SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 965
A Survey On Audio Watermarking Methods
Nihala K. N, M.Tech student, Viswajyothi College of Engineering and Technology
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - As the use of digital multimedia data is
increasing day by day, the necessity of protecting the
data from illegal copyright infringement,
fingerprinting and other malicious attacks is also
increasing. Watermarking is the process of embedding
a piece of secret data to the host data to protect from
these attacks. In audio watermarking a piece of data is
embedded into the original host signal without
affecting the signal quality. There are different
techniques available for audio watermarking. In this
paper audio watermarking along with its properties is
explained and different watermarking techniques are
also examined and the comparison result shows the
advantages and disadvantages of each technique
which implies watermarking based on Fibonacci
numbers satisfies most of the watermarking
properties.
KeyWords: Audio watermarking, Watermark
embedding and Watermark extraction.
1.INTRODUCTION
Watermarking is the technique of hiding secret digital
information in a carrier signal. A digital watermark is a
piece of data to be embedded in digital media such as an
audio, video or image data. It is used to identify the
copyright ownership of the data or to protect it against
illegal application. As digital audio files can be downloaded
and copied easily they are more prone to copyright
infringements. Audio watermarks are secret signal data
used to prevent these problems. These signals are
embedded in the original signal data and extracted by
detection mechanism. One of the main factor in which
audio watermarking scheme depends on is the
imperfection of the human auditory system. There are
several methods to embed the watermark data into the
original audio signals.
An efficient audio watermarking system must mainly
satisfy four basic requirements. These are robustness,
security, imperceptibility and payload. Some of the
watermark properties are discussed below.
Robustness : Digital signal may undergo different signal
processing operations. Robustness is the property of the
watermark data to withstand these signal attacks and to
be extracted even after these attacks.
Security : The watermark signal must not reveal about the
embedded watermarked data. So the system will not be
prone to unauthorized access. The security of the
watermarking system lies in the security of the secret key
used not on the embedding algorithm.
Imperceptibility : Imperceptibility refers to the quality of
the signal after watermark embedding. The quality of the
signal must be retained even after embedding data for an
effective watermarking method.
Payload : Payload refers to the amount of secret data that
can be added to the original signal without effecting the
quality of the original signal. For audio signals, data
payload refers to the number of watermark bits that can
be reliably embedded within the original signal per unit of
time. Payload is usually measured in bits per second (bps).
Different audio watermarking techniques are being
compared in this paper based on their embedding
procedure. The rest of this paper is organized as follow:
Section 2 describes various watermarking techniques and
Section 3 contains the comparison between different
watermarking techniques and finally we have the
conclusion at Section 4.
2. LITERATURE SURVEY
In [1] Mohamed F. Mansour and Ahmed H. Tewk proposes
a new system for data embedding. The interval length
between the audio signal’s salient points are changed.
Then the embedding is done in the quantization indices of
the intervals. The wavelet extrema of the signal envelope
are used as the salient points. The algorithm is robust
against different signal processing attacks. But watermark
detection depends on the selection of threshold and is not
robust against pitch shifting . The salient point lengths are
modified for embedding the data. The salient point
interval lengths are quantized after extracting and refining
them in the extraction process.
Wei Li, Xiangyang Xue, and Peizhong Lu proposes a novel
content-dependent localized robust audio watermarking
scheme , to combat synchronization attacks in [2]. First
select the steady high-energy local regions that represent
music edges by using different methods .The methods are
either selects embedding regions on the original audio
waveform directly, select the peaks on the audio envelope
as reference to determine the embedding regions or
selection based on music content analysis .After selecting
the region then embed the watermark in these regions.
Such regions will not be changed much for maintaining
high auditory quality and in this way, the embedded
watermark is robust against different distortions. The
prime factor in watermark detection is accurately locating
the embedding region . If the embedding region
identification is inaccurate then the watermark detection
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 966
is bound to be failed, because it will detect the watermark
in areas where the watermark does not exist at all.
In [3] Nima Khademi Kalantari .et.al proposes a
multiplicative patchwork method.In this system two
subsets of the host signal features are selected and the
selection is based on the secret keys inorder to embed
watermark data within the host signal. The watermark
data is embedded by multiplying one of the subsets .The
other subset is leaved unchanged. Embedding is
performed in the selected frames of the host signal which
satisfies a certain condition.The wavelet domain is used
for the implementation of the method and approximation
coefficients are used for data embedding. T he inaudibility
of the watermark insertion is controlled by Perceptual
Evaluation of Audio Quality (PEAQ) algorithm .The error
probability is being derived. Energy of the subset is
changed according to the embedding functions and due to
multiplication. In order to extract the watermark data the
energy ratio of two subsets should be compared with a
threshold.
Another technique was introduced by Xiangui Kang, Rui
Yan and Jiwu Huang in [4],they proposes a multi-bit
spread-spectrum audio watermarking scheme based on a
geometric invariant log coordinate mapping (LCM) feature
which is very robust to audio geometric distortions. The
embedding of watermark is done in the LCM feature.
Actually embedding is done in the Fourier coefficients
which are mapped to the feature via LCM. the embedding
is actually performed in the DFT domain without
interpolation, and this will completely eliminate the
severe distortion formed due to the non-uniform
interpolation mapping. One of the advantage of the
watermarked audio is its high auditory quality in both
objective and subjective quality assessments. A mixed
correlation between the LCM feature and a key-generated
