SlideShare a Scribd company logo
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 3 Issue 11 ǁ November. 2015 ǁ PP.40-48
www.ijres.org 40 | Page
Evaluation of Two-Set Algorithm in Embedding a Watermark
into an Audio Signal
C. Aquino1
,E. Perez2
, C. Aguilar3
1
esime Culhuacan, National Polytechnic Institute.
2
esime Culhuacan, National Polytechnic Institute.
3
esime Culhuacan, National Polytechnic Institute.
Abstract: The protection of multimedia data has become a necessity due to the generation of illegal copies,
thus, the purpose of this article was to analyze and evaluate the algorithm of two-set in embedding a watermark
into an audio signal. Metrics were analyzed as the Perceptual Evaluation of Audio Quality (PEAQ) by
calculating the Objective Difference Grade (ODG) to verify the inaudibility of the watermark and the robustness
of it against attacks from resampling and Additive White Gaussian Noise (AWGN) by estimating the Bit Error
Rate (BER). The process was applied to hundred Waveform Audio Format (WAV) clips classifieds in five
musical genders and we obtained an ODG value average of -0.83045 that according to the International
Telecommunication Union (ITU), the watermark is slightly perceptible if you listen with extreme care.
I. Introduction
Digital media has become a daily task, since these are new services required by people today, due to the
exchange of audio, images, text and video. The problem lies when these files are copied anddistributed without
permission of the author. To solve this problem there is digital watermarking, a technique to embed data in the
signal to be protected (in this case audio) as an identifier. There are several algorithms to insert watermarks for
images and video, however, few algorithms are dedicated to audio files because of the complexity of the Human
Auditory System (HAS)[1], hence the purpose of this research is to insert a watermark into audio signals,
interpret and evaluate the Two-Set algorithm using modified patchwork and verify the inaudibility and
robustness of the watermark to be used as an identifier of the copyright.
The watermark protects files permanently embedded in the audio signal so that the audio quality is not
impaired while ensuring that the watermark is imperceptible. On the other hand, the watermark should be robust
against attacks or manipulations that are carried out, at one point being the most common is resampling the
addition of noise and more to the original signal. Hardly a watermark can be extracted without affecting the
original signal; this creates a very attractive tool for copy protection[2]. Figure 1 shows the basic scheme of
embedding and detecting a watermark.
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 41 | Page
Figure1. Watermark embedding and detecting scheme
The embedding process is performed by the Modified Patchwork technique3] equations derived from the
original Patchwork method to increase the robustness (but it should be emphasized that this derivation is not
enough to be resistant to many attacks, so it should be possible to combine different watermarking methods),
working in the frequency domain under the Discrete Cosine Transform (DCT) and the detection process by
Inverse Discrete Cosine Transform (IDCT) and it is possible with a secret key.
Section 2 shows the mathematical development of the algorithm, divided in the embedding process, metrics
evaluation and detection process. In Section 3, the method is implemented, it shows the initial parameters and
comparing the original signal and the watermarked and checking the results of the PEAQ between different
types of audio files tagged and thus verify the inaudibility of the watermark embedded in them, furthermore, it
shows the attacks that the watermark survives and its corresponding BER. The conclusions are in Section 4 and
finally in Section 5 of the references consulted.
II. Development
The evaluation of the method was built of three parts: the first is the embedding of the watermark in the
audio signal; the second part is inaudibility tests and robustness to audio clips marked, finally it detects the
embedded watermark after attacks.
The authors of [3] proposed watermark embedding method is known as Two-Set, based on modified
patchwork algorithm. It works in the frequency domain and is based on the calculation of the DCT.
2.1. Watermark embedding
The watermark insertion steps[4] are summarized below:
The secret key and the digital watermark are associated to the seed of a random number generatorDivides the
audio file into blocks of size Nand DCT is applied to each block.
We define two subsets of the set processing, one called A and another B
(1)
(2)
Sample means and the statistical standard error are calculated according to the following equations:
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 42 | Page
(3)
(4)
(5)
The embeddingfunctions presented below introduce the watermark:
(6)
(7)
Where C is a constant and sign is the sign function what makes large values larger and small values smaller.
Finally, replace the selected itemsandrespectively apply the IDCT in theFrequency domain
2.2. Metrics evaluation
The evaluation metrics are to test the inaudibility of the watermark embedded in the audio clips and check
the robustness of it against attacks from resampling and AWGN.
Inaudibility test should evaluate the quality of the audio clips watermarked with the standard ITU BS.1387-
