The main problem encountered during multimedia transmission is its protection against illegal distribution
and copying. One of the possible solutions for this is digital watermarking. Digital audio watermarking is
the technique of embedding watermark content to the audio signal to protect the owner copyrights. In this
paper, we used three wavelet transforms i.e. Discrete Wavelet Transform (DWT), Double Density DWT
(DDDWT) and Dual Tree DWT (DTDWT) for audio watermarking and the performance analysis of each
transform is presented. The key idea of the basic algorithm is to segment the audio signal into two parts,
one is for synchronization code insertion and other one is for watermark embedding. Initially, binary
watermark image is scrambled using chaotic technique to provide secrecy. By using QuantizationIndex
Modulation (QIM), this method works as a blind technique. The comparative analysis of the three methods
is made by conducting robustness and imperceptibility tests are conducted on five benchmark audio
signals.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
In this paper an efficient & robust non-blind watermarking technique based on multi-resolution geometric analysis named curvelet transform is proposed. Curvelet transform represent edges along curve much more efficiently than the wavelet transform and other traditional transforms. The proposed algorithm of embedding watermark in different scales in curvelet domain is implemented and the results are compared
using proper metric. The visual quality of watermarked image, efficiency of data hiding and the quality of extracted watermark of curvelet domain embedding techniques with wavelet Domain at different number of decomposition levels are compared. Experimental results show that embedding in curvelet domain yields best visual quality in watermarked image, the quality of extracted watermark, robustness of the watermark and the data hiding efficiency.
Hybrid Approach for Robust Digital Video WatermarkingIJSRD
With the growing popularity of internet and digital media, digital watermarking techniques have been developed to protect the copyright of multimedia objects such as text, audio, video, etc. So, we have proposed a hybrid video watermarking technique which takes the advantages of different transforms like DWT, DCT, SVD and Arnold Transform, which enhances more security and provides robustness to the watermark. In this paper method, video is divided into several groups of frames, and one of the frames is selected where watermark will be embedded. Before embedding watermark in a selected frame it will be pre-processed with Arnold Transform which will provide security to it. The selected plane of video frame are decomposed using DWT and high frequency band HH, middle frequency bands LH, HL are transformed with DCT. The DCT coefficients are SVD transformed which are embedded with corresponding transformed coefficients of watermarks along with Arnold Transform. The embedded watermark is extracted with inverse process of embedding. The proposed algorithm is tested with various video sequences using MATLAB 2013a. The distortion quality of original image and watermark is controlled by the Peak Signal to Noise Ratio, Signal to Noise Ratio and Mean square error of the watermarked frame with original frame.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
Digital watermarking refers to embedding watermarks in a multimedia documents and files in order to protect them from illegal copying and identifying manipulations. We proposed a technique is Hybrid DWTSVD method for digital video watermarking. This paper presents a robust and secure watermarking algorithm for video sequence. Proposed scheme divide the video in to frames and then blue channel is used for watermarking insertion. Discrete wavelet transform is used for watermark embedding. Watermark is inserted in to mid frequency component for better resistance to video manipulation operation. PSNR and MSE are computed for testing the proposed method
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
In this paper an efficient & robust non-blind watermarking technique based on multi-resolution geometric analysis named curvelet transform is proposed. Curvelet transform represent edges along curve much more efficiently than the wavelet transform and other traditional transforms. The proposed algorithm of embedding watermark in different scales in curvelet domain is implemented and the results are compared
using proper metric. The visual quality of watermarked image, efficiency of data hiding and the quality of extracted watermark of curvelet domain embedding techniques with wavelet Domain at different number of decomposition levels are compared. Experimental results show that embedding in curvelet domain yields best visual quality in watermarked image, the quality of extracted watermark, robustness of the watermark and the data hiding efficiency.
Hybrid Approach for Robust Digital Video WatermarkingIJSRD
With the growing popularity of internet and digital media, digital watermarking techniques have been developed to protect the copyright of multimedia objects such as text, audio, video, etc. So, we have proposed a hybrid video watermarking technique which takes the advantages of different transforms like DWT, DCT, SVD and Arnold Transform, which enhances more security and provides robustness to the watermark. In this paper method, video is divided into several groups of frames, and one of the frames is selected where watermark will be embedded. Before embedding watermark in a selected frame it will be pre-processed with Arnold Transform which will provide security to it. The selected plane of video frame are decomposed using DWT and high frequency band HH, middle frequency bands LH, HL are transformed with DCT. The DCT coefficients are SVD transformed which are embedded with corresponding transformed coefficients of watermarks along with Arnold Transform. The embedded watermark is extracted with inverse process of embedding. The proposed algorithm is tested with various video sequences using MATLAB 2013a. The distortion quality of original image and watermark is controlled by the Peak Signal to Noise Ratio, Signal to Noise Ratio and Mean square error of the watermarked frame with original frame.
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...researchinventy
Digital watermarking refers to embedding watermarks in a multimedia documents and files in order to protect them from illegal copying and identifying manipulations. We proposed a technique is Hybrid DWTSVD method for digital video watermarking. This paper presents a robust and secure watermarking algorithm for video sequence. Proposed scheme divide the video in to frames and then blue channel is used for watermarking insertion. Discrete wavelet transform is used for watermark embedding. Watermark is inserted in to mid frequency component for better resistance to video manipulation operation. PSNR and MSE are computed for testing the proposed method
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmTELKOMNIKA JOURNAL
Ease process digital data information exchange impact on the increase in cases of copyright
infringement. Audio watermarking is one solution in providing protection for the owner of the work. This
research aims to optimize the insertion parameters on Modified Discrete Cosine Transform (M-DCT) based
audio watermarking using a genetic algorithm, to produce better audio resistance. MDCT is applied after
reading host audio, then embedding in MDCT domain is applied by Quantization Index Modulation (QIM)
technique. Insertion within the MDCT domain is capable of generating a high imperceptible watermarked
audio due to its overlapping frame system. The system is optimized using genetic algorithms to improve
the value of imperceptibility and robustness in audio watermarking. In this research, the average SNR
reaches 20 dB, and ODG reaches -0.062. The subjective quality testing on the system obtains an average
MOS of 4.22 out of five songs tested. In addition, the system is able to withstand several attacks. The use
of M-DCT in audio watermaking is capable of producing excellent imperceptibility and better watermark
robustness.
In Digital era sharing of images have become very
common and raises the risk of using it for unethical and
fraudulent purposes with the help of manipulation tools. Digital
image watermarking is one way to protect the digital information
(text, images, audio, and video) from fraudulent manipulations.
Digital Image Watermarking is a process of implanting data in
the original image for authentication. In this paper we are
providing one such watermarking scheme for color images. The
proposed method is designed to be robust for common attacks
with the aid of redundant discrete wavelet transform (RDWT)
and discrete cosine transform (DCT) properties. After applying
two levels RDWT decomposition to the blue channel of cover
image, we apply DCT to HH_LL subband i.e. 2nd level
decomposed coefficient of HH band and to the watermark.
