SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 218
Digital Audio Watermarking using EMD for
Voice Message Encryption with Added Security
Kunal Gawale1
, Harshali Chaudhari2
, Vasundhara Kandesar3
, Smita Sakharwade
(Makade)4
Student, Smt. Indira Gandhi College of Engineering, Koparkhairne, Navi Mumbai, India
Assistant Professor, Smt. Indira Gandhi College of Engineering, Koparkhairne, Navi Mumbai, India
Abstract— Several accurate watermarking methods for
image watermarking have being suggested and implemented
to secure various forms of digital data, images and videos
however, very few algorithms are proposed for audio
watermarking. This is also because human audio system has
dynamic range which is wider in comparison with human
vision system. In this paper, a new audio watermarking
algorithm for voice message encryption based on Empirical
Mode Decomposition (EMD) is introduced. The audio signal
is divided into frames and each frame is then decomposed
adaptively, by EMD, into intrinsic oscillatory components
called Intrinsic Mode Functions (IMFs). The watermark,
which is the secret message that is to be sent, along with the
synchronization codes are embedded into the extrema of the
last IMF, a low frequency mode stable under different
attacks and preserving the perceptual quality of the host
signal. Based on exhaustive simulations, we show the
robustness of the hidden watermark for audio compression,
false decryption, re-quantization, resampling. The
comparison analysis shows that our method has better
performance than other steganography schemes recently
reported.
Keywords— Empirical mode decomposition, intrinsic mode
function, audio watermarking, voice message encryption,
quantization index modulation, synchronization code.
I. INTRODUCTION
A. What is a Watermark?
A watermark is defined as a distinguishing mark impressed
on paper during manufacture; visible when paper is held up
to the light (e.g. $ Bill). Physical objects can be watermarked
using special dyes and inks or during paper manufacturing.
A digital watermark is a kind of marker covertly embedded
in a noise tolerant signal such as an audio, video or image
data. It is typically used to identify ownership of the
copyright of such signal. Our paper focuses on using the
watermarking technique to embed a secret message within
the transmitted audio signal ( voice message).
B. Digital Audio Watermarking
Digital audio watermarking has been proved successful to
provide efficient solutions for copyright protection of digital
media by means of embedding a watermark in the original
audio signal. Main requirements of digital audio
watermarking are imperceptibility, robustness and data
capacity. More precisely, the watermark must not be audible
within the host audio data or the secret message hidden
should not affect the audio signal in any way to maintain the
quality of audio and must be robust to signal distortions
applied to the host data. Finally, the watermark must be easy
to extract in order to prove ownership. To achieve these
requirements, seeking new watermarking schemes is a very
challenging problem. Various watermarking techniques of
varying complexities have been proposed. In a robust
watermarking scheme solutions to different attacks are
proposed but with a limited transmission bit rate. To improve
the watermarking bit rate, watermarked schemes performed
in the wavelets domain have been proposed. A limitation of
wavelet approach is that the basis functions are fixed, and
thus they do not necessarily match all real signals.
C. Audio Watermarking Techniques
There are several major audio watermarking techniques.
They are:
• Discrete Cosine Transformation (DCT)
• Discrete Wavelet Transformation (DWT)
• Quantization Index Modulation (QIM)
• Empirical Mode Decomposition (EMD)
1) Discrete Cosine Transformation (DCT) :
DCT like a Fourier Transform, it represents data in
terms of frequency space rather than an amplitude space.
DCT based watermarking techniques are robust
compared to spatial domain techniques. Such algorithms
are robust against simple image processing operations
like low pass filtering, brightness and contrast
adjustment, blurring etc. However, they are difficult to
implement and are computationally more expensive.
2) Discrete Wavelet Transformation (DWT) :
The Discrete Wavelet Transform (DWT) is currently
used in a wide variety of signal processing applications,
such as in audio and video compression, removal of
noise in audio, and the simulation of wireless antenna
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com
www.ijaems.com
distribution. Wavelets have their energy c
time and are well suited for the analysis of transient,
time-varying signals. Since most of the real life signals
encountered are time varying in nature, the Wavelet
Transform suits many applications very well. The major
drawback is lack of shift invariance, which means that
small shifts in the input signal can cause major
variations in the distribution of energy between DWT
coefficients at different scales.