PN tracking sequence is proposed to align the log-
coordinate mapping, thus synchronizing the watermark
efficiently with only one FFT and one IFFT.
In [5] Ryouichi Nishimura, proposes a watermarking
technique for audio signals, based on the spatial masking
phenomenon and ambisonics. Ambisonics is a well known
technique to encode and reproduce spatial information
related to sound.A watermark data is created from the
original sound scene by slightly rotating it. Ambisonic
signals are synthesized from mono or stereo signals.
Watermarks are embedded near the signal by adding a
small copy of the host signal which provides reversible
watermarking is possible if loudspeakers are arranged
properly for playback. This will represent audio signals of
first order ambisonics as mutually orthogonal four-
channel signals.And this make it possible to present a
larger amount of data than in the original version.
Yong Xiang.et.al proposes a novel dual-channel time-
spread echo method for audio watermarking in [6], This
method improves the robustness and perceptual quality of
the system. At the embedding stage, the audio signal is
divided into two subsignals and watermarks are added
into the two subsignals simultaneously. The embedded
subsignals are combined to form the watermarked signal.
The watermarked signal is split up into two watermarked
subsignals at the decoding stage.The similarity of the
cepstra to the watermarked subsignals is used to extract
the embedded watermarks. The performance of
watermark extraction can be enhanced by using large
peaks of pseudonoise sequences auto-correlation function.
In [7] Guang Hua.et.al, proposes a Convex optimization
based finite-impulse-response(FIR) filter design.FIR is
used to obtain the optimal echo filter coefficients.
Proposed maximum power spectral margin (MPSM) and
the absolute threshold of hearing (ATH) of human
auditory system (HAS) is used to shape the desired power
spectrum of the echo filter. This will ensure the optimal
imperceptibility. The auto-correlation function of the echo
filter coefficients will controls the robustness in terms of
watermark detection. To design the echo kernel, convex
optimization is used to obtain a set of filter coefficients
which will replace the PN or MPN sequence.
A different method was introduced by Andrea Abrardo
and Mauro Barni in [8], proposes a watermarking schema
based on antipodal binary random binning, which allows
the possibility of relying on simple and effective binary
code constructions. And also make it easy to cope with
amplitude scaling. The system outperforms previous
watermarking system constructions by exhibiting very
good performance also in the presence of gain attack. The
encoding process is formed by an outer convolutional
encoder CCo, the input to convolutional encoder is
watermark w. A random interleaver permuting the outer
codewords bits wc and input to the inner convolutional
encoder is the permuted outer codewords wc. The outer
encoder add some redundancy bits to the watermark
message and the inner code embeds the watermark in the
host signal by a dirty trellis mechanism. And atlast the
sequences are mixed together to form the watermarking
signal.
In [9] Yong Xiang.et.al proposes a patch work based audio
watermarking method robust to de-synchronization
attack. The watermarks are embedded into the host audio
signal in the discrete cosine transform (DCT) domain and
synchronization bits are implanted in the logarithmic DCT
domain. At the decoding stage, find the scaling factor
imposed by an attack by analyzing the received audio
signal in LDCT domain. Then remove the scaling effect by
modifying the received signal, together with the
embedded synchronization bits. And extract the
watermark from the modified signal.
Michael Arnold.et.al proposes a phase based audio
watermarking system robust to acoustic path propagation
in [10]. The system embeds information by modulating the
phase in the WOLA domain. To improve the overall
performances, three complementary modules are
introduced: (i) a perceptual model to evaluate the
noisiness of individual spectral bins, (ii) a
resynchronization module which relies on tracking the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 967
resampling ratio over time and (iii) a statistical detector
that aggregates the information from several values of the
detection correlation array. The watermark
modulation/demodulation framework can then be
complemented by any regular channel coding technique.
This channel coding is overlaid on top of the system. This
can include either expanding the alphabet of symbols,
introducing an error correcting code or establishing
several communication channels associated to different
frequency bands.
In [11] Mehdi Fallahpour and David Megas, proposes a
audio watermarking system where embedding is done on
the basis of Fibonacci numbers. Watermark extraction is
done in a bit-exact manner by changing some of the
magnitudes of the FFT spectrum. The main idea of the
watermarking system is to divide the FFT spectrum into
short frames and the change the magnitude of the selected
FFT samples using Fibonacci numbers. First select a
frequency part from FFT spectrum. Then divide the
frequency band into frames. And a single secret bit is
being embedded into each frame in the selected frequency
band. On the basis of Fibonacci number and secret bit the
magnitude of FFT coefficients in the selected frame is
modified. If the bit to be embedded is 0, the coefficient
value is changed to Fibonacci number with even index
which is closer to the value. If the bit to be embedded is 1,
the coefficient value is changed to Fibonacci number with
odd index which is closer to the value.
3.COMPARISON BETWEEN THE WATERMARKING
TECHNIQUES
In the above section different watermarking techniques
are being analyzed. Each method has got the same aim of
embedding a piece of information into the audio signal but
there is difference in their watermark embedding and
extraction procedure and in the piece of data to be
embedded. The table comparing the advantages and
disadvantages of different audio watermarking techniques
are given below.
Table 1: COMPARISON OF WATERMARKING TECHNIQUES
Methods Technique Used Advantages Disadvantages
Data Embedding in
Audio Using Time-
Scale
Modification[1]
Embedding is done by changing the
length of the intervals between the
salient points of audio signal.
It is robust to mp3
compression,low pass
filtering,TSM and other
basic signal processing
operations.
Detection depends on
the selection of
threshold.
Not robust against pitch
shifting.
Localized Audio
Watermarking
Technique Robust
Against Time-Scale
Modification[2]
Embedding is done at high-energy
local regions that represent music
edges.
High robustness against
common audio signal
processing and
synchronization attack.
Only works well on
audio with an obvious
rhythm.
Not robust against pitch
shifting
Robust
Multiplicative