1[7] established by ITU for PEAQ provides accurate estimates of audio quality degradation occurring in the
watermarked signal compared with the original. This is based on the properties of the human auditory system,
modeling the psychoacoustic effects and is verified by calculating the Objective Difference Grade (ODG). The
ODG ranges from 0 to -4 and is defined as Table 1
Table 1. Odg values range
Impairment Description ODG
Imperceptible 0.0
Perceptible, but not annoying -1.0
Slightly annoying -2.0
Annoying -3.0
Very annoying -4.0
For robustness tests we resampled the signals watermarked by different sampling rates. This process was
done by changing the sampling frequency of thesignal watermarked and checking that the embedded bits were
the same in the detection process, it was calculated how many erroneous bits exist in the watermarked audio
clip, it is the number of bit errors divided by the total number of transferred bits during a studied time interval
and its correspondent BER [6] as a unit less performance measure, often expressed as a percentage.
Also, it was added an AWGN to the watermarked clips. The AWGN term refers to the fact that eventually
the noise is combined with the desired signal. As the noise gets added (and not multiplied) to the received
signal, the spectrum noise if flat for all frequencies and the values of the noise follows the Gaussian
probability distribution function:
(8)
Where;
(9)
(10)
It was verified that the watermark survives the AWGN; this was done by calculating the BER in order to
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 43 | Page
obtain the number of erroneous bits that exist in different intensities of Signal to Noise Ratio (SNR) of the
AWGN. Figure 2 shows the general outline of the AWGN, note that it is additive and not multiplicative
Figure 2. Awgn scheme
2.3. Watermark detection
The following algorithm[4] was used to verify whether the embedded watermark was the same in the
discovery process after the attacks. The decoding steps were as follows:
The secret key and the digital watermark are associated to the seed of a random number generator.
Obtain subsets y for bit insertion 0 and thesubsets
y for bit insertion 1.
Averages are calculated for each sample subsets and standard errors for 0 y 1.
We calculate test statistics S (see equation 7) andT2
(11)
T2
is defined as the highest values of the statisticsobtained.
The seed detected will be that for the parameter T2
is maximum.
Finally we generate the watermark associated with the seed, getting the embedded bits.
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 44 | Page
The process was to watermark audio clips;subject to attacks and to detect the survival of the watermark. Below
are the results of the evaluation algorithm.
III. Results
The algorithm was applied to a hundred audio clips of music (of which only twenty are reported) divided in
five categories, these files were WAV, the watermark embedded was W=[1 0 0 0 0 1 1 0]. First we compared
the original signals with the watermarked to verify that no significant alteration in the watermarked clips. Figure
3 shows the spectrum of an audio signal(watermarked and un-watermarked) and we notice a slight difference
between the two graphs.
Figure 3. Spectrum of an audio clip, original and watermarked
The red color in the first graph shows the original signal and the second graph the red
representswatermarked signal, note a difference between the two tones.
Figure 4 plots the difference between the originalsignal and the watermarked signal.
Figure 4. Difference watermarked and un-watermarked signals
Note that the difference between the two signals is the order of 10-5
.
To demonstrate the inaudibility of the embedded watermark, we performed the calculation of ODG for each
audio clip, which are shown in Table 2.
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 45 | Page
Table 2. Odg of the audio clips
Category Track name ODG
Dopamina (by Belinda) -0.753
Contigo (by Yuridia) -0.895
Pop
Nada puede cambiarme
(by Paulina Rubio) -0.101
MentirasPiadosas
(by Alejandra Guzmán) -0.832
Las pequeñas
-2.761
cosas (by Jot Dog)
Lentamente (Fey) -1.676
Electronic Nada de más (by Belanova) -2.183
Provócame (by Fey) -1.752
Y tú (by Julión Álvarez) -0.166
Mujeresdivinas (by Vicente
Banda Fernández) -0.108
No me quedamás(by Selena) -0.126
Ya no (by Limon) -0.178
Note that the difference between the two signals is the order of 10
-5
.
To demonstrate the inaudibility of the embedded watermark, we performed the calculation of ODG for each
audio clip, which are shown in Table 2.
Table 2. Odg of the audio clips
Chiquitita (by Abba) -0.419
Cantacorazón (by
Alejandro Fernández) -0.610
Ballad
Sortilegio (by Il divo) -0.291
Hasta mi final (by
-0.523
Il divo)
I feel good (by
-1.361
James Brown)
Absolutamente
-0.594
(by Fangoria)
Rock
Lejosestamos
-0.431
mejor (by Motel)
Frágil (by Allison) -0.849
The ODG average value obtained was -0.83045 for twenty clips above, this result indicates that the
watermark is slightly perceptible only if you listen carefully but it is not annoying to the human ear.
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 46 | Page
Comparing the hundred ODG values with Table 1 we obtain Table 3 shows the percentage obtained for
each impairment established by the ITU.
Table 3. Obtained percent of the odg
We could see that most of the embedded watermarks are to be imperceptible. Figure 5 shows the average