3) Quantization Index Modulation (QIM)
The quantization index modulation method is r
noise, signal strength variations. Also it does not require
linear amplifiers in the transmitter. This method enables
greater efficiency than many other modes
requires more complicated demodulator. Compared to
this method some other modes have higher data spectral
efficiency. The sidebands extend to infinity either side.
4) Empirical Mode Decomposition (EMD) :
In EMD, the essential functions are fastened, and
therefore they are doing not essentially match all real
signals. To overcome this limitation, recently, a new
signal decomposition method referred to as Empirical
Mode Decomposition (EMD) has been introduced for
analysing non-stationary signals derived or not from
linear systems in totally adaptive way. A major
advantage of EMD relies on no a priori choice of filters
or basis functions. Compared to classical kernel based
approaches, EMD is fully data-driven method that
recursively breaks down any signal into a reduced
number of zero-mean with symmetric envelopes AM
FM components called Intrinsic Mode Functions
(IMFs). This method is adequate for both non
and non-stationary signals. EMD gives sharper spectrum
of audio than any other method.
II. PROPOSED SYSTEM
A. Overview of the Proposed Scheme
The sample audio signal is first segmented to form
smaller segments of the original signal. These segments
undergo EMD to obtain even smaller components called
Intrinsic Mode Functions (IMFs). The bits of data that
is to be sent followed by the synchronization code is
embedded into the IMFs. Encryption key is used during
embedding, which adds a level of security to the
watermarked data. During extraction, the same EMD
algorithm is applied inversely. The IMFs are combined
along with the residue signal to form the watermarked
audio signal which contains the hidden message
1) Synchronization Code (SC) :
To locate the embedding position of the hidden
watermark bits in the host signal a SC is used. This code
is unaffected by cropping and shifting attacks. Let
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogainpublication.com)
distribution. Wavelets have their energy concentrated in
time and are well suited for the analysis of transient,
varying signals. Since most of the real life signals
encountered are time varying in nature, the Wavelet
Transform suits many applications very well. The major
shift invariance, which means that
small shifts in the input signal can cause major
variations in the distribution of energy between DWT
QIM) :
The quantization index modulation method is resilient to
noise, signal strength variations. Also it does not require
linear amplifiers in the transmitter. This method enables
greater efficiency than many other modes. However, it
requires more complicated demodulator. Compared to
r modes have higher data spectral
efficiency. The sidebands extend to infinity either side.
Empirical Mode Decomposition (EMD) :
In EMD, the essential functions are fastened, and
therefore they are doing not essentially match all real
e this limitation, recently, a new
signal decomposition method referred to as Empirical
Mode Decomposition (EMD) has been introduced for
stationary signals derived or not from
linear systems in totally adaptive way. A major
elies on no a priori choice of filters
or basis functions. Compared to classical kernel based
driven method that
recursively breaks down any signal into a reduced
mean with symmetric envelopes AM-
alled Intrinsic Mode Functions
(IMFs). This method is adequate for both non-`linear
stationary signals. EMD gives sharper spectrum
PROPOSED SYSTEM
segmented to form
smaller segments of the original signal. These segments
undergo EMD to obtain even smaller components called
nctions (IMFs). The bits of data that
followed by the synchronization code is
IMFs. Encryption key is used during
embedding, which adds a level of security to the
watermarked data. During extraction, the same EMD
algorithm is applied inversely. The IMFs are combined
along with the residue signal to form the watermarked
which contains the hidden message.
To locate the embedding position of the hidden
watermark bits in the host signal a SC is used. This code
is unaffected by cropping and shifting attacks. Let U be
the original SC and V be an u
same length. Sequence V is considered as a SC if only
the number of different bits between
compared bit by bit, is less than or equal than to a
predefined threshold.