Divided the HH_LL sub band into 4x4 subblocks and DCT
coefficients of the last subblock of the cover image are replaced
with the DCT coefficients of watermark. Inverse DCT and
inverse RDWT is performed to get watermarked image. The
performance of the proposed technique is measured using the
parameters PSNR and NCC.
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
Now a days there is use of digital multimedia applications are increased. Digital image watermarking techniques can be classified into spatial or transform domains. The spatial domain methods are the simplest watermarking techniques but have low robustness against different attacks, unlike the transform domains watermarking methods are more complex and have high robustness against various attacks. Most commonly used methods of watermarking are discrete cosine transform (DCT), discrete wavelet transform (DWT).A hybrid digital video watermarking scheme based on Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). These transform domain technique always give more robust output than DCT and DWT The video frames are first decomposed using DWT and the binary watermark is embedded in the principal components of the low frequency wavelet coefficients Here in order to improve the robustness of water mark Haar filtering must be used in order to get PSNR as much as possible Experimental result shows no visible difference between the watermarked frames and original frame. It shows robustness on the watermarked video against various attacks. Peak signal to noise ratio (PSNR) is calculated to measure efficiency of this all methods. And this value must be increased up to the level.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
Due to the rapid growth of internet and technology, protecting digital data is becoming very
urgent. In this paper a novel watermarking technique is proposed where both visible and invisible watermarks are embedded in a video. Digital data can be copied easily without any degradation in quality, so the protection of the data is necessary. Digital watermarking is a technology to embed additional information into the host signal to ensure security and protection of multimedia data. The video frames contain both the watermarks, so it is more robust to attacks. The watermarking scheme described here deals with embedding and extraction of the watermarks. Discrete Wavelet transform (DWT) is used to embed the invisible watermark and Peak Signal to Noise Ratio (PSNR) is calculated to measure efficiency of this method.
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
Robust audio watermarking based on transform domain and SVD with compressive ...TELKOMNIKA JOURNAL
The growth of the internet and digital data has resulted forgery, modification and sharing of digital data without property rights. Audio watermarking is one of a solution to protect the copyright of an audio from copyright infringement. This paper proposes an audio watermarking method which is robust against attacks and high capacity. First, a synchronization bit is added to the audio host. After the audio host is decomposed by Lifting Wavelet Transform (LWT), then choose a subband from the output of LWT to be transformed by discrete cosine transform (DCT). Next, the matrix of the signal from DCT is selected for the singular value decomposition (SVD) process, so that is obtained U, S and V matrix. S matrix is embedded with the watermark. Before the embedding process, the watermark image is compressed by Compressive Sampling. The results show that the proposed watermarking system is highly robust against a kind attack of LPF, resampling, and linear speed change which is proven by its BER is zero.
Nowadays, digital watermarking has many
applications such as broadcast monitoring, owner identification,
proof of ownership, transaction tracking. Embedding a hidden
stream of bits in a file is called Digital Watermarking. This paper
introduces a LSB information hiding algorithm which can lift the
wavelet transform image. LSB based Steganography embeds the
hiding text message in least significant bit of the pixels. The
proposed method has good invisibility, robustness for a lot of
hidden attacks. As we think about the capacity lead us to think
about improved approach which can be achieved through
hardware implementation system by using Field Programmable
Gate Array (FPGA). In this paper hardware implementation of
digital watermarking system is proposed. MATLAB is used to
convert images into pixel-format files and to observe simulation
results. To implement this paper XPS & VB are needed. In XPS,
first select hardware & software components then by adding
source and header files & converting into bit streams and
download into FPGA, to obtain Stego image.
Abstract: Watermarking is mainly projected for copy right protection, data safeguard, and data thrashing, etc. Nowadays all the communication requires protection. Estimation of video quality has a major role in today’s video distribution, communication control and e-commerce. Consumer fulfillment is achieved by providing good quality. Here the video input is changed into frames and the image set as watermark is embedded into the frames. The embedding process is carried out using DWT, then the embedded frame and other remaining frames are again changed into video file and it is transmitted. At the receiver side watermark image is extracted from the video. Finally, by using metrics such as TDR, PSNR the quality of watermark image is estimated under distortion. All experiments and tests are carried out using MATLAB.
General Kalman Filter & Speech Enhancement for Speaker Identificationijcisjournal
Presence of noise increases the dimension of the information. A noise suppression algorithm is developed
with an idea of combining the General Kalman Filter and Estimate Maximization (EM) frame work.This
combination is helpful and effective in identifying noise characteristics of an acoustic environment.
Recursion between Estimate step and Maximization step enabled the algorithm to deal any model of noise.
The same Speech enhancement procedure in applied in the pre-processing stage of a conventional Speaker
identification method. Due to the non-stationary nature of noise and speech adaptive algorithms are
required. Algorithm is first applied for Speech enhancement problem and then extended to using it in the
pre-processing step of the Speaker identification. The present work is compared in terms of significant
metrics with existing and popular algorithms and results show that the developed algorithm is dominant
over them.
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...ijcisjournal
With the increase of modest technology, copy-move forgery detection has grown in a rapid rate that new
era of forged images came true which has the same resemblance as the old ones i.e. difficult to find out
with naked human perception. Fake currency detection is one in the effect that currency note is tampered in
a way such it has the similar resemblance as the original one. So in order to find out the duplicate or
forged portion of the image we go for different splicing algorithms using different techniques. Image
forgery results to various security issues. Hence an efficient algorithm is required to detect the forgery in
images. By using DCT algorithm blocks of the image are represented by DCT coefficients. Presence of
blocking articrafts in DCT makes the method to be a drawback. Hence we propose DWT for segmentation
of image. Lexicographical sorting is utilized to find out the cloned image blocks. Finally normalization is
applied to find the distance in between similar vectors. In DWT provides better resolution and
segmentation compared with DCT. In this paper, due to DWT, Image Forgery detection is done on lowlevel
image representation. By using DWT better accuracy in finding out the forgery is achieved in a less
time which gradually reduces complexity.
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmTELKOMNIKA JOURNAL
Ease process digital data information exchange impact on the increase in cases of copyright
infringement. Audio watermarking is one solution in providing protection for the owner of the work. This
research aims to optimize the insertion parameters on Modified Discrete Cosine Transform (M-DCT) based
audio watermarking using a genetic algorithm, to produce better audio resistance. MDCT is applied after
reading host audio, then embedding in MDCT domain is applied by Quantization Index Modulation (QIM)
technique. Insertion within the MDCT domain is capable of generating a high imperceptible watermarked
audio due to its overlapping frame system. The system is optimized using genetic algorithms to improve
the value of imperceptibility and robustness in audio watermarking. In this research, the average SNR
reaches 20 dB, and ODG reaches -0.062. The subjective quality testing on the system obtains an average
MOS of 4.22 out of five songs tested. In addition, the system is able to withstand several attacks. The use
of M-DCT in audio watermaking is capable of producing excellent imperceptibility and better watermark
robustness.
In Digital era sharing of images have become very
common and raises the risk of using it for unethical and
fraudulent purposes with the help of manipulation tools. Digital
image watermarking is one way to protect the digital information
(text, images, audio, and video) from fraudulent manipulations.