ODG for each musical category
Average Objective DifferenceGrade
Figure 5. Average odg for each category
Table 4. Ber for each resampling rate
Category Sampling Erroneous Bit
Frequency Bits / Total Error
(kHz) Embedded Rate
Bits (%BER)
22.05 1/8 12.5
88.2 0/8 0
Pop 176.4 0/8 0
192 2/8 25
22.05 2/8 25
Electronic 88.2 1/8 12.5
176.4 2/8 25
192 3/8 37.5
22.05 0/8 0
88.2 0/8 0
Banda 176.4 0/8 0
192 1/8 12.5
22.05 1/8 12.5
88.2 0/8 0
Ballad 176.4 1/8 12.5
192 2/8 25
22.05 1/8 12.5
88.2 0/8 0
Rock 176.4 0/8 0
192 2/8 25
Impairment Obtained
Description Percent (%)
Imperceptible 52.5
Perceptible, but not
23
annoying
Slightly annoying 19.5
Annoying 5
Very annoying 0
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 47 | Page
The watermark is more perceptible in the electronic music (Figure 5).
To check the robustness of the watermark[5], we subjected the processed signal to an attack by changing
the resampling rate as shown in Table 4 and AWGN attack with different intensities of Signal to Noise Ratio
(SNR) showing the results Table 5.
Table 4 shows that most of the clips watermarkedsuffer a distortion in the embedded watermark when
resampled to 192kHz and we said that the larger the resampling rate, the greater the distortion of the watermark
embed it on audio clips.
The watermark, subject to resampling, was more robust in banda music, pop and rock, and less robust in
electronic music and ballads.
In the following table we can see the number of bit errors and their respective BER for different intensities
of SNR applied to AWGN was attached to each signal and in which we also see that while the intensity
increases the distortion is most noticeable in the watermark as it also increases the power of AWGN. It is noted
that for an AWGN signal strength of 1dB and 5dB the watermark is not distorted, instead to an intensity of
10dB and 15dB are a number of erroneous bits.
Being more resistant to resampling the musical categories of pop and band (see Table 5).
Table 5. Beer for each intensities for awgn
Category SNR
Erroneo
us Bit
Intensitie
s
Bits /
Total Error
for
AWGN
Embedde
d Rate
(dB) Bits (%
BER)
1 0/8 0
5 0/8 0
Pop 10 0/8 0
15 1/8 12.5
1 0/8 0
5 0/8 0
Electronic
10 1/8 12.5
15 2/8 25
1 0/8 0
5 0/8 0
Banda 10 0/8 0
15 1/8 12.5
1 0/8 0
5 0/8 0
Ballad 10 0/8 0
15 2/8 25
1 0/8 0
5 0/8 0
Rock 10 1/8 12.5
15 2/8 25
Compare the original signal with the watermarked signal, and it was subjected to attacks by resampling and
AWGN attacks. The following are conclusions.
IV. Conclusions
A comparison of the signal before being processed and the signal after being processed to verify the visual
difference between them.
We tested the ITU BS.1387-1 standard established inaudibility standards applied in this case, to the
watermark, checking that it is slightly perceptible, if and only if, listening with dedicated attention.
The sampling frequency of the signals before processing was 44.1kHz but to test the robustness of the
method was decreased, and increased the frequency in order to verify what is mentioned in [5] and check if it
was more robust with other rates sampling.
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
www.ijres.org 48 | Page
Also verify the behavior of the watermark against the addition of AWGN with different SNR intensities.
It is recommended that the watermark is inserted into the top of each block, because if not done in this
way, the watermark will be easy to detect and extract.
Below are the references consulted, among the items displayed, a book and a standard ITU.
References
[1] M. Hrncar, J. Krajcovic, “Principles of Audio Watermarking”, BytcickaZilina, Slovak Republic, 2005, pp. 1-3.
[2] Nedeljko, C., T. Seppanen, Digital Audio WatermarkingTechniquesand Technologies: Applications andBenchmarks, Information
Science Reference, Hershey NewYork, 2007.
[3] I.K. Yeo, H.J. Kim, “Modified Patchwork Algorithm: A Novel Audio Watermarking Scheme”, IEEE, Transactions on Speech
and Audio Proceesing, Korea, July 2003, pp. 1-6.
[4] D.G. Hong, S.H. Park, and J. Shin, “A Public Key Audio Watermarking using Patchwork Algorithm”, Department of Electronic
Engineering, Dongguk University, Seoul Korea, 2004, pp. 3-4.
[5] H.J. Kim, S. Xiang, and S. Maitra, “Robustness Analysis of Patchwork Watermarking Schemes”, IEEE, Transactions on Speech
and Audio Proceesing, Seoul Korea, 2001, pp. 1-2.
[6] J.E. Gilley, “Bit Error Rate Simulation using Matlab”,Transcrypt International, Inc., August 2003, pp. 1-7.
[7] Recommendation ITU-R BS.1387-1 Method for objective measurements of perceived audio quality, 2001.
AUTHOR PROFILE:
Carlos Aquino Ruiz was born in Mexico on April 2, 1973 is in Communications and Electronics
Engineering from the National Polytechnic Institute IPN, a research professor and areas of
development are applied computing, data networking and security.
Eduardo Pérez Orta. He is a methodological research and has master's. Nowadays it is a research
professor at the School of Mechanical and Electrical Engineering (ESIME) in Mexico. Her areas
of development are assessment and project development, scientific writing and methodology of
science
Celedonio Enrique Aguilar Meza Was Born In Mexico On March 3, 1959 And Holds A Degree In
Communications And Electronics From The National Polytechnic Institute Ipn, Is Currently
Research Professor And Development Areas Are The Processing And Handling, Coding And
Compression, Safety And Efficient Transmission.