Patchwork Method
For Audio
Watermarking[3]
For the embedding process select
two subset of the host signal feature
using secret key. Watermark is
embedded at one subset by
multiplying and other is leaved
unchanged.
Robust for common
attacks such as noise ,
filtering , mp3
compression.
Quality is assured
Not robust against
geometric distortions
such as TSM,pitch
shifting.
Geometric Invariant
Audio
Watermarking
Based on an LCM
Feature[4]
Embedding is based on log
coordinate mapping(LCM) feature.
Embedding is done at the Fourier
coefficients which are mapped to the
feature via LCM.
Robustness against
simultaneous geometric
distortions.
Deals only with the
transparency and
robustness.
Audio
Watermarking Using
Spatial Masking and
A watermark is represented as a
slightly rotated version of the
original sound scene. Watermarks
are embedded near the signal by
adding a small copy of the host
Robust against different
attacks.
Watermarks are
detectable by a
malicious attacker
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 968
Ambisonics[5] signal.
A Dual-Channel
Time-Spread Echo
Method for Audio
Watermarking[6]
Host audio signal is divided into sub
signals. Watermarks are implanted
into the two sub signals
simultaneously. The subsignals are
combined to form the watermarked
signal.
Better perceptual quality.
Robust against common
attacks.
Enhance perceptual
quality by slightly
reducing robustness.
Time-Spread Echo-
Base Audio
Watermarking With
Optimized
Imperceptibility and
Robustness[7]
Convex optimization based finite-
impulse-response (FIR) filter design
is utilized to obtain the optimal echo
filter coefficients.
Imperceptibility and
robustness is achieved.
Not a quantitative
approach.
A New
Watermarking
Scheme Based on
Antipodal Binary
Dirty Paper
Coding[8]
Watermarking is based on based on
serially concatenated convolutional
codes with dirty trellis embedding.
System is immune to gain
attacks.
Good performance when
used for the
watermarking of real
multimedia data.
Watermarking channel
has less capacity.
Patchwork-Based
Audio
Watermarking
Method Robust to
De-synchronization
Attacks[9]
Watermarks are embedded into the
audio signal by modifying its DCT
coefficients. A set of
synchronization bits are implanted
into the watermarked signal in the
logarithmic DCT (LDCT) domain.
More robust to
desynchronization
attacks.
Higher embedding
capacity.
Decrease in detection
rate by increase in
embedding rate.
A Phase-Based
Audio
Watermarking
System Robust to
Acoustic Path
Propagation[10]
Watermark embedding is done by
modulating the phase in the WOLA
domain
Robustness against
synchronization attacks.
High fidelity.
Embedded watermark
suffers a slight
degradation during
signal reconstruction.
Audio
Watermarking
Based on Fibonacci
Numbers[11]
Watermark embedding done by
changing the magnitude of the FFT
domain using the watermark data
and Fibonacci number.
System has a high
capacity without
signicant perceptual
distortion.
Provides robustness
against common signal
processing attacks.
Provides security for the
watermarked data.
Collision between low
frequency value and low
valued Fibonacci
number .Variation in the
FFT value during data
retrieval.
4. CONCLUSIONS
Digital watermarking schemes are used for protecting data
from unauthorized access or illegal copyrighting. There
are image, video and audio watermarking techniques.
Studies on audio watermarking are far less than that of
image watermarking or video watermarking. But
nowadays audio watermarking studies have also
increased considerably. This paper surveyed those
techniques and presented some of the important
techniques used for digital audio watermarking.
Considering the embedding domain, audio watermarking
techniques can be classified into time-domain and
frequency-domain methods.FFT transform is used by
different systems, such as in LCM based system which
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 969
proposes a multi-bit spread spectrum audio watermarking
scheme based on a geometric invariant log coordinate
mapping (LCM) feature. The watermark is embedded in
the LCM feature, but it is actually embedded in the Fourier
coefficients which are mapped to the feature via LCM.
Consequently, the embedding is actually performed in the
FT domain. Time-spread echo-based audio watermarking
scheme with optimized imperceptibility and robustness.
Specifically, convex optimization-based finite-impulse-
response filter design is used to obtain the optimal echo
filter coefficients. But most of these methods mainly focus
on the robustness and transparency of the system and
does not deal with the security of the system the Fibonacci
based watermark embedding considers the security
aspects of the system.
REFERENCES
[1] Mohamed F. Mansour and Ahmed H. Tewk, “Data
Embedding in Audio Using Time-Scale
Modifcation,”IEEE Transactions on speech and audio
processing,vol. 13, no. 3, May 2005.
[2] Wei Li, Xiangyang Xue, and Peizhong Lu, “Localized
Audio Watermarking Technique Robust Against Time-
Scale Modification" IEEE Transactions on multimedia,
vol. 8, no. 1, February 2006.
[3] Nima Khademi Kalantari, Mohammad Ali Akhaee,
Seyed Mohammad Ahadi, Hamidreza Amindavar,
“Robust Multiplicative Patchwork Method For
AudioWatermarking," IEEE Transactions On Speech
And Audio Processing-2009.
[4] Xiangui Kang, Rui Yan and Jiwu Huang, “Geometric
Invariant Audio Watermarking Based on an LCM
Feature,"IEEE Transactions On Multimedia,vol.13, no. 2,
April 2011.
[5] Ryouichi Nishimura, “Audio Watermarking Using
Spatial Masking and Ambisonics,"IEEE Transactions
On Audio, Speech, And Language Processing,vol.20,
no. 9, November 2012.
[6] Yong Xiang, Iynkaran Natgunanathan, Dezhong
Peng,WanleiZhou andShui Yu,”A Dual-Channel Time-
Spread Echo Method for Audio Watermarking, "IEEE
transactions on information forensics and security,vol.
7, no. 2, April 2012.
[7] Guang Hua, Jonathan Goh, and Vrizlynn. L. L.
Thing,”Time-Spread Echo-Based Audio Watermarking
With Optimized Imperceptibility and
Robustness,"IEEE Transactions on audio, speech, and
language processing,vol. 23, no. 2,February 2015.
[8] Andrea Abrardo, Mauro Barni, “A New Watermarking
Scheme Based on Antipodal Binary Dirty Paper
Coding,"IEEE Transactions on Information Forensics
and Security -2013.
[9] Yong Xiang, Iynkaran Natgunanathan, Song Guo,
Wanlei Zhou and Saeid Nahavandi, “Patchwork-Based
Audio Watermarking Method Robust to De-
synchronization Attacks,"IEEE Transactions on audio,
speech, and language processing,vol. 22, no. 9,
September 2014.
[10] Michael Arnold, Xiao-Ming Chen, Peter Baum, Ulrich
Gries, and Gwenal Dorr,”A Phase-Based Audio
Watermarking System Robust to Acoustic Path
Propagation,"IEEE Transactions on information
forensics and security,vol. 9, no. 3,March 2014.
[11] Mehdi Fallahpour and David Megas, “Audio
Watermarking Based on Fibonacci Numbers, " IEEE
Transactions on audio, speech, and language
processing, vol.23, no. 8, August 2015.