Digital Image Watermarking is a process of implanting data in
the original image for authentication. In this paper we are
providing one such watermarking scheme for color images. The
proposed method is designed to be robust for common attacks
with the aid of redundant discrete wavelet transform (RDWT)
and discrete cosine transform (DCT) properties. After applying
two levels RDWT decomposition to the blue channel of cover
image, we apply DCT to HH_LL subband i.e. 2nd level
decomposed coefficient of HH band and to the watermark.
Divided the HH_LL sub band into 4x4 subblocks and DCT
coefficients of the last subblock of the cover image are replaced
with the DCT coefficients of watermark. Inverse DCT and
inverse RDWT is performed to get watermarked image. The
performance of the proposed technique is measured using the
parameters PSNR and NCC.
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
Now a days there is use of digital multimedia applications are increased. Digital image watermarking techniques can be classified into spatial or transform domains. The spatial domain methods are the simplest watermarking techniques but have low robustness against different attacks, unlike the transform domains watermarking methods are more complex and have high robustness against various attacks. Most commonly used methods of watermarking are discrete cosine transform (DCT), discrete wavelet transform (DWT).A hybrid digital video watermarking scheme based on Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). These transform domain technique always give more robust output than DCT and DWT The video frames are first decomposed using DWT and the binary watermark is embedded in the principal components of the low frequency wavelet coefficients Here in order to improve the robustness of water mark Haar filtering must be used in order to get PSNR as much as possible Experimental result shows no visible difference between the watermarked frames and original frame. It shows robustness on the watermarked video against various attacks. Peak signal to noise ratio (PSNR) is calculated to measure efficiency of this all methods. And this value must be increased up to the level.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
Due to the rapid growth of internet and technology, protecting digital data is becoming very
urgent. In this paper a novel watermarking technique is proposed where both visible and invisible watermarks are embedded in a video. Digital data can be copied easily without any degradation in quality, so the protection of the data is necessary. Digital watermarking is a technology to embed additional information into the host signal to ensure security and protection of multimedia data. The video frames contain both the watermarks, so it is more robust to attacks. The watermarking scheme described here deals with embedding and extraction of the watermarks. Discrete Wavelet transform (DWT) is used to embed the invisible watermark and Peak Signal to Noise Ratio (PSNR) is calculated to measure efficiency of this method.
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
Robust audio watermarking based on transform domain and SVD with compressive ...TELKOMNIKA JOURNAL
The growth of the internet and digital data has resulted forgery, modification and sharing of digital data without property rights. Audio watermarking is one of a solution to protect the copyright of an audio from copyright infringement. This paper proposes an audio watermarking method which is robust against attacks and high capacity. First, a synchronization bit is added to the audio host. After the audio host is decomposed by Lifting Wavelet Transform (LWT), then choose a subband from the output of LWT to be transformed by discrete cosine transform (DCT). Next, the matrix of the signal from DCT is selected for the singular value decomposition (SVD) process, so that is obtained U, S and V matrix. S matrix is embedded with the watermark. Before the embedding process, the watermark image is compressed by Compressive Sampling. The results show that the proposed watermarking system is highly robust against a kind attack of LPF, resampling, and linear speed change which is proven by its BER is zero.
Nowadays, digital watermarking has many
applications such as broadcast monitoring, owner identification,
proof of ownership, transaction tracking. Embedding a hidden
stream of bits in a file is called Digital Watermarking. This paper
introduces a LSB information hiding algorithm which can lift the
wavelet transform image. LSB based Steganography embeds the
hiding text message in least significant bit of the pixels. The
proposed method has good invisibility, robustness for a lot of
hidden attacks. As we think about the capacity lead us to think
about improved approach which can be achieved through
hardware implementation system by using Field Programmable
Gate Array (FPGA). In this paper hardware implementation of
digital watermarking system is proposed. MATLAB is used to
convert images into pixel-format files and to observe simulation
results. To implement this paper XPS & VB are needed. In XPS,
first select hardware & software components then by adding
source and header files & converting into bit streams and
download into FPGA, to obtain Stego image.
Abstract: Watermarking is mainly projected for copy right protection, data safeguard, and data thrashing, etc. Nowadays all the communication requires protection. Estimation of video quality has a major role in today’s video distribution, communication control and e-commerce. Consumer fulfillment is achieved by providing good quality. Here the video input is changed into frames and the image set as watermark is embedded into the frames. The embedding process is carried out using DWT, then the embedded frame and other remaining frames are again changed into video file and it is transmitted. At the receiver side watermark image is extracted from the video. Finally, by using metrics such as TDR, PSNR the quality of watermark image is estimated under distortion. All experiments and tests are carried out using MATLAB.
General Kalman Filter & Speech Enhancement for Speaker Identificationijcisjournal
Presence of noise increases the dimension of the information. A noise suppression algorithm is developed
with an idea of combining the General Kalman Filter and Estimate Maximization (EM) frame work.This
combination is helpful and effective in identifying noise characteristics of an acoustic environment.
Recursion between Estimate step and Maximization step enabled the algorithm to deal any model of noise.
The same Speech enhancement procedure in applied in the pre-processing stage of a conventional Speaker
identification method. Due to the non-stationary nature of noise and speech adaptive algorithms are
required. Algorithm is first applied for Speech enhancement problem and then extended to using it in the
pre-processing step of the Speaker identification. The present work is compared in terms of significant
metrics with existing and popular algorithms and results show that the developed algorithm is dominant
over them.
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...ijcisjournal
With the increase of modest technology, copy-move forgery detection has grown in a rapid rate that new
era of forged images came true which has the same resemblance as the old ones i.e. difficult to find out
with naked human perception. Fake currency detection is one in the effect that currency note is tampered in
a way such it has the similar resemblance as the original one. So in order to find out the duplicate or
forged portion of the image we go for different splicing algorithms using different techniques. Image
forgery results to various security issues. Hence an efficient algorithm is required to detect the forgery in
images. By using DCT algorithm blocks of the image are represented by DCT coefficients. Presence of
blocking articrafts in DCT makes the method to be a drawback. Hence we propose DWT for segmentation
of image. Lexicographical sorting is utilized to find out the cloned image blocks. Finally normalization is
applied to find the distance in between similar vectors. In DWT provides better resolution and
segmentation compared with DCT. In this paper, due to DWT, Image Forgery detection is done on lowlevel
image representation. By using DWT better accuracy in finding out the forgery is achieved in a less
time which gradually reduces complexity.