More Related Content

What's hot

AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
wadzani umaru
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
INFOGAIN PUBLICATION
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 
Speech technology basics
Speech technology   basicsSpeech technology   basics
Speech technology basics
Hemaraja Nayaka S
 
Speech encoding techniques
Speech encoding techniquesSpeech encoding techniques
Speech encoding techniques
Hemaraja Nayaka S
 
Filtration and synthesis of different types of human voice signals
Filtration and synthesis of different types of human voice signalsFiltration and synthesis of different types of human voice signals
Filtration and synthesis of different types of human voice signals
Alexander Decker
 
A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection
cscpconf
 
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKSDIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKSbehzad66
 
Scientech trainer kit catalog
Scientech trainer kit catalogScientech trainer kit catalog
Scientech trainer kit catalog
ABHAYTAVPSC
 
Wireless digital communication and coding techniques new
Wireless digital communication and coding techniques newWireless digital communication and coding techniques new
Wireless digital communication and coding techniques new
Clyde Lettsome
 
Mp3 player working by digital signal processing
Mp3 player working by digital signal processingMp3 player working by digital signal processing
Mp3 player working by digital signal processing
Dipanjon Halder
 
Introduction to dsp by bibhu prasad ganthia
Introduction to dsp by bibhu prasad ganthiaIntroduction to dsp by bibhu prasad ganthia
Introduction to dsp by bibhu prasad ganthia
Dr. Bibhu Prasad Ganthia
 
SPEECH CODING
SPEECH CODINGSPEECH CODING
SPEECH CODING
Shradheshwar Verma
 
Introduction to dsp
Introduction to dspIntroduction to dsp
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET Journal
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video ForensicsDipika Sengupta
 
Introduction to digital signal processing 2
Introduction to digital signal processing 2Introduction to digital signal processing 2
Introduction to digital signal processing 2
Hossam Hassan
 
Audio Essentials for Broadcast and Multiscreen
Audio Essentials for Broadcast and MultiscreenAudio Essentials for Broadcast and Multiscreen
Audio Essentials for Broadcast and Multiscreen
Ellis Reid
 
Lecture 18 (5)
Lecture 18 (5)Lecture 18 (5)
Lecture 18 (5)
Deepakkumar5880
 
Introduction to DSP
Introduction to DSPIntroduction to DSP
Introduction to DSP
shinychristo
 

What's hot (20)

AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
AUDIO VOICE RECORDER AND TRANSMISSION THROUGH A WIRELESS MEDIUM BETWEEN PC AN...
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
Speech technology basics
Speech technology   basicsSpeech technology   basics
Speech technology basics
 
Speech encoding techniques
Speech encoding techniquesSpeech encoding techniques
Speech encoding techniques
 
Filtration and synthesis of different types of human voice signals
Filtration and synthesis of different types of human voice signalsFiltration and synthesis of different types of human voice signals
Filtration and synthesis of different types of human voice signals
 
A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection
 
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKSDIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
 
Scientech trainer kit catalog
Scientech trainer kit catalogScientech trainer kit catalog
Scientech trainer kit catalog
 
Wireless digital communication and coding techniques new
Wireless digital communication and coding techniques newWireless digital communication and coding techniques new
Wireless digital communication and coding techniques new
 
