio watermarking is defined as secure communication of data related to the host audio signal, which includes embedding into, and extraction from, the host audio signal” [2]. Watermarking, being ideally imperceptible, can be essentially used to mask the very existence of the secret message [3]. In this manner, watermarking is used to create a covert channel to transmit confidential information [4]. Digital audio watermarking involves the concealment of data within a discrete audio file. II. PROPOSED BLOCK DIAGRAM Audio watermarking will be implemented using the following steps  Read the secret data to be hidden.  Encrypt the secrete data using PN sequence  Read the audio signal in which data is to be hidden.  Take DFT of the audio signal  Hide the data in the audio at the High frequency DFT coefficients.  Take IDFT The proposed block diagram for audio watermarking is shown in fig 1. Figure 1: Watermarking Embedding The block diagram for watermark extraction is shown in fig 2. Figure 2: Watermarking Extraction The extraction of hidden data at the receiver will be implemented using the following steps  Read the received Audio  Find DFT  Extract the watermark from the high frequency DFT coefficients  Decrypt the watermark A. Audio Input MATLAB® audio support provides the ability to:  Read and write audio files in common formats such as WAV, AVI, FLAC, MP3, and MPEG-4 AAC  Playback and record audio files using the PC sound card In this research, an audio file with .wav extension is considered as cover data and sampled at a rate of 44.1 kHz with 16 bit analog to digital converter. B. Discrete Fourier Transform [5,6] The Fourier transform is simply a method of expressing a function in terms of the sum of its projections onto a set of basis functions. The DFT is a specific kind of discrete transform, used in Fourier analysis. It transforms one function into another, which is called the frequency domain representation, or simply the DFT, of the original function (which is often a function in the time domain). The DFT requires an input function that is discrete. The DFT transforms N complex numbers into another sequence of complex numbers, which is defined by F(k) where k=1,1 …N-1 Secrete Image Encryption Audio Input DFT Water Marking IDFT O/P Audio Input DFT Image Retrieval Decryption Audio Output International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 http://www.ijert.org IJERTV6IS090174 (This work is licensed under a Creative Commons Attribution 4.0 International License.) Published by : www.ijert.org Vol. 6 Issue 09, September - 2017 344
  • 2.      1 0 2 ) ( ) ( N n N kn j e n f k F  (1) The inverse Fourier Transform can be calculated using the following equation.     1 0 2 ) ( 1 ) ( N n N kn j e k F N n F  (2) C. Water mark Selection Audio Watermarking can be implemented in 3 ways:  Audio in Audio  Audio in Image  Image in Audio D. Need for Encryption[7,8] Encryption is the process of transforming data into scrambled unintelligible cipher text using a key. The role of encryption is to secure information when it is stored or in transit. However, it is relatively easier to crack single level encryption by brute force or correlation, as compared to a multi-level encryption scheme. Over the years, Data transmission has been made very simple, fast and accurate using the internet. However, one of the main problems associated with transmission of data over the internet is that it may pose a security threat, i.e., personal or confidential data can be stolen or hacked in many ways. Therefore, it becomes very important to take data security into consideration, as it is one of the essential factors that need attention during the process of data distribution. Cryptography gained prominence during the Second World War when the allied forces gained an upper hand after they were able to break the German cipher machine, Enigma [9]. These days, it is recognized as one of the major components for providing information security, controlling access to resources and financial transactions. The original data to be transmitted is called plain text which is readable by a person or computer. When it is encrypted, it is known as Cipher Text. The level of security of an encryption algorithm is given by the size of its key space [10]. The larger the key space, the more complicated the encryption algorithm is. Cryptography keys are usually classified as symmetric and asymmetric algorithms. In symmetric key algorithms, the sender and receiver use the same keys for encryption as well as decryption. Symmetric key encryption is also known as secret key as both, the sender and receiver have to keep the key protected [7,10]. The level of security entirely depends on how well the sender and the receiver keep the key protected. If the unauthorized person is able to get the key, he can easily decipher the encryption using it. This is the major limitation of the symmetric key algorithm. In symmetric key encryption, a secure