Performance Analsis of Clipping Technique for Papr Reduction of MB-OFDM UWB S...ijcisjournal
Multiband Orthogonal Frequency Division Multiplexing (MB-OFDM) is used as efficacious procedure for
ultra-wideband (UWB) wireless communication applications, which divides the spectrum into various subbands,
whose bandwidth is approximately 500MHz. Major arduousness in multiband-OFDM is ,it have
very large peak to average power ratio value which causes the signal to enter into dynamic region that
consequence in the loss of orthogonal properties and results in the interference of the carrier signals which
crops the amplifier saturation and finally limits the capacity of the system. Many PAPR amortize
algorithms have reported in the survey and pre-coding is PAPR reduction which is inserted after
modulation in the OFDM system. The Existing work presents the reduction of that value by different
clipping techniques namely Classical-Clipping (CC), Heavy side-Clipping (HC), Deep-Clipping (DC) and
Smooth-Clipping (SC) and their comparison analysis is done. Every clipping method is best at its own
level .The proficiency of these strategies are evaluated in locutions of average power disparity, complete
system decadence and PAPR reduction. Finally results show the MB OFDM yields better performance to
reduce PAPR in effective way.
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONijcisjournal
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock
cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the
eavesdropper. The security analysis of the protocol is presented with coherent states under the interceptresend
attack, the photon number splitting attack, and the man-in-the-middle attack. It is found that the mean photon number can be much larger 1. This complements the recent interest in multi-photon quantum communication protocols that require a pre-shared key between the legitimate users.
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...ijcisjournal
Cloud computing technology provides various internet-based services. Many cloud computing vendors are offering cloud services through their own service mechanism. These mechanisms consist of various service parameters such as authentication, security, performance, availability, etc. Customer can access these cloud services through web browsers using http protocols. Each protocol has its own way of achieving the request-response services, authentication, confidentiality and etc. Cloud computing is an internet-based technology, which provides Infrastructure, Storage, Platform services on demand through a browser using HTTP protocols. These protocol features can be enhanced using cloud specific protocol, which provides strong authentication, confidentiality, security, integrity, availability and accessibility. We are proposing and presenting the secure cloud transmission protocol (SCTP) engineering phases which sits on top of existing http protocols to provide strong authentication security and confidentiality using multi-models. SCTP has multi-level and multi-dimensional approach to achieve strong authentication and multi-level security technique to achieve secure channel. This protocol can add on to existing http protocols. It can be used in any cloud services. This paper presents proposed Protocol engineering phases such as Service Specification, Synthesis, Analysis, Modelling, and Implementation model with test suites. This paper is represents complete integration of our earlier proposed and published multilevel techniques
Agile development methods are commonly used to iteratively develop the information systems and they can
easily handle ever-changing business requirements. Scrum is one of the most popular agile software
development frameworks. The popularity is caused by the simplified process framework and its focus on
teamwork. The objective of Scrum is to deliver working software and demonstrate it to the customer faster
and more frequent during the software development project. However the security requirements for the
developing information systems have often a low priority. This requirements prioritization issue results in
the situations where the solution meets all the business requirements but it is vulnerable to potential
security threats.
The major benefit of the Scrum framework is the iterative development approach and the opportunity to
automate penetration tests. Therefore the security vulnerabilities can be discovered and solved more often
which will positively contribute to the overall information system protection against potential hackers.
In this research paper the authors propose how the agile software development framework Scrum can be
enriched by considering the penetration tests and related security requirements during the software
development lifecycle. Authors apply in this paper the knowledge and expertise from their previous work
focused on development of the new information system penetration tests methodology PETA with focus on
using COBIT 4.1 as the framework for management of these tests, and on previous work focused on
tailoring the project management framework PRINCE2 with Scrum.
The outcomes of this paper can be used primarily by the security managers, users, developers and auditors.
The security managers may benefit from the iterative software development approach and penetration tests
automation. The developers and users will better understand the importance of the penetration tests and
they will learn how to effectively embed the tests into the agile development lifecycle. Last but not least the
auditors may use the outcomes of this paper as recommendations for companies struggling with
penetrations testing embedded in the agile software development process.
Blind Image Quality Assessment with Local Contrast Features ijcisjournal
The aim of this research is to create a tool to evaluate distortion in images without the information about
original image. Work is to extract the statistical information of the edges and boundaries in the image and
to study the correlation between the extracted features. Change in the structural information like shape and
amount of edges of the image derives quality prediction of the image. Local contrast features are effectively
detected from the responses of Gradient Magnitude (G) and Laplacian of Gaussian (L) operations. Using
the joint adaptive normalisation, G and L are normalised. Normalised values are quantized into M and N
levels respectively. For these quantised M levels of G and N levels of L, Probability (P) and conditional
probability(C) are calculated. Four sets of values namely marginal distributions of gradient magnitude Pg,
marginal distributions of Laplacian of Gaussian Pl, conditional probability of gradient magnitude Cg and
probability of Laplacian of Gaussian Cl are formed. These four segments or models are Pg, Pl, Cg and Cl.
The assumption is that the dependencies between features of gradient magnitude and Laplacian of
Gaussian can formulate the level of distortion in the image. To find out them, Spearman and Pearson
correlations between Pg, Pl and Cg, Cl are calculated. Four different correlation values of each image are
the area of interest. Results are also compared with classical tool Structural Similarity Index Measure
Wavelet Based on the Finding of Hard and Soft Faults in Analog and Digital Si...ijcisjournal
In this paper methods for testing both software and hardware faults are implemented in analog and digital
signal circuits are presented. They are based on the wavelet transform (WT). The limit which affected by
faults detect ability, for the reference circuits is set by statistical processing data obtained from a set of
faults free circuits .In wavelet analysis it has two algorithm one is based on a discrimination factor using
Euclidean distances and the other mahalanobis distances, are introduced both methods on wavelet energy
calculation. Simulation result from proposed test methods in the testing known analog and digital signal
circuit benchmark are given. The results shows that effectiveness of existing methods two test metrics
against three other test methods, namely a test method based on rms value of the measured signal, a test
method utilizing the harmonic magnitude component of the measured signal waveform
A 130-NM CMOS 400 MHZ 8-Bit Low Power Binary Weighted Current Steering DAC ijcisjournal
A low power low voltage 8-bit Digital to Analog Converter consisting of different current sources in binary
weighted array architecture is designed. The weights of current sources are depending on the binary
weights of the bits. This current steering DAC is suitable for high speed applications. The proposed DAC in
this paper has DNL, INL of ±0.04, ±0.05 respectively and the power consumption of 16.67mw.
This binary array architecture is implemented in CMOS 0.13µm 1P2M technology has good performances
in DNL, INL and area compared with other researches.
To the networks rfwkidea32 16, 32-8, 32-4, 32-2 and rfwkidea32-1, based on th...ijcisjournal
In this article, based on a network IDEA32-16, we have developed 5 new networks:RFWKIDEA32-16,RFWKIDEA32-8,
RFWKIDEA32-4, RFWKIDEA32-2, RFWKIDEA32, that do
not use round keys in round functions. It shows that in offered networks such Feistel network,
encryption and decryption using the same algorithm as a round function can be used any
transformation.