Mp3 player working by digital signal processing
Mp3 player working by digital signal processingMp3 player working by digital signal processing
Mp3 player working by digital signal processing
 
Introduction to dsp by bibhu prasad ganthia
Introduction to dsp by bibhu prasad ganthiaIntroduction to dsp by bibhu prasad ganthia
Introduction to dsp by bibhu prasad ganthia
 
SPEECH CODING
SPEECH CODINGSPEECH CODING
SPEECH CODING
 
Introduction to dsp
Introduction to dspIntroduction to dsp
Introduction to dsp
 
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and SynthesizerIRJET- Voice Command Execution with Speech Recognition and Synthesizer
IRJET- Voice Command Execution with Speech Recognition and Synthesizer
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video Forensics
 
Introduction to digital signal processing 2
Introduction to digital signal processing 2Introduction to digital signal processing 2
Introduction to digital signal processing 2
 
Audio Essentials for Broadcast and Multiscreen
Audio Essentials for Broadcast and MultiscreenAudio Essentials for Broadcast and Multiscreen
Audio Essentials for Broadcast and Multiscreen
 
Lecture 18 (5)
Lecture 18 (5)Lecture 18 (5)
Lecture 18 (5)
 
Introduction to DSP
Introduction to DSPIntroduction to DSP
Introduction to DSP
 

Similar to Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal

DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
ijcisjournal
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
IJERA Editor
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking Methods
IRJET Journal
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
ijfcstjournal
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
ijfcstjournal
 
50120140506015
5012014050601550120140506015
50120140506015
IAEME Publication
 
J33047049
J33047049J33047049
J33047049
IJERA Editor
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applicationsIAEME Publication
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
ijsrd.com
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
IOSR Journals
 
F5242832
F5242832F5242832
F5242832
IOSR-JEN
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
researchinventy
 
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUESECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
IRJET Journal
 
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
theijes
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
paperpublications3
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
Saurabh Kaushik
 
Jk3516211625
Jk3516211625Jk3516211625
Jk3516211625
IJERA Editor
 
Effect of Speech enhancement using spectral subtraction on various noisy envi...
Effect of Speech enhancement using spectral subtraction on various noisy envi...Effect of Speech enhancement using spectral subtraction on various noisy envi...
Effect of Speech enhancement using spectral subtraction on various noisy envi...
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Similar to Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal (20)

DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking Methods
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
Digital Watermarking Technique Based on Multi-Resolution Curvelet Transform
 
50120140506015
5012014050601550120140506015
50120140506015
 
J33047049
J33047049J33047049
J33047049
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator ApproachComparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
 
F5242832
F5242832F5242832
F5242832
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUESECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
ECG SIGNAL DE-NOISING USING DIGITAL FILTER TECHNIQUES
 
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
Comparative Study of Various Algorithms for Detection of Fades in Video Seque...
 
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial DomainPerformance Analysis of Digital Watermarking Of Video in the Spatial Domain
Performance Analysis of Digital Watermarking Of Video in the Spatial Domain
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
40120130406010 2-3-4-5-6
40120130406010 2-3-4-5-640120130406010 2-3-4-5-6
40120130406010 2-3-4-5-6
 
Jk3516211625
Jk3516211625Jk3516211625
Jk3516211625
 
Effect of Speech enhancement using spectral subtraction on various noisy envi...
Effect of Speech enhancement using spectral subtraction on various noisy envi...Effect of Speech enhancement using spectral subtraction on various noisy envi...
Effect of Speech enhancement using spectral subtraction on various noisy envi...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

More from IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
IJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
IJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
IJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
IJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
IJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
IJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
IJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
IJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
IJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
IJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
IJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
IJRES Journal
 

More from IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Recently uploaded

ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx
benykoy2024
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 

Recently uploaded (20)

ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 

Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 3 Issue 11 ǁ November. 2015 ǁ PP.40-48 www.ijres.org 40 | Page Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal C. Aquino1 ,E. Perez2 , C. Aguilar3 1 esime Culhuacan, National Polytechnic Institute. 2 esime Culhuacan, National Polytechnic Institute. 3 esime Culhuacan, National Polytechnic Institute. Abstract: The protection of multimedia data has become a necessity due to the generation of illegal copies, thus, the purpose of this article was to analyze and evaluate the algorithm of two-set in embedding a watermark into an audio signal. Metrics were analyzed as the Perceptual Evaluation of Audio Quality (PEAQ) by calculating the Objective Difference Grade (ODG) to verify the inaudibility of the watermark and the robustness of it against attacks from resampling and Additive White Gaussian Noise (AWGN) by estimating the Bit Error Rate (BER). The process was applied to hundred Waveform Audio Format (WAV) clips classifieds in five musical genders and we obtained an ODG value average of -0.83045 that according to the International Telecommunication Union (ITU), the watermark is slightly perceptible if you listen with extreme care. I. Introduction Digital media has become a daily task, since these are new services required by people today, due to the exchange of audio, images, text and video. The problem lies when these files are copied anddistributed without permission of the author. To solve this problem there is digital watermarking, a technique to embed data in the signal to be protected (in this case audio) as an identifier. There are several algorithms to insert watermarks for images and video, however, few algorithms are dedicated to audio files because of the complexity of the Human Auditory System (HAS)[1], hence the purpose of this research is to insert a watermark into audio signals, interpret and evaluate the Two-Set algorithm using modified patchwork and verify the inaudibility and robustness of the watermark to be used as an identifier of the copyright. The watermark protects files permanently embedded in the audio signal so that the audio quality is not impaired while ensuring that the watermark is imperceptible. On the other hand, the watermark should be robust against attacks or manipulations that are carried out, at one point being the most common is resampling the addition of noise and more to the original signal. Hardly a watermark can be extracted without affecting the original signal; this creates a very attractive tool for copy protection[2]. Figure 1 shows the basic scheme of embedding and detecting a watermark.
  • 2. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 41 | Page Figure1. Watermark embedding and detecting scheme The embedding process is performed by the Modified Patchwork technique3] equations derived from the original Patchwork method to increase the robustness (but it should be emphasized that this derivation is not enough to be resistant to many attacks, so it should be possible to combine different watermarking methods), working in the frequency domain under the Discrete Cosine Transform (DCT) and the detection process by Inverse Discrete Cosine Transform (IDCT) and it is possible with a secret key. Section 2 shows the mathematical development of the algorithm, divided in the embedding process, metrics evaluation and detection process. In Section 3, the method is implemented, it shows the initial parameters and comparing the original signal and the watermarked and checking the results of the PEAQ between different types of audio files tagged and thus verify the inaudibility of the watermark embedded in them, furthermore, it shows the attacks that the watermark survives and its corresponding BER. The conclusions are in Section 4 and finally in Section 5 of the references consulted. II. Development The evaluation of the method was built of three parts: the first is the embedding of the watermark in the audio signal; the second part is inaudibility tests and robustness to audio clips marked, finally it detects the embedded watermark after attacks. The authors of [3] proposed watermark embedding method is known as Two-Set, based on modified patchwork algorithm. It works in the frequency domain and is based on the calculation of the DCT. 2.1. Watermark embedding The watermark insertion steps[4] are summarized below: The secret key and the digital watermark are associated to the seed of a random number generatorDivides the audio file into blocks of size Nand DCT is applied to each block. We define two subsets of the set processing, one called A and another B (1) (2) Sample means and the statistical standard error are calculated according to the following equations:
  • 3. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 42 | Page (3) (4) (5) The embeddingfunctions presented below introduce the watermark: (6) (7) Where C is a constant and sign is the sign function what makes large values larger and small values smaller. Finally, replace the selected itemsandrespectively apply the IDCT in theFrequency domain 2.2. Metrics evaluation The evaluation metrics are to test the inaudibility of the watermark embedded in the audio clips and check the robustness of it against attacks from resampling and AWGN. Inaudibility test should evaluate the quality of the audio clips watermarked with the standard ITU BS.1387- 1[7] established by ITU for PEAQ provides accurate estimates of audio quality degradation occurring in the watermarked signal compared with the original. This is based on the properties of the human auditory system, modeling the psychoacoustic effects and is verified by calculating the Objective Difference Grade (ODG). The ODG ranges from 0 to -4 and is defined as Table 1 Table 1. Odg values range Impairment Description ODG Imperceptible 0.0 Perceptible, but not annoying -1.0 Slightly annoying -2.0 Annoying -3.0 Very annoying -4.0 For robustness tests we resampled the signals watermarked by different sampling rates. This process was done by changing the sampling frequency of thesignal watermarked and checking that the embedded bits were the same in the detection process, it was calculated how many erroneous bits exist in the watermarked audio clip, it is the number of bit errors divided by the total number of transferred bits during a studied time interval and its correspondent BER [6] as a unit less performance measure, often expressed as a percentage. Also, it was added an AWGN to the watermarked clips. The AWGN term refers to the fact that eventually the noise is combined with the desired signal. As the noise gets added (and not multiplied) to the received signal, the spectrum noise if flat for all frequencies and the values of the noise follows the Gaussian probability distribution function: (8) Where; (9) (10) It was verified that the watermark survives the AWGN; this was done by calculating the BER in order to
  • 4. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 43 | Page obtain the number of erroneous bits that exist in different intensities of Signal to Noise Ratio (SNR) of the AWGN. Figure 2 shows the general outline of the AWGN, note that it is additive and not multiplicative Figure 2. Awgn scheme 2.3. Watermark detection The following algorithm[4] was used to verify whether the embedded watermark was the same in the discovery process after the attacks. The decoding steps were as follows: The secret key and the digital watermark are associated to the seed of a random number generator. Obtain subsets y for bit insertion 0 and thesubsets y for bit insertion 1. Averages are calculated for each sample subsets and standard errors for 0 y 1. We calculate test statistics S (see equation 7) andT2 (11) T2 is defined as the highest values of the statisticsobtained. The seed detected will be that for the parameter T2 is maximum. Finally we generate the watermark associated with the seed, getting the embedded bits.
  • 5. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 44 | Page The process was to watermark audio clips;subject to attacks and to detect the survival of the watermark. Below are the results of the evaluation algorithm. III. Results The algorithm was applied to a hundred audio clips of music (of which only twenty are reported) divided in five categories, these files were WAV, the watermark embedded was W=[1 0 0 0 0 1 1 0]. First we compared the original signals with the watermarked to verify that no significant alteration in the watermarked clips. Figure 3 shows the spectrum of an audio signal(watermarked and un-watermarked) and we notice a slight difference between the two graphs. Figure 3. Spectrum of an audio clip, original and watermarked The red color in the first graph shows the original signal and the second graph the red representswatermarked signal, note a difference between the two tones. Figure 4 plots the difference between the originalsignal and the watermarked signal. Figure 4. Difference watermarked and un-watermarked signals Note that the difference between the two signals is the order of 10-5 . To demonstrate the inaudibility of the embedded watermark, we performed the calculation of ODG for each audio clip, which are shown in Table 2.
  • 6. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 45 | Page Table 2. Odg of the audio clips Category Track name ODG Dopamina (by Belinda) -0.753 Contigo (by Yuridia) -0.895 Pop Nada puede cambiarme (by Paulina Rubio) -0.101 MentirasPiadosas (by Alejandra Guzmán) -0.832 Las pequeñas -2.761 cosas (by Jot Dog) Lentamente (Fey) -1.676 Electronic Nada de más (by Belanova) -2.183 Provócame (by Fey) -1.752 Y tú (by Julión Álvarez) -0.166 Mujeresdivinas (by Vicente Banda Fernández) -0.108 No me quedamás(by Selena) -0.126 Ya no (by Limon) -0.178 Note that the difference between the two signals is the order of 10 -5 . To demonstrate the inaudibility of the embedded watermark, we performed the calculation of ODG for each audio clip, which are shown in Table 2. Table 2. Odg of the audio clips Chiquitita (by Abba) -0.419 Cantacorazón (by Alejandro Fernández) -0.610 Ballad Sortilegio (by Il divo) -0.291 Hasta mi final (by -0.523 Il divo) I feel good (by -1.361 James Brown) Absolutamente -0.594 (by Fangoria) Rock Lejosestamos -0.431 mejor (by Motel) Frágil (by Allison) -0.849 The ODG average value obtained was -0.83045 for twenty clips above, this result indicates that the watermark is slightly perceptible only if you listen carefully but it is not annoying to the human ear.