More Related Content

What's hot

Z4301132136
Z4301132136Z4301132136
Z4301132136
IJERA Editor
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
IJERA Editor
 
Optical Fiber link Design Complete guide by Aamir Saleem
Optical Fiber link Design Complete guide by Aamir SaleemOptical Fiber link Design Complete guide by Aamir Saleem
Optical Fiber link Design Complete guide by Aamir Saleem
Aamir Saleem
 
L010218691
L010218691L010218691
L010218691
IOSR Journals
 
21 16133 paper 013 ijeecs(edit)new
21 16133 paper 013 ijeecs(edit)new21 16133 paper 013 ijeecs(edit)new
21 16133 paper 013 ijeecs(edit)new
IAESIJEECS
 
Analysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signalsAnalysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signals
IAEME Publication
 
G010314853
G010314853G010314853
G010314853
IOSR Journals
 
Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...
TELKOMNIKA JOURNAL
 
Smart Sound Measurement and Control System for Smart City
Smart Sound Measurement and Control System for Smart CitySmart Sound Measurement and Control System for Smart City
Smart Sound Measurement and Control System for Smart City
IRJET Journal
 
Performance Analysis of Noise Uncertainty in Energy Detection Spectrum Sensin...
Performance Analysis of Noise Uncertainty in Energy Detection Spectrum Sensin...Performance Analysis of Noise Uncertainty in Energy Detection Spectrum Sensin...
Performance Analysis of Noise Uncertainty in Energy Detection Spectrum Sensin...
Onyebuchi nosiri
 
J0525460
J0525460J0525460
J0525460
IOSR Journals
 
Architecture of direct_digital_synthesiz
Architecture of direct_digital_synthesizArchitecture of direct_digital_synthesiz
Architecture of direct_digital_synthesiz
anjunarayanan
 
Implementation Cost Analysis of the Interpolator for the Wimax Technology
Implementation Cost Analysis of the Interpolator for the Wimax TechnologyImplementation Cost Analysis of the Interpolator for the Wimax Technology
Implementation Cost Analysis of the Interpolator for the Wimax Technology
iosrjce
 
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
optljjournal
 
SIMULATIONS OF ADAPTIVE ALGORITHMS FOR SPATIAL BEAMFORMING
SIMULATIONS OF ADAPTIVE ALGORITHMS FOR SPATIAL BEAMFORMINGSIMULATIONS OF ADAPTIVE ALGORITHMS FOR SPATIAL BEAMFORMING
SIMULATIONS OF ADAPTIVE ALGORITHMS FOR SPATIAL BEAMFORMING
ijiert bestjournal
 

What's hot (18)

Z4301132136
Z4301132136Z4301132136
Z4301132136
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
 
Optical Fiber link Design Complete guide by Aamir Saleem
Optical Fiber link Design Complete guide by Aamir SaleemOptical Fiber link Design Complete guide by Aamir Saleem
Optical Fiber link Design Complete guide by Aamir Saleem
 
L010218691
L010218691L010218691
L010218691
 
21 16133 paper 013 ijeecs(edit)new
21 16133 paper 013 ijeecs(edit)new21 16133 paper 013 ijeecs(edit)new
21 16133 paper 013 ijeecs(edit)new
 
Analysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signalsAnalysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signals
 
G010314853
G010314853G010314853
G010314853
 
Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...
 
Ai25204209
Ai25204209Ai25204209
Ai25204209
 
Smart Sound Measurement and Control System for Smart City
Smart Sound Measurement and Control System for Smart CitySmart Sound Measurement and Control System for Smart City
Smart Sound Measurement and Control System for Smart City
 
Performance Analysis of Noise Uncertainty in Energy Detection Spectrum Sensin...
Performance Analysis of Noise Uncertainty in Energy Detection Spectrum Sensin...Performance Analysis of Noise Uncertainty in Energy Detection Spectrum Sensin...
Performance Analysis of Noise Uncertainty in Energy Detection Spectrum Sensin...
 