High Capacity Image Steganography Using Adjunctive Numerical Representations ...ijcisjournal
LSB steganography is a one of the most widely used methods for implementing covert data channels in
image file exchanges [1][2]. The low computational complexity and implementation simplicity of the algorithm are significant factors for its popularity with the primary reason being low image distortion. Many attempts have been made to increase the embedding capacity of LSB algorithms by expanding into the second or third binary layers of the image while maintaining a low probability of detection with minimal distortive effects [2][3][4]. In this paper,we introduce an advanced technique for covertly embedding data within images using redundant number system decomposition over non -standard digital bit planes. Both grayscale and bit-mapped images are equally effective as cover files. It will be shown that this unique steganography method has minimal visual distortive affects while also preserving the cover file statistics, making it less susceptible to most general steganography detection algorithms.
An efficient algorithm for sequence generation in data miningijcisjournal
Data mining is the method or the activity of analyzing data from different perspectives and summarizing it
into useful information. There are several major data mining techniques that have been developed and are
used in the data mining projects which include association, classification, clustering, sequential patterns,
prediction and decision tree. Among different tasks in data mining, sequential pattern mining is one of the
most important tasks. Sequential pattern mining involves the mining of the subsequences that appear
frequently in a set of sequences. It has a variety of applications in several domains such as the analysis of
customer purchase patterns, protein sequence analysis, DNA analysis, gene sequence analysis, web access
patterns, seismologic data and weather observations. Various models and algorithms have been developed
for the efficient mining of sequential patterns in large amount of data. This research paper analyzes the
efficiency of three sequence generation algorithms namely GSP, SPADE and PrefixSpan on a retail dataset
by applying various performance factors. From the experimental results, it is observed that the PrefixSpan
algorithm is more efficient than other two algorithms.
Gait Based Person Recognition Using Partial Least Squares Selection Scheme ijcisjournal
The variations of viewing angle and intra-class of human beings have great impact on gait recognition
systems. This work represents an Arbitrary View Transformation Model (AVTM) for recognizing the gait.
Gait energy image (GEI) based gait authentication is effective approach to address the above problem, the
method establishes an AVTM based on principle component analysis (PCA). Feature selection (FS) is
performed using Partial least squares (PLS) method. The comparison of the AVTM PLS method with the
existing methods shows significant advantages in terms of observing angle variation, carrying and attire
changes. Experiments evaluated over CASIA gait database, shows that the proposed method improves the
accuracy of recognition compared to the other existing methods.
Cryptography is an art and science of secure communication. Here the sender and receiver are guaranteed
the security through encryption of their data, with the help of a common key. Both the parties should agree
on this key prior to communication. The cryptographic systems which perform these tasks are designed to
keep the key secret while assuming that the algorithm used for encryption and decryption is public. Thus
key exchange is a very sensitive issue. In modern cryptographic algorithms this security is based on the
mathematical complexity of the algorithm. But quantum computation is expected to revolutionize computing
paradigm in near future. This presents a challenge amongst the researchers to develop new cryptographic
techniques that can survive the quantum computing era. This paper reviews the radical use of quantum
mechanics for cryptography
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
Cryptanalysis of block ciphers involves massive computations which are independent of each other and can
be instantiated simultaneously so that the solution space is explored at a faster rate. With the advent of low
cost Field Programmable Gate Arrays (FPGA’s), building special purpose hardware for computationally
intensive applications has now become possible. For this the Data Encryption Standard (DES) is used as a
proof of concept. This paper presents the design for Hardware implementation of DES cryptanalysis on
FPGA using exhaustive key search. Two architectures viz. Rolled and Unrolled DES architecture are compared
and based on experimental result the Rolled architecture is implemented on FPGA. The aim of this
work is to make cryptanalysis faster and better.
Copy Move Forgery Detection Using GLCM Based Statistical Features ijcisjournal
The features Gray Level Co-occurrence Matrix (GLCM) are mostly explored in Face Recognition and
CBIR. GLCM technique is explored here for Copy-Move Forgery Detection. GLCMs are extracted from all
the images in the database and statistics such as contrast, correlation, homogeneity and energy are
derived. These statistics form the feature vector. Support Vector Machine (SVM) is trained on all these
features and the authenticity of the image is decided by SVM classifier. The proposed work is evaluated on
CoMoFoD database, on a whole 1200 forged and processed images are tested. The performance analysis
of the present work is evaluated with the recent methods.
Fault Detection in Mobile Communication Networks Using Data Mining Techniques...ijcisjournal
A collection of datasets is Big data so that it to be To process huge and complex datasets becomes difficult.
so that using big data analytics the process of applying huge amount of datasets consists of many data
types is the big data on-hand theoretical models and technique tools. The technology of mobile
communication introduced low power ,low price and multi functional devices. A ground for data mining
research is analysis of data pertaining to mobile communication is used. theses mining frequent patterns
and clusters on data streams collaborative filtering and analysis of social network. The data analysis of
mobile communication has been often used as a background application to motivate many technical
problem in data mining research. This paper refers in mobile communication networking to find the fault
nodes between source to destination transmission using data mining techniques and detect the faults using
outliers. outlier detection can be used to find outliers in multivariate data in a simple ensemble way.
Network analysis with R to build a network.
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform ijfcstjournal
In this paper an efficient & robust non-blind watermarking technique based on multi-resolution geometric
analysis named curvelet transform is proposed. Curvelet transform represent edges along curve much more
efficiently than the wavelet transform and other traditional transforms. The proposed algorithm of
embedding watermark in different scales in curvelet domain is implemented and the results are compared
using proper metric. The visual quality of watermarked image, efficiency of data hiding and the quality of
extracted watermark of curvelet domain embedding techniques with wavelet Domain at different number of
decomposition levels are compared. Experimental results show that embedding in curvelet domain yields
best visual quality in watermarked image, the quality of extracted watermark, robustness of the watermark
and the data hiding efficiency.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing day by day. So it becomes very essential to protect multimedia information from piracy and also it is challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of their information. Hence, facing all these kinds of problems development of the techniques is very important. Digital watermarking considered as a solution to prevent the multimedia data. In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method, the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying the singular values of these bands. Extraction of watermark is performed by the inversion of watermark embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that ensures good imperceptibility and more robustness against different kinds of attacks.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing
day by day. So it becomes very essential to protect multimedia information from piracy and also it is
challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of
their information. Hence, facing all these kinds of problems development of the techniques is very
important. Digital watermarking considered as a solution to prevent the multimedia data.
In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method,
the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then
DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying
the singular values of these bands. Extraction of watermark is performed by the inversion of watermark
embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that
ensures good imperceptibility and more robustness against different kinds of attacks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...ijma
Watermark bits embedded in audio signals considering the sample’s relative state in a frame may
strengthen the attack-invariant features of audio watermarking algorithm. In this work, we propose to
embed watermarks in an audio signal considering the relation between the mean values of consecutive
groups of samples which shows robustness by overcoming common watermarking challenges. Here, we
divide the host audio signal into equal-sized non-overlapping frames which in turn is split into four equalsized non-overlapping sub-frames. After, transforming these sub-frames in cepstrum domain we finally use
the relation between the differences of first two sub-frames and last two sub-frames to embed watermarks.