mechanism is required to deliver keys properly while asymmetric keys result in better key distribution. Symmetric key provides confidentiality but not authenticity as the secret key is shared [8]. Asymmetric keys on the other hand, provide both authentication and confidentiality [7, 8]. III. IMPLEMENTATION The input, i.e., spectrum of the original audio signal from the song “Maa Tujhe Salam” has been considered as cover audio. The “cameraman image from MATLAB directory is considered as watermark. The cover audio undergoes Discrete Fourier Transform and got converted back into frequency domain. The maximum energy components lie near the origin and low energy components lie at higher frequencies. Hence it has been decided to embed the watermark in the high frequency components of cover audio. A. Need for Normalization Since the cover signal is the audio signal, the amplitude variations are within ±1V. Watermark is a grey level image with 256 quantization levels where the pixels values lies within the range [0, 255]. Hence it is necessary to normalize the grey values within ±1 V so that without affecting the magnitude spectrum, the stuffing of grey values can be implemented. B. Z - Score (ZS) Normalization[11] Z-score normalization calculates the normalized scores using arithmetic mean and standard deviation of the given data. This method transforms the score ‘s’ to a distribution with mean ‘0’ and a deviation of 1. Let mean (s) denote the arithmetic mean of score range and std (s) denote the standard deviation operators, respectively. Then the normalized score (N) is calculated as ) ( ) ( s std s mean s N   (3) After normalization, the high frequency components of cover audio are replaced with normalized values of watermark pixel grey values. After completing the process, IDFT is taken for the combined data so that the signal comes back to time domain. This signal almost resembles the original signal as shown in fig.3. For the extraction of the watermark, the DFT of the received audio has been taken and from the high frequency components, the watermark gets extracted as shown in fig.3 C. PN sequence based Encryption[13] PN sequences look like random noise but they are not purely random in nature. When we multiply the PN sequence with an image, the resulting image resembles noise. However, during decryption, this noise-like signal can be used to exactly reconstruct the original image by multiplying it by the same pseudorandom sequence. Using this scheme, the initial seed state which is nothing but the key is only needed to generate exactly the same sequence of length. We have decided the following algorithm to generate the seed state for the PN sequence generator.  Decide the password.  Generate the seed state from the password Since the seed state is known only to the authorized user, an intruder trying to access the database will not be able to decrypt the templates. International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 http://www.ijert.org IJERTV6IS090174 (This work is licensed under a Creative Commons Attribution 4.0 International License.) Published by : www.ijert.org Vol. 6 Issue 09, September - 2017 345
  • 3. Figure 3. Watermark Extraction The encryption scheme using PN sequence is done as given below [13]:  Let the watermark be image K  Generate the Pseudo image R using the seed state. The size of R image should be same as image K  Do the bit Ex-OR operations on both the images and find out the resultant image C as C= bit XOR(R, K) (4) The decryption scheme using PN sequence is done with the help of following steps [13]:  Generate the Pseudo image R using the seed state. The size of R image should be same as extracted image C  Do the bit Ex-OR operations on both the images R and C  The watermark is extracted as W= bit XOR(R, C) (5) The watermarked image is encrypted using PN sequence and the resultant encrypted image is transmitted to the receiver along with cover audio. At the receiver side, first the encrypted watermark is extracted from the cover audio and then decryption using PN sequence is done on the extracted image as shown in fig.4 Figure 4: Encrypted Watermark extraction IV. RESULT ANALYSIS For all practical purposes, it is preferable to have a quantitative measurement to provide an objective judgment of the extracting fidelity. This is done by calculating the following parameters in each case. Results, thus obtained, have been tabulated. For performance evaluation, an audio clipping with one minute duration is considered as cover data. A. Mean Square Error Mean Square Error (MSE) [14], first introduced by C. F. Gauss, serves as an important parameter in gauging the performance of the watermarking system. MSE is essentially a signal fidelity measure [15, 16]. The goal of a signal fidelity measure is to compare two signals by providing a quantitative score that describes the degree of similarity/fidelity. Suppose that x = {xi | i = 1, 2, N} and y = {yi| i = 1, 