J0525460
J0525460J0525460
J0525460
 
Architecture of direct_digital_synthesiz
Architecture of direct_digital_synthesizArchitecture of direct_digital_synthesiz
Architecture of direct_digital_synthesiz
 
Implementation Cost Analysis of the Interpolator for the Wimax Technology
Implementation Cost Analysis of the Interpolator for the Wimax TechnologyImplementation Cost Analysis of the Interpolator for the Wimax Technology
Implementation Cost Analysis of the Interpolator for the Wimax Technology
 
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
 
journal final
journal finaljournal final
journal final
 
SIMULATIONS OF ADAPTIVE ALGORITHMS FOR SPATIAL BEAMFORMING
SIMULATIONS OF ADAPTIVE ALGORITHMS FOR SPATIAL BEAMFORMINGSIMULATIONS OF ADAPTIVE ALGORITHMS FOR SPATIAL BEAMFORMING
SIMULATIONS OF ADAPTIVE ALGORITHMS FOR SPATIAL BEAMFORMING
 
Ijetcas14 443
Ijetcas14 443Ijetcas14 443
Ijetcas14 443
 

Similar to A Survey On Audio Watermarking Methods

IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET Journal
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
IJERA Editor
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
ijma
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...
ijma
 
Effective Audio Storage and Retrieval in Infrastructure less Environment over...
Effective Audio Storage and Retrieval in Infrastructure less Environment over...Effective Audio Storage and Retrieval in Infrastructure less Environment over...
Effective Audio Storage and Retrieval in Infrastructure less Environment over...
IRJET Journal
 
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ijcsit
 
IRJET- Segmentation in Digital Signal Processing
IRJET-  	  Segmentation in Digital Signal ProcessingIRJET-  	  Segmentation in Digital Signal Processing
IRJET- Segmentation in Digital Signal Processing
IRJET Journal
 
Hiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissionHiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmission
eSAT Journals
 
F5242832
F5242832F5242832
F5242832
IOSR-JEN
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
AyushJaiswal781174
 
Review on MAC Protocols for underwater acoustic networks
Review on MAC Protocols for underwater acoustic networksReview on MAC Protocols for underwater acoustic networks
Review on MAC Protocols for underwater acoustic networks
IRJET Journal
 
Spectrum Sensing in Cognitive Radio
Spectrum Sensing in Cognitive RadioSpectrum Sensing in Cognitive Radio
Spectrum Sensing in Cognitive Radio
IRJET Journal
 
IRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum Allocation
IRJET Journal
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET Journal
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET Journal
 
A Survey on Ultrasound Beamforming Strategies
A Survey on Ultrasound Beamforming StrategiesA Survey on Ultrasound Beamforming Strategies
A Survey on Ultrasound Beamforming Strategies
IRJET Journal
 
IRJET- Survey on Efficient Signal Processing Techniques for Speech Enhancement
IRJET- Survey on Efficient Signal Processing Techniques for Speech EnhancementIRJET- Survey on Efficient Signal Processing Techniques for Speech Enhancement
IRJET- Survey on Efficient Signal Processing Techniques for Speech Enhancement
IRJET Journal
 
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET Journal
 
IRJET- Implementation of Beamforming Techniques for Upcoming Wireless Communi...
IRJET- Implementation of Beamforming Techniques for Upcoming Wireless Communi...IRJET- Implementation of Beamforming Techniques for Upcoming Wireless Communi...
IRJET- Implementation of Beamforming Techniques for Upcoming Wireless Communi...
IRJET Journal
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaIAEME Publication
 

Similar to A Survey On Audio Watermarking Methods (20)

IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
IRJET- Device Activation based on Voice Recognition using Mel Frequency Cepst...
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...
 
Effective Audio Storage and Retrieval in Infrastructure less Environment over...
Effective Audio Storage and Retrieval in Infrastructure less Environment over...Effective Audio Storage and Retrieval in Infrastructure less Environment over...
Effective Audio Storage and Retrieval in Infrastructure less Environment over...
 
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
 
IRJET- Segmentation in Digital Signal Processing
IRJET-  	  Segmentation in Digital Signal ProcessingIRJET-  	  Segmentation in Digital Signal Processing
IRJET- Segmentation in Digital Signal Processing
 
Hiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmissionHiding voice data in center density of speech spectrum for secure transmission
Hiding voice data in center density of speech spectrum for secure transmission
 
F5242832
F5242832F5242832
F5242832
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
Review on MAC Protocols for underwater acoustic networks
Review on MAC Protocols for underwater acoustic networksReview on MAC Protocols for underwater acoustic networks
Review on MAC Protocols for underwater acoustic networks
 
Spectrum Sensing in Cognitive Radio
Spectrum Sensing in Cognitive RadioSpectrum Sensing in Cognitive Radio
Spectrum Sensing in Cognitive Radio
 
IRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum AllocationIRJET- Research on Dynamic Spectrum Allocation
IRJET- Research on Dynamic Spectrum Allocation
 
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
 
A Survey on Ultrasound Beamforming Strategies
A Survey on Ultrasound Beamforming StrategiesA Survey on Ultrasound Beamforming Strategies
A Survey on Ultrasound Beamforming Strategies
 
IRJET- Survey on Efficient Signal Processing Techniques for Speech Enhancement
IRJET- Survey on Efficient Signal Processing Techniques for Speech EnhancementIRJET- Survey on Efficient Signal Processing Techniques for Speech Enhancement
IRJET- Survey on Efficient Signal Processing Techniques for Speech Enhancement
 
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
 
IRJET- Implementation of Beamforming Techniques for Upcoming Wireless Communi...
IRJET- Implementation of Beamforming Techniques for Upcoming Wireless Communi...IRJET- Implementation of Beamforming Techniques for Upcoming Wireless Communi...
IRJET- Implementation of Beamforming Techniques for Upcoming Wireless Communi...
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 