Depending on the watermark bit (either 0 or 1) to be embed, our embedding technique either interchange
or update the differences between these groups of samples by distorting the sample values in sub-frames
selectively. Thus, watermarks are embedded by making a little or no distortion of the sub-frames which
helps our scheme to be imperceptible in nature. Moreover, use of such embedding technique lead our
watermarking scheme to a computationally less complex extraction method. Simulation results also justify
our claim of the proposed scheme to be both robust and imperceptible.
A robust audio watermarking in cepstrum domain composed of sample's relation ...ijma
Watermark bits embedded in audio signals considering the sample’s relative state in a frame may
strengthen the attack-invariant features of audio watermarking algorithm. In this work, we propose to
embed watermarks in an audio signal considering the relation between the mean values of consecutive
groups of samples which shows robustness by overcoming common watermarking challenges. Here, we
divide the host audio signal into equal-sized non-overlapping frames which in turn is split into four equalsized
non-overlapping sub-frames. After, transforming these sub-frames in cepstrum domain we finally use
the relation between the differences of first two sub-frames and last two sub-frames to embed watermarks.
Depending on the watermark bit (either 0 or 1) to be embed, our embedding technique either interchange
or update the differences between these groups of samples by distorting the sample values in sub-frames
selectively. Thus, watermarks are embedded by making a little or no distortion of the sub-frames which
helps our scheme to be imperceptible in nature. Moreover, use of such embedding technique lead our
watermarking scheme to a computationally less complex extraction method. Simulation results also justify
our claim of the proposed scheme to be both robust and imperceptible.
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to DWT Based Audio Watermarking Schemes : A Comparative Study (20)
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
DWT Based Audio Watermarking Schemes : A Comparative Study
1. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
DOI: 10.5121/ijci.2016.5420 173
DWT BASED AUDIO WATERMARKING SCHEMES:A
COMPARATIVE STUDY
N.V.Lalitha1
Ch. Srinivasa Rao2
and P.V.Y.JayaSree3
1
Department of Electronics and Communication Engineering, GMR Institute and
Technology, Rajam, A.P, India.
2
Department of Electronics and Communication Engineering, JNTU-K University,
Vizianagaram, A.P, India.
3
Department of Electronics and Communication Engineering, GIT, GITAM University,
Visakhapatnam, A.P, India.
ABSTRACT
The main problem encountered during multimedia transmission is its protection against illegal distribution
and copying. One of the possible solutions for this is digital watermarking. Digital audio watermarking is
the technique of embedding watermark content to the audio signal to protect the owner copyrights. In this
paper, we used three wavelet transforms i.e. Discrete Wavelet Transform (DWT), Double Density DWT
(DDDWT) and Dual Tree DWT (DTDWT) for audio watermarking and the performance analysis of each
transform is presented. The key idea of the basic algorithm is to segment the audio signal into two parts,
one is for synchronization code insertion and other one is for watermark embedding. Initially, binary
watermark image is scrambled using chaotic technique to provide secrecy. By using QuantizationIndex
Modulation (QIM), this method works as a blind technique. The comparative analysis of the three methods
is made by conducting robustness and imperceptibility tests are conducted on five benchmark audio
signals.
KEYWORDS
Discrete Wavelet Transform (DWT), Double Density DWT (DDDWT) and Dual Tree DWT (DTDWT),
Quantization Index Modulation (QIM)
1. INTRODUCTION
The swift growth in multimedia technology and the usage of internet, the major problem facing
by the owners is unauthorized copying, transmission and distribution of multimedia content.The
most common solutionfor protection of copyright is digital watermarking [1, 2]. Watermarking is
the process, in which watermark content is embedded into the digital content. Digital content may
be audio, image or video. Developing audio watermarking algorithms are not that much easy
[3,4] compared to image and video watermarking,. Firstly, Human Auditory System (HAS) is
much sensitive than Human Visual System (HVS). Therefore, even small changes in audio are
also recognized by the human ear. Secondly, video files are large compared to audio files in terms
of size. Hence, data hidden in audio files is quietly large compared with the image or video and
this high payload tends to degrade the audio quality. Therefore, trade-off exists between
robustness and imperceptibility.
2. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
174
Recently, several audio watermarking algorithms are developed. Most of the algorithms are based
on either time domain [5,6] or transform domain [7,8,9,10,11]. Watermarking in time domain is
easier to implement and needs less computational resources thanwatermarking in transform
domain [3,8] but, it is less robust against common signal processing attacks when compared to
transform domain watermarking. Generally, Fast Fourier Transform (FFT)[11], Discrete Cosine
Transform (DCT) [9], and Discrete Wavelet Transform (DWT)[10] are explored for transform
domain audio watermarking.
Still, there is a need for robust and high secured audio watermarking algorithms. In this paper, the
chaotic Gaussian map is used to encrypt the watermark image. The Logistic chaotic sequence is
used to develop synchronization code. Then, the watermark is embedded in
DWT/DDDWT/DTDWT coefficients of audio signal using QIM.
2. METHODS
2.1. Discrete Wavelet Transform (DWT)
The analysis filters (a1 and a2) decomposes the input signal x(n) into two sub-bands i.e., low-pass
frequency band (c(n)) and high frequency band (d(n)) and each of which is then down-sampled
by 2. The two sub-bands (c(n) and d(n)) are up-sampled by 2 and the synthesis filters (s1 and s2)
combines the two sub-bands to acquire a single signal y(n)[12] shown in Figure 1.
Figure 1. DWT decompose and combined process.
2.2. Double Density DWT (DDDWT)
Double –Density DWT [12] makes use of two distinct wavelets and a single scaling function. The
analysis filters decomposes the x(n) signal into three bands, and every sub-band is down-sampled
by 2. The filter bank for analysis consists of one low-pass filter (a1) and two high pass filters (a2
and a3). The synthesis filter bank consists of one low-pass filter (s1) and two high pass filters (s2
and s3). These3 sub-band coefficients pass through the system are up-sampled by two,
synthesized and then combined to develop the signal y(n) shown in Figure 2.
Figure 2. DDDWT decompose and combined process.
2
y(n)
s2
s122
2a2
a1 c(n)
d(n)
x(n)
d1(n) y(n)
c(n) s12
x(n)
2a1
2a2
d2(n)2
s22
s32
3. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
175
2.3. Dual Tree DWT (DTDWT)
The dual tree DWT of a signal x(n) is a parallel combination of two DWTs [13]. Therefore, it is
2-times expensive than DWT. The filters are chosen in a way that the upper DWT can be inferred
as real part of the wavelet and lower DWT can be inferred as imaginary part of wavelet [14] and
is shown in Figure 3.
Figure 3. DTDWT decompose and combined process.
3. SYNCHRONIZATION CODE GENERATION AND INSERTION
The synchronization code [7,8,9] is used to resist the de-synchronization attacks.
Desynchronization attack means the watermark cannot be recognized from the watermarked
audio because of lack of synchronization. Desynchronization attacks are cropping, shifting and
MP3 compression, they will change the audio signal length, which leads to unsuccessful
extraction of the watermark.To overcome this problem, exact location of the watermark should be
identified before the extraction process. For synchronization code generation, the logistic chaotic
sequence is used, that is defined as:
= (1 − ) (1)
Where is the initial value that is from 0 to 1, is the real parameter.