2, N} are two finite-lengths, discrete signals, The MSE between the signals are given by the following formula:     N i i i Y X N MSE 1 2 ) ( 1 (6) where, N is the number of signal samples, xi is the value of the ith sample in x. yi is the value of the ith sample in y. B. Entropy The entropy H of a discrete random variable X is given as )) ( ( ) ( x I E x H  (7) Here ‘E’ is the expected value, and ‘I’ is the information content of X. If ‘p’ denotes the probability mass function of X then the entropy can be explicitly written as: ) ( log ) ( ) ( ) ( ) ( 2 1 1 i n i i i n i i x p x p x I x p x H        (8) International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 http://www.ijert.org IJERTV6IS090174 (This work is licensed under a Creative Commons Attribution 4.0 International License.) Published by : www.ijert.org Vol. 6 Issue 09, September - 2017 346
  • 4. C. Moment In image processing, computer vision and related fields, an image moment is a certain particular weighted average (moment) of the image pixels intensities, or a function of such moments, usually chosen to have some attractive property or interpretation. For a gray scale image with pixel intensities I(x, y), raw image moments are calculated by: ) , ( y x I y x M j x y i ij   (9) Table I. Performance Evaluation (1minute audio) Parameter Simple Watermark Encrypted watermark Entropy 7 7 Moment 9 10 17 . 1  9 10 17 . 1  MSE 0 0 Embedding Time 1.16s 1.49s Extraction Time 0.18s 0.77s MSE in Audio 4 10 2 . 2  4 10 11 . 5  V. CONCLUSION In this paper, an audio watermarking scheme based on Discrete Fourier Transform has been implemented. To enhance the security of the system, A PN sequence based encryption has also been considered. The proposed algorithms were implemented using MATLAB 2010a on an Intel core i3 based platform. For a cover audio of size one minute, the average time taken for extraction simple watermarking with an image of size 256 × 256 was 0.18 seconds and 0.77 seconds using the PN sequence scheme. In terms of performance, the calculated values of MSE, entropy and moment are found to be the same for both the schemes. Since the MSE between original audio and watermarked audio was very high, the clarity of the audio at the receiver decreased. As a future scope, this MSE can be reduced with the help of some other watermarking techniques. REFERENCES [1] I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd Edition, Morgan Kaufmann, 2008, p. 31 [2] N. Cvejic, Academic Dissertation, Faculty of Technology, University of Oulu, “Algorithms for audio watermarking and steganography,” p. 5. [3] S. Shiyamala and Dr. V. Rajamani, “A Novel Area Efficient Folded Modified Convolutional Interleaving Architecture for MAP Decoder,” International Journal of Computer Applications (IJCA), Vol. 9, No. 9, p. 1, November 2010. [4] Shahreza S.S. and Shalmani M.T.M., “Adaptive wavelet domain audio steganography with high capacity and low error rate,” Proceedings of the IEEE International Conference on Information and Emerging Technologies, (ICIET„07), pp. 1729-1732, 2007. [5] Rafel C.Gonzalez and Richard Woods, “Digital Image Processing,” 9th edition, Printice Hall, NewYork, September, 2009. [6] Anil Jain, “Fundamentals of Image Processing,” 4th edition, Pearson publications, 2002. [7] Aman Chadha, Sandeep Gangundi, Rishabh Goel, Hiren Dave, M. Mani Roja,“ Audio Watermarking with Error Correction”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 9, 2011 [8] William Stallings, “Cryptography and Network Security,” Pearson Education, 5th edition, 2011. [9] D. Kahn, “Cryptography Goes Public”, IEEE Communications Magazine, Vol. 18, 19–28, 1980. [10] G. White, “All-in-One Security+ Certification Exam Guide”, McGraw- Hill, 2003 [11] Anil Jain, Karthik Nandakumar and Arun Ross, “Score normalization in Multimodal Biometric Systems,” Pattern Recognition, vol.38, no.12, pp.2270 – 2285, 2005. [12] R. Mutagi, "Pseudo Noise Sequences for Engineers," Electronics & Communication Engineering Journal, vol.8, no.2, pp.79-87, April, 1996. [13] L. Trevisan, "CS276 Lecture 5: Encryption Using Pseudorandom Functions", (in theory), [online] 2009, https://lucatrevisan. wordpress.com/2009/02/13/cs276lecture-5-encryption-using- pseudorandom-functions/ (Accessed: 8 February 2015). [14] Z. Wang and A. C. Bovik, “Mean squared error: love it or leave it? - A new look at signal fidelity measures,” IEEE Signal Processing Magazine, Vol. 26, No. 1, pp. 98-117, January 2009. [15] G. Casella and E.L. Lehmann, Theory of Point Estimation. New York: Springer-Verlag, 1999. [16] T. N. Pappas, R. J. Safranek and J. Chen, “Perceptual criteria for image quality evaluation,” in Handbook of Image and Video Processing, 2nd ed., International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 http://www.ijert.org IJERTV6IS090174 (This work is licensed under a Creative Commons Attribution 4.0 International License.) Published by : www.ijert.org Vol. 6 Issue 09, September - 2017 347