Recently uploaded (20)

addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 

A Survey On Audio Watermarking Methods

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 965 A Survey On Audio Watermarking Methods Nihala K. N, M.Tech student, Viswajyothi College of Engineering and Technology ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - As the use of digital multimedia data is increasing day by day, the necessity of protecting the data from illegal copyright infringement, fingerprinting and other malicious attacks is also increasing. Watermarking is the process of embedding a piece of secret data to the host data to protect from these attacks. In audio watermarking a piece of data is embedded into the original host signal without affecting the signal quality. There are different techniques available for audio watermarking. In this paper audio watermarking along with its properties is explained and different watermarking techniques are also examined and the comparison result shows the advantages and disadvantages of each technique which implies watermarking based on Fibonacci numbers satisfies most of the watermarking properties. KeyWords: Audio watermarking, Watermark embedding and Watermark extraction. 1.INTRODUCTION Watermarking is the technique of hiding secret digital information in a carrier signal. A digital watermark is a piece of data to be embedded in digital media such as an audio, video or image data. It is used to identify the copyright ownership of the data or to protect it against illegal application. As digital audio files can be downloaded and copied easily they are more prone to copyright infringements. Audio watermarks are secret signal data used to prevent these problems. These signals are embedded in the original signal data and extracted by detection mechanism. One of the main factor in which audio watermarking scheme depends on is the imperfection of the human auditory system. There are several methods to embed the watermark data into the original audio signals. An efficient audio watermarking system must mainly satisfy four basic requirements. These are robustness, security, imperceptibility and payload. Some of the watermark properties are discussed below. Robustness : Digital signal may undergo different signal processing operations. Robustness is the property of the watermark data to withstand these signal attacks and to be extracted even after these attacks. Security : The watermark signal must not reveal about the embedded watermarked data. So the system will not be prone to unauthorized access. The security of the watermarking system lies in the security of the secret key used not on the embedding algorithm. Imperceptibility : Imperceptibility refers to the quality of the signal after watermark embedding. The quality of the signal must be retained even after embedding data for an effective watermarking method. Payload : Payload refers to the amount of secret data that can be added to the original signal without effecting the quality of the original signal. For audio signals, data payload refers to the number of watermark bits that can be reliably embedded within the original signal per unit of time. Payload is usually measured in bits per second (bps). Different audio watermarking techniques are being compared in this paper based on their embedding procedure. The rest of this paper is organized as follow: Section 2 describes various watermarking techniques and Section 3 contains the comparison between different watermarking techniques and finally we have the conclusion at Section 4. 2. LITERATURE SURVEY In [1] Mohamed F. Mansour and Ahmed H. Tewk proposes a new system for data embedding. The interval length between the audio signal’s salient points are changed. Then the embedding is done in the quantization indices of the intervals. The wavelet extrema of the signal envelope are used as the salient points. The algorithm is robust against different signal processing attacks. But watermark detection depends on the selection of threshold and is not robust against pitch shifting . The salient point lengths are modified for embedding the data. The salient point interval lengths are quantized after extracting and refining them in the extraction process. Wei Li, Xiangyang Xue, and Peizhong Lu proposes a novel content-dependent localized robust audio watermarking scheme , to combat synchronization attacks in [2]. First select the steady high-energy local regions that represent music edges by using different methods .The methods are either selects embedding regions on the original audio waveform directly, select the peaks on the audio envelope as reference to determine the embedding regions or selection based on music content analysis .After selecting the region then embed the watermark in these regions. Such regions will not be changed much for maintaining high auditory quality and in this way, the embedded watermark is robust against different distortions. The prime factor in watermark detection is accurately locating the embedding region . If the embedding region identification is inaccurate then the watermark detection
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 966 is bound to be failed, because it will detect the watermark in areas where the watermark does not exist at all. In [3] Nima Khademi Kalantari .et.al proposes a multiplicative patchwork method.In this system two subsets of the host signal features are selected and the selection is based on the secret keys inorder to embed watermark data within the host signal. The watermark data is embedded by multiplying one of the subsets .The other subset is leaved unchanged. Embedding is performed in the selected frames of the host signal which satisfies a certain condition.The wavelet domain is used for the implementation of the method and approximation coefficients are used for data embedding. T he inaudibility of the watermark insertion is controlled by Perceptual Evaluation of Audio Quality (PEAQ) algorithm .The error probability is being derived. Energy of the subset is changed according to the embedding functions and due to multiplication. In order to extract the watermark data the energy ratio of two subsets should be compared with a threshold. Another technique was introduced by Xiangui Kang, Rui Yan and Jiwu Huang in [4],they proposes a multi-bit spread-spectrum audio watermarking scheme based on a geometric invariant log coordinate mapping (LCM) feature which is very robust to audio geometric distortions. The embedding of watermark is done in the LCM feature. Actually embedding is done in the Fourier coefficients which are mapped to the feature via LCM. the embedding is actually performed in the DFT domain without interpolation, and this will completely eliminate the severe distortion formed due to the non-uniform interpolation mapping. One of the advantage of the watermarked audio is its high auditory quality in both objective and subjective