Synchronization code is generated using eq(1) based on the following condition.
2
2h2
h1
2
2h2
h1
x(n)
g1 2
g2 2
g1 2
g2 2
g1 2
g2 2
2
2h2
h1
4. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
176
=
1, > 1/2
0, ℎ
(2)
The host audio A is divided into two parts and . Synchronization code that is generated
from the eq(2) is hosted into the first part of audio signal with length LS is embedded as
follows:
( ) = "
# $ %
&'( )
(
) ∗ +, = 0
( , (
&'( )
(
) ∗ +) +
(
.
, = 1
(3)
where + is the embedding strength.
Embedded and attacked watermarked audio signal is also split into two parts. From first part of
watermarked signal synchronization code will be detected with following condition.
=
0, +/4 ≤ 1 $( ( ), +) < 3+/4
1, ℎ
(4)
4. WATERMARK EMBEDDING AND EXTRACTION
4.1. Pre-processing of a Watermark
To improve the security and robustness, watermark image must be pre-processed by using chaotic
scrambling technique. Gaussian map [11] is one of the chaotic encryption methods. Gaussian
map chaotic encryption technique is defined as:
4 = (56(78)9)
+ : (5)
Where z1 is the initial value that ranges from 0 to 1. ; and : are the real parameters.
< =
1, 4 > =ℎ
0, ℎ
(6)
Where=ℎ is the predefined threshold. Two dimensional binary watermark is converted into a
vector of size M X M. This is encrypted by < using following condition:
> = ?@A( , < ) (7)
4.2. Watermark Concealing Procedure
The watermark concealing procedure is given in Figure 4 . In this procedure, total audio signal is
segmented into two parts. The synchronization code is insert in audio signal first part to
overcome the de-synchronization attacks. The audio signal second part is used to host the pre-
processed watermark image.
5. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
177
Figure 4. Flowchart of watermark embedding process.
The concealing procedure is detailed as follows:
Step 1: Apply DWT/DDDWT/DTDWT on second part of audio signal.
Step 2: Wavelet coefficients are segmented into frames, and number of frames must be greater
than the watermark size.
Step 3: The pre-processed watermark is embedded into each frame using the following rule.
B′
( ) = "
# $ %
CD( )
E
) ∗ F, > = 0
( , (
CD( )
E
) ∗ F) +
E
.
, > = 1
(8)
where F is the embedding strength.
Step 4: Reconstruct the modified frames.
Step 5: Apply inverse wavelet transform on watermarked audio.
4.3. Extraction Algorithm
The process of extraction is the exact reverse process of concealing process and the algorithm is
given below:
Part A
Synchronization
code insertion
Embedding
Watermarked
Audio
Frame
Reconstruction
Inverse Wavelet
Transforma3
Binary
Watermark
Image
Pre-processing
Original
Audio
Part B
Synchronization
code generation
Segmented
into frames
DWT / DDDWT
/ DTDWT
6. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
178
Step1: Apply DWT/DDDWT/DTDWT on the second part of attacked watermarked audio signal.
Step2: Wavelet coefficients are segmented into frames.
Step3: Binary encrypted watermark vector is extracted from each frame by using following
equation.
G′
=
0, F/4 ≤ 1 $(B′′
( ), F) < 3F/4
1, ℎ
(9)
Step4: The decryption process is same as encryption to determine the binary watermark sequence.
Step5: Finally, convert the one dimensional extracted and decrypted binary sequence into two
dimensional watermark image of size M X M.
5. SIMULATION RESULTS
The experimental results give the comparative analysis of the three methods. The performance of
the three methods iscompared in terms of robustness, imperceptibility and payload. The
experiment is carried on 5 different types of 16-bit audio signals in the .WAV format with the
sampling rate 44.1 kHz. Each audio is of 10sec duration.
Binary image of 64 X 64 size is used as a watermark. For increasing the security of the
watermark, a Gaussian map chaotic encryption technique is used. Figure 5 illustrates Original and
encrypted watermark images.
Figure 5. Original watermark and its encrypted watermark images.
5.1. Imperceptibility Test
The audio signal quality should not be degraded upon embedding. The two approaches to perform
the perceptual audio quality evaluation [15]. i) Objective test by perceptual evaluation of audio
signal ii) Subjective listening test based on HAS.
i) Objective evaluation test:
To evaluate the objective quality, SNR metric is used. International Federation of the
Phonographic Industry (IFPI) quotes that watermarked audio should have SNR more than 20dB
[8]. SNR Vs Quantization step for three methods are shown in Figure 6.
7. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
179
Figure 6. SNR Vs Quantization step Table 1. SNR in dB for benchmark audio
Table 1 shows the SNR values and their average SNRs for different classes of benchmark audio
signals at Q=0.07 are above 20dB and hence meets IFPI requirement.
ii) Subjective Listening Test:
The SNR measure is not sufficient to measure imperceptibilty [8]. Therefore, subjective listening
test is also important to evaluate the imperceptibility. Subjective Difference Grade (SDG) is a
popular method to evaluate the watermarked audio quality [11]. Table 2 shows the SDG ranges,
which is from 5.0 to 1.0. This listening test is performed with ten listeners. Subjects are listened
original and watermarked audio signals and they report if any variation is identified between two
signals using SDG. The average SDG values are also called as Mean Opinion Score (MOS). The
MOS values for DWT,DDDWT and DTDWT is 4.5, 4.8 and 4.7 respectively at Q=0.07.
Table 2. SDG Ranges
Report by subject Quality Grade
Imperceptible Excellent 5
Perceptible, but not annoying Good 4
Slightly annoying Fair 3
Annoying Poor 2
Very annoying Bad 1
5.2. Robustness Test
Robustness of this scheme is evaluated with the below attacks on watermarked audio.
i) Resampling: The watermarked audio is resampled to 22.05 kHz, 11 kHz and 8
kHz and sampled back to 44.1 kHz.
ii) Re-quantization: Quantized down to 8-bit and re-quantized back to 16-bit.
iii) Noise: Added with random noise of 30dB signal.
iv) Low-pass Filtering: Cut-off frequency of 20 kHz is applied.
v) Echo addition: 10 ms and 1% decay of echo signal is added.
vi) MP3 Compression: 128 kbps and 256 kbps MPEG compression is applied to the
watermarked audio signal and then decoded back to the .WAV format.
DWT DDDWT DTDWT
Audio-1 31.1205 41.0349 27.7986
Audio-2 42.311 30.6061 27.2856
Audio-3 41.2256 27.0774 53.433
Audio-4 58.0209 41.3026 48.2897
Audio-5 29.8392 36.1878 36.0735
Average 40.5034 35.2417 38.5760
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.11
15
20
25
30
35
40
45
50
55
60
Quantization Step
SNR(dB)
SNR Vs Quantization Step for different methods
DWT
DDT
DT
8. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
180
vii) Additive Noise: Additive Gaussian Noise with 50 dB and 60 dB.
viii) Cropping: 1000 samples of the watermarked audio signal are made zero at
beginning, middle and ending parts.
ix) Signal Addition: Beginning samples are added with original audio samples.
x) Signal Subtraction: Watermarked audio signal beginning samples are subtracted
with original audio samples.