  • 7. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 46 | Page Comparing the hundred ODG values with Table 1 we obtain Table 3 shows the percentage obtained for each impairment established by the ITU. Table 3. Obtained percent of the odg We could see that most of the embedded watermarks are to be imperceptible. Figure 5 shows the average ODG for each musical category Average Objective DifferenceGrade Figure 5. Average odg for each category Table 4. Ber for each resampling rate Category Sampling Erroneous Bit Frequency Bits / Total Error (kHz) Embedded Rate Bits (%BER) 22.05 1/8 12.5 88.2 0/8 0 Pop 176.4 0/8 0 192 2/8 25 22.05 2/8 25 Electronic 88.2 1/8 12.5 176.4 2/8 25 192 3/8 37.5 22.05 0/8 0 88.2 0/8 0 Banda 176.4 0/8 0 192 1/8 12.5 22.05 1/8 12.5 88.2 0/8 0 Ballad 176.4 1/8 12.5 192 2/8 25 22.05 1/8 12.5 88.2 0/8 0 Rock 176.4 0/8 0 192 2/8 25 Impairment Obtained Description Percent (%) Imperceptible 52.5 Perceptible, but not 23 annoying Slightly annoying 19.5 Annoying 5 Very annoying 0
  • 8. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 47 | Page The watermark is more perceptible in the electronic music (Figure 5). To check the robustness of the watermark[5], we subjected the processed signal to an attack by changing the resampling rate as shown in Table 4 and AWGN attack with different intensities of Signal to Noise Ratio (SNR) showing the results Table 5. Table 4 shows that most of the clips watermarkedsuffer a distortion in the embedded watermark when resampled to 192kHz and we said that the larger the resampling rate, the greater the distortion of the watermark embed it on audio clips. The watermark, subject to resampling, was more robust in banda music, pop and rock, and less robust in electronic music and ballads. In the following table we can see the number of bit errors and their respective BER for different intensities of SNR applied to AWGN was attached to each signal and in which we also see that while the intensity increases the distortion is most noticeable in the watermark as it also increases the power of AWGN. It is noted that for an AWGN signal strength of 1dB and 5dB the watermark is not distorted, instead to an intensity of 10dB and 15dB are a number of erroneous bits. Being more resistant to resampling the musical categories of pop and band (see Table 5). Table 5. Beer for each intensities for awgn Category SNR Erroneo us Bit Intensitie s Bits / Total Error for AWGN Embedde d Rate (dB) Bits (% BER) 1 0/8 0 5 0/8 0 Pop 10 0/8 0 15 1/8 12.5 1 0/8 0 5 0/8 0 Electronic 10 1/8 12.5 15 2/8 25 1 0/8 0 5 0/8 0 Banda 10 0/8 0 15 1/8 12.5 1 0/8 0 5 0/8 0 Ballad 10 0/8 0 15 2/8 25 1 0/8 0 5 0/8 0 Rock 10 1/8 12.5 15 2/8 25 Compare the original signal with the watermarked signal, and it was subjected to attacks by resampling and AWGN attacks. The following are conclusions. IV. Conclusions A comparison of the signal before being processed and the signal after being processed to verify the visual difference between them. We tested the ITU BS.1387-1 standard established inaudibility standards applied in this case, to the watermark, checking that it is slightly perceptible, if and only if, listening with dedicated attention. The sampling frequency of the signals before processing was 44.1kHz but to test the robustness of the method was decreased, and increased the frequency in order to verify what is mentioned in [5] and check if it was more robust with other rates sampling.
  • 9. Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal www.ijres.org 48 | Page Also verify the behavior of the watermark against the addition of AWGN with different SNR intensities. It is recommended that the watermark is inserted into the top of each block, because if not done in this way, the watermark will be easy to detect and extract. Below are the references consulted, among the items displayed, a book and a standard ITU. References [1] M. Hrncar, J. Krajcovic, “Principles of Audio Watermarking”, BytcickaZilina, Slovak Republic, 2005, pp. 1-3. [2] Nedeljko, C., T. Seppanen, Digital Audio WatermarkingTechniquesand Technologies: Applications andBenchmarks, Information Science Reference, Hershey NewYork, 2007. [3] I.K. Yeo, H.J. Kim, “Modified Patchwork Algorithm: A Novel Audio Watermarking Scheme”, IEEE, Transactions on Speech and Audio Proceesing, Korea, July 2003, pp. 1-6. [4] D.G. Hong, S.H. Park, and J. Shin, “A Public Key Audio Watermarking using Patchwork Algorithm”, Department of Electronic Engineering, Dongguk University, Seoul Korea, 2004, pp. 3-4. [5] H.J. Kim, S. Xiang, and S. Maitra, “Robustness Analysis of Patchwork Watermarking Schemes”, IEEE, Transactions on Speech and Audio Proceesing, Seoul Korea, 2001, pp. 1-2. [6] J.E. Gilley, “Bit Error Rate Simulation using Matlab”,Transcrypt International, Inc., August 2003, pp. 1-7. [7] Recommendation ITU-R BS.1387-1 Method for objective measurements of perceived audio quality, 2001. AUTHOR PROFILE: Carlos Aquino Ruiz was born in Mexico on April 2, 1973 is in Communications and Electronics Engineering from the National Polytechnic Institute IPN, a research professor and areas of development are applied computing, data networking and security. Eduardo Pérez Orta. He is a methodological research and has master's. Nowadays it is a research professor at the School of Mechanical and Electrical Engineering (ESIME) in Mexico. Her areas of development are assessment and project development, scientific writing and methodology of science Celedonio Enrique Aguilar Meza Was Born In Mexico On March 3, 1959 And Holds A Degree In Communications And Electronics From The National Polytechnic Institute Ipn, Is Currently Research Professor And Development Areas Are The Processing And Handling, Coding And Compression, Safety And Efficient Transmission.