quality assessments. A mixed correlation between the LCM feature and a key-generated PN tracking sequence is proposed to align the log- coordinate mapping, thus synchronizing the watermark efficiently with only one FFT and one IFFT. In [5] Ryouichi Nishimura, proposes a watermarking technique for audio signals, based on the spatial masking phenomenon and ambisonics. Ambisonics is a well known technique to encode and reproduce spatial information related to sound.A watermark data is created from the original sound scene by slightly rotating it. Ambisonic signals are synthesized from mono or stereo signals. Watermarks are embedded near the signal by adding a small copy of the host signal which provides reversible watermarking is possible if loudspeakers are arranged properly for playback. This will represent audio signals of first order ambisonics as mutually orthogonal four- channel signals.And this make it possible to present a larger amount of data than in the original version. Yong Xiang.et.al proposes a novel dual-channel time- spread echo method for audio watermarking in [6], This method improves the robustness and perceptual quality of the system. At the embedding stage, the audio signal is divided into two subsignals and watermarks are added into the two subsignals simultaneously. The embedded subsignals are combined to form the watermarked signal. The watermarked signal is split up into two watermarked subsignals at the decoding stage.The similarity of the cepstra to the watermarked subsignals is used to extract the embedded watermarks. The performance of watermark extraction can be enhanced by using large peaks of pseudonoise sequences auto-correlation function. In [7] Guang Hua.et.al, proposes a Convex optimization based finite-impulse-response(FIR) filter design.FIR is used to obtain the optimal echo filter coefficients. Proposed maximum power spectral margin (MPSM) and the absolute threshold of hearing (ATH) of human auditory system (HAS) is used to shape the desired power spectrum of the echo filter. This will ensure the optimal imperceptibility. The auto-correlation function of the echo filter coefficients will controls the robustness in terms of watermark detection. To design the echo kernel, convex optimization is used to obtain a set of filter coefficients which will replace the PN or MPN sequence. A different method was introduced by Andrea Abrardo and Mauro Barni in [8], proposes a watermarking schema based on antipodal binary random binning, which allows the possibility of relying on simple and effective binary code constructions. And also make it easy to cope with amplitude scaling. The system outperforms previous watermarking system constructions by exhibiting very good performance also in the presence of gain attack. The encoding process is formed by an outer convolutional encoder CCo, the input to convolutional encoder is watermark w. A random interleaver permuting the outer codewords bits wc and input to the inner convolutional encoder is the permuted outer codewords wc. The outer encoder add some redundancy bits to the watermark message and the inner code embeds the watermark in the host signal by a dirty trellis mechanism. And atlast the sequences are mixed together to form the watermarking signal. In [9] Yong Xiang.et.al proposes a patch work based audio watermarking method robust to de-synchronization attack. The watermarks are embedded into the host audio signal in the discrete cosine transform (DCT) domain and synchronization bits are implanted in the logarithmic DCT domain. At the decoding stage, find the scaling factor imposed by an attack by analyzing the received audio signal in LDCT domain. Then remove the scaling effect by modifying the received signal, together with the embedded synchronization bits. And extract the watermark from the modified signal. Michael Arnold.et.al proposes a phase based audio watermarking system robust to acoustic path propagation in [10]. The system embeds information by modulating the phase in the WOLA domain. To improve the overall performances, three complementary modules are introduced: (i) a perceptual model to evaluate the noisiness of individual spectral bins, (ii) a resynchronization module which relies on tracking the
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 967 resampling ratio over time and (iii) a statistical detector that aggregates the information from several values of the detection correlation array. The watermark modulation/demodulation framework can then be complemented by any regular channel coding technique. This channel coding is overlaid on top of the system. This can include either expanding the alphabet of symbols, introducing an error correcting code or establishing several communication channels associated to different frequency bands. In [11] Mehdi Fallahpour and David Megas, proposes a audio watermarking system where embedding is done on the basis of Fibonacci numbers. Watermark extraction is done in a bit-exact manner by changing some of the magnitudes of the FFT spectrum. The main idea of the watermarking system is to divide the FFT spectrum into short frames and the change the magnitude of the selected FFT samples using Fibonacci numbers. First select a frequency part from FFT spectrum. Then divide the frequency band into frames. And a single secret bit is being embedded into each frame in the selected frequency band. On the basis of Fibonacci number and secret bit the magnitude of FFT coefficients in the selected frame is modified. If the bit to be embedded is 0, the coefficient value is changed to Fibonacci number with even index which is closer to the value. If the bit to be embedded is 1, the coefficient value is changed to Fibonacci number with odd index which is closer to the value. 3.COMPARISON BETWEEN THE WATERMARKING TECHNIQUES In the above section different watermarking techniques are being analyzed. Each method has got the same aim of embedding a piece of information into the audio signal but there is difference in their watermark embedding and extraction procedure and in the piece of data to be embedded. The table comparing the advantages and disadvantages of different audio watermarking techniques are given below. Table 1: COMPARISON OF WATERMARKING TECHNIQUES Methods Technique Used Advantages Disadvantages Data Embedding in Audio Using Time- Scale Modification[1] Embedding is done by changing the length of the intervals between the salient points of audio signal. It is robust to mp3 compression,low pass filtering,TSM and other basic signal processing operations. Detection depends on the selection of threshold. Not robust against pitch shifting. Localized Audio Watermarking Technique Robust Against Time-Scale Modification[2] Embedding is done at high-energy local regions that represent music edges. High robustness against common audio signal processing and synchronization attack. Only works well on audio with an obvious rhythm. Not robust against pitch shifting Robust Multiplicative Patchwork Method For Audio Watermarking[3] For the embedding process select two subset of the host signal feature using secret key. Watermark is embedded at one subset by multiplying and other is leaved unchanged. Robust for common attacks such as noise , filtering , mp3 compression. Quality is assured Not robust against geometric distortions such as TSM,pitch shifting. Geometric Invariant Audio Watermarking Based on an LCM Feature[4] Embedding is based on log coordinate mapping(LCM) feature. Embedding is done at the Fourier coefficients which are mapped to the feature via LCM. Robustness against simultaneous geometric distortions. Deals only with the transparency and robustness. Audio Watermarking Using Spatial Masking and A watermark is represented as a slightly rotated version of the original sound scene. Watermarks are embedded near the signal by adding a small copy of the host Robust against different attacks. Watermarks are detectable by a malicious attacker