For comparison of original watermark and extracted watermark, Bit Error Rate (BER) and
Normalized Correlation (NC) are used.
BER =
KLMNOP QR OPPQP NSTU
KLMNOP QR TQTVW NSTU
(10)
XY =
∑ ∑ ([]5[^)(_]5_^)]
`∑ ∑ ([]5[^)9
] ∑ ∑ (_]5_^)9
]
(11)
Table 3 shows BER and NC for all mentioned signal processing attacks for three methods
at Q=0.07.
Table 3. BER and NC values for signal processing attacks.
Method DWT DDDWT DTDWT
Signal Processing Attack BER NC BER NC BER NC
Without attack 0 1 0 1 0.0002 0.9994
Resampling(22.05kHz) 0.0007 0.9982 0 1 0.1182 0.7316
Resampling(11kHz) 0.1741 0.6096 0.1528 0.6508 0.3726 0.2303
Resampling(8kHz) 0 1 0 1 0.0012 0.9971
Re-quantization 0 1 0 1 0.0447 0.8954
Noise 0 1 0 1 0.0059 0.9861
Filtering 0 1 0.0002 0.9994 0.0269 0.9363
Echo addition 0 1 0.0002 0.9994 0.0203 0.952
MP3 Compression (256) 0 1 0 1 0.0063 0.9848
MP3 Compression (128) 0.0004 0.9988 0.0012 0.9971 0.0354 0.9167
Additive Noise (50dB) 0 1 0 1 0.0591 0.863
Additive Noise (60) 0 1 0 1 0.0146 0.9651
Cropping (middle) 0 1 0 1 0.0002 0.9994
Cropping (end) 0 1 0 1 0.0002 0.9994
Cropping (front) 0.0022 0.9948 0.0022 0.9948 0.0024 0.9942
Signal Addition 0.002 0.9953 0.0022 0.9948 0.0022 0.9948
Signal Subtraction 0.002 0.9953 0.0022 0.9948 0.0024 0.9942
6. CONCLUSIONS
The performance of DWT based audio watermarking schemes viz., DWT, DDDWT and DTDWT
is analyzed. SNR is above 20 dB for all the three schemes. The watermarked signal is tested
against various signal processing attacks for different classes of audio signals and the
performance parameters BER and NC are obtained. The parameters shows that DDDWT
9. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
181
outperforms DTDWT for different values of quantization step. Also, DDDWT performance is
almost nearer to DWT scheme.
REFERENCES
[1] I.Cox, M.Miller, J.Bloom, J.Fridrich, T.Kalke, “Digital Watermarking and steganography”, Second
Edition, Morgan Kaufmann, Burlington, MA, 2007.
[2] M.Swanson, M.Kobayashi, A.Tewfik, “Multimedia data embedding and watermarking techniques”,
Proc.IEEE 86 (1998) 1064-1087.
[3] E.Ercelebi, L.Batakci, “Audio watermarking scheme based on embedding strategy in low frequency
components with a binary image”, Digital Signal Processing, Vol.19, pp 265-277, 2009.
[4] M.D.Swanson, B.Zhu, A.H.Tewfik, L.Boney, “Robust audio watermarking using perceptual
masking”, Signal processing, 66(3), pp.337-355, 1998.
[5] Lie W.N, Chang L.C, “Robust high quality time domain audio watermarking based on low frequency
amplitude modification”, IEEE Transactions on Multimedia, 8(1), pp.46-59, 2006.
[6] P.Basia, I.Pitas, N.Nikolaidis, “Robust audio watermarking in the time domain”, IEEE Transactions
on Multimedia, 3(2), pp. 232-241, 2001.
[7] X.Y.Wang, H.Zhao, “A novel synchronization invariant audio watermarking scheme based on DWT
and DCT”, IEEE Transactions on Signal Processing, 54(12) pp. 4835-4840,2006.
[8] Lei, I.Y.Soon, F.Zhou, Z.Li, H.Lei, “A robust audio watermarking scheme based on lifting wavelet
transform and singular value decomposition”, Signal Processing, Vo. 92, pp. 1985-2001, 2012.
[9] B.Y.Lei, I.Y.Soon, Z.Li, “Blind and robust audio watermarking scheme based on SVD-DCT”, Signal
Processing, Vo. 91, pp. 1973-1984, 2011.
[10] V.Bhat K, I. Sengupta, A. Das, "An adaptive audio watermarking based on the singular value
decomposition in the wavelet domain", Digital Signal Processing 20 (2010) 1547-1558.
[11] P.K.Dhar, T.Shimamura, “Audio watermarking in transform domain based on singular value
decomposition and Cartesian-Polar Transformation”, International Journal of Speech Technology,
Vol.17, pp.133-144, 2014.
[12] Ivan W.Selesnick,“The Double Density DWT”, http://eeweb.poly.edu/iselesni/double/double.pdf
[13] N.Kingsbury, “Image Processing with complex wavelets”, Phil.Trans. R. Soc. London A, 1997.
[14] N.G. Kingsbury, “The dual-tree complex wavelet transform: A new technique for shift invariance and
directional filters”, in proceedings of Eighth IEEE DSP Workshop, Salt Lake City, UT, Aug,9-12,
1998.
[15] Y.Q.Lin, W.H.Abdulla, “Perceptual Evaluation of Audio Watermarking using Objective Quality
Measures”, in proceedings of the IEEE International Conference on Acoustics, Speech and Signal
Processing, 2008, pp. 1745-1748.
10. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
182
AUTHORS
N. V. Lalitha is presently pursuing PhD at GIT, GITAM University. She obtained her
M.Tech from Jawaharlal Nehru Technological University, Kakinada and B.Tech from
Jawaharlal Nehru Technological University. Presently, she is working as Assistant professor
in the Department of Electronics and Communication Engineering at GMR Institute of
Technology, Rajam, Srikakulam District. Her research interests are Audio and Image
Processing. She is a Life Member of IETE.
Srinivasa Rao Ch is currently working as Professor in the Department of ECE, JNTUK
University College of Engineering, Vizianagaram, AP, India. He obtained his PhD in Digital
Image Processing area from University College of Engineering, JNTUK, Kakinada, AP,
India. He received his M. Tech degree from the same institute. He published 40 research
papers in international journals and conferences. His research interests are
DigitalSpeech/Image and Video Processing, Communication Engineering and Evolutionary
Algorithms. He is a Member of CSI. Dr Rao is a Fellow of IETE.
P. V. Y. Jayasree is currently working as Associate Professor in the Department of ECE,
GIT, GITAM University. She obtained her PhD from University College of Engineering,
JNTUK, Kakinada, AP, India. She received M.E. from Andhra University. She published
more than 50 research papers in international journals and conferences. Her research interests
are Signal Processing, EMI/EMC, RF & Microwaves.