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 968 Ambisonics[5] signal. A Dual-Channel Time-Spread Echo Method for Audio Watermarking[6] Host audio signal is divided into sub signals. Watermarks are implanted into the two sub signals simultaneously. The subsignals are combined to form the watermarked signal. Better perceptual quality. Robust against common attacks. Enhance perceptual quality by slightly reducing robustness. Time-Spread Echo- Base Audio Watermarking With Optimized Imperceptibility and Robustness[7] Convex optimization based finite- impulse-response (FIR) filter design is utilized to obtain the optimal echo filter coefficients. Imperceptibility and robustness is achieved. Not a quantitative approach. A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding[8] Watermarking is based on based on serially concatenated convolutional codes with dirty trellis embedding. System is immune to gain attacks. Good performance when used for the watermarking of real multimedia data. Watermarking channel has less capacity. Patchwork-Based Audio Watermarking Method Robust to De-synchronization Attacks[9] Watermarks are embedded into the audio signal by modifying its DCT coefficients. A set of synchronization bits are implanted into the watermarked signal in the logarithmic DCT (LDCT) domain. More robust to desynchronization attacks. Higher embedding capacity. Decrease in detection rate by increase in embedding rate. A Phase-Based Audio Watermarking System Robust to Acoustic Path Propagation[10] Watermark embedding is done by modulating the phase in the WOLA domain Robustness against synchronization attacks. High fidelity. Embedded watermark suffers a slight degradation during signal reconstruction. Audio Watermarking Based on Fibonacci Numbers[11] Watermark embedding done by changing the magnitude of the FFT domain using the watermark data and Fibonacci number. System has a high capacity without signicant perceptual distortion. Provides robustness against common signal processing attacks. Provides security for the watermarked data. Collision between low frequency value and low valued Fibonacci number .Variation in the FFT value during data retrieval. 4. CONCLUSIONS Digital watermarking schemes are used for protecting data from unauthorized access or illegal copyrighting. There are image, video and audio watermarking techniques. Studies on audio watermarking are far less than that of image watermarking or video watermarking. But nowadays audio watermarking studies have also increased considerably. This paper surveyed those techniques and presented some of the important techniques used for digital audio watermarking. Considering the embedding domain, audio watermarking techniques can be classified into time-domain and frequency-domain methods.FFT transform is used by different systems, such as in LCM based system which
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 969 proposes a multi-bit spread spectrum audio watermarking scheme based on a geometric invariant log coordinate mapping (LCM) feature. The watermark is embedded in the LCM feature, but it is actually embedded in the Fourier coefficients which are mapped to the feature via LCM. Consequently, the embedding is actually performed in the FT domain. Time-spread echo-based audio watermarking scheme with optimized imperceptibility and robustness. Specifically, convex optimization-based finite-impulse- response filter design is used to obtain the optimal echo filter coefficients. But most of these methods mainly focus on the robustness and transparency of the system and does not deal with the security of the system the Fibonacci based watermark embedding considers the security aspects of the system. REFERENCES [1] Mohamed F. Mansour and Ahmed H. Tewk, “Data Embedding in Audio Using Time-Scale Modifcation,”IEEE Transactions on speech and audio processing,vol. 13, no. 3, May 2005. [2] Wei Li, Xiangyang Xue, and Peizhong Lu, “Localized Audio Watermarking Technique Robust Against Time- Scale Modification" IEEE Transactions on multimedia, vol. 8, no. 1, February 2006. [3] Nima Khademi Kalantari, Mohammad Ali Akhaee, Seyed Mohammad Ahadi, Hamidreza Amindavar, “Robust Multiplicative Patchwork Method For AudioWatermarking," IEEE Transactions On Speech And Audio Processing-2009. [4] Xiangui Kang, Rui Yan and Jiwu Huang, “Geometric Invariant Audio Watermarking Based on an LCM Feature,"IEEE Transactions On Multimedia,vol.13, no. 2, April 2011. [5] Ryouichi Nishimura, “Audio Watermarking Using Spatial Masking and Ambisonics,"IEEE Transactions On Audio, Speech, And Language Processing,vol.20, no. 9, November 2012. [6] Yong Xiang, Iynkaran Natgunanathan, Dezhong Peng,WanleiZhou andShui Yu,”A Dual-Channel Time- Spread Echo Method for Audio Watermarking, "IEEE transactions on information forensics and security,vol. 7, no. 2, April 2012. [7] Guang Hua, Jonathan Goh, and Vrizlynn. L. L. Thing,”Time-Spread Echo-Based Audio Watermarking With Optimized Imperceptibility and Robustness,"IEEE Transactions on audio, speech, and language processing,vol. 23, no. 2,February 2015. [8] Andrea Abrardo, Mauro Barni, “A New Watermarking Scheme Based on Antipodal Binary Dirty Paper Coding,"IEEE Transactions on Information Forensics and Security -2013. [9] Yong Xiang, Iynkaran Natgunanathan, Song Guo, Wanlei Zhou and Saeid Nahavandi, “Patchwork-Based Audio Watermarking Method Robust to De- synchronization Attacks,"IEEE Transactions on audio, speech, and language processing,vol. 22, no. 9, September 2014. [10] Michael Arnold, Xiao-Ming Chen, Peter Baum, Ulrich Gries, and Gwenal Dorr,”A Phase-Based Audio Watermarking System Robust to Acoustic Path Propagation,"IEEE Transactions on information forensics and security,vol. 9, no. 3,March 2014. [11] Mehdi Fallahpour and David Megas, “Audio Watermarking Based on Fibonacci Numbers, " IEEE Transactions on audio, speech, and language processing, vol.23, no. 8, August 2015.