Fig.1: Data Structure
2) Watermark Embedding :
Before embedding, SCs are combined with watermark
bits to form a binary sequence denoted by
watermark. If we design by
bits of SC and watermark respectively, the length of
binary sequence to be embedded is equal to
Thus, these (2N1+ N2) bits are spread out on several last
IMFs (extrema) of the consecutive frames. Further, this
(2N1+ N2) sequence of bits is embedded times.
our watermark embedding are detailed as follows:
• Step 1: Split original audio signal into frames.
• Step 2: Decompose each frame into IMFs.
• Step 3: Embed P times the binary sequence
into extrema of the last
• Step 4: Reconstruct the (EMD
modified IMFc and concatenate the watermarked
frames to retrieve the watermarked signal
text message to be passed)
{ei
*
} = [ei/S] .
S + sgn (3S / 4) if m
{ei
*
} = [ei/S] .
S + sgn (S / 4)
where ei and ei
*
are the extrema of the host audio
signal and the watermarked signal respectively.
Fig.2: Watermark Embedding
3) Watermark Extraction :
For watermark extraction, host signal is split into frames
and EMD is performed on each one as in embedding.
We extract binary data using the below given rule . We
then search for SCs in the extracted data. This procedure
is repeated by shifting the selected segment (window)
one sample at time until a SC is found. Wit
of SC determined, we can then extrac
information bits, which follows the SC.
denote the binary data to be extracted and U denote the
original SC. To locate the embedded watermark we
search the SCs in the sequence
extraction is performed without using the original audio
[Vol-2, Issue-4, April- 2016]
ISSN : 2454-1311
Page | 219
be an unknown sequence of the
is considered as a SC if only
the number of different bits between U and V, when
compared bit by bit, is less than or equal than to a
Data Structure
Before embedding, SCs are combined with watermark
bits to form a binary sequence denoted by {mi}, ith
bit of
If we design by N1 and N2 the numbers of
bits of SC and watermark respectively, the length of
binary sequence to be embedded is equal to (2N1+ N2).
bits are spread out on several last-
IMFs (extrema) of the consecutive frames. Further, this
of bits is embedded times. Basics of
our watermark embedding are detailed as follows:
Step 1: Split original audio signal into frames.
Step 2: Decompose each frame into IMFs.
Step 3: Embed P times the binary sequence {mi}
into extrema of the last IMFc by QIM.
Step 4: Reconstruct the (EMD-1
) frame using
and concatenate the watermarked
frames to retrieve the watermarked signal (secret
text message to be passed).
S + sgn (3S / 4) if mi = 1
S + sgn (S / 4) if mi = 0
are the extrema of the host audio
signal and the watermarked signal respectively.
Watermark Embedding
For watermark extraction, host signal is split into frames
EMD is performed on each one as in embedding.
We extract binary data using the below given rule . We
then search for SCs in the extracted data. This procedure
is repeated by shifting the selected segment (window)
one sample at time until a SC is found. With the position
of SC determined, we can then extract the hidden
which follows the SC. Let y = {mi
*
}
denote the binary data to be extracted and U denote the
To locate the embedded watermark we
search the SCs in the sequence {mi
*
} bit by bit. The
extraction is performed without using the original audio
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogain Publication (Infogainpublication.com
www.ijaems.com
signal. Basic steps involved in the watermarking
extraction are given as follows:
• Step 1: Split the watermarked signal into
frames.
• Step 2: Decompose each frame into IMFs.
• Step 3: Extract the extrema {e
• Step 4: Extract mi
*
from ei
*
using the following
rule mi
*
= 1 if ei
*
- [ ei
*
/S] .
S ≥
mi
*
= 0 if ei
*
- [ ei
*
/S] .
S < sgn (S/2)
• Step 5: Set the start index of the extracted data,
y , to I = 1 and L = N1 select samples (sliding
window size).
• Step 6: Evaluate the similarity between the
extracted segment V = y(I : L)
the similarity value is ≥ r, then
SC and go to Step 8. Otherwise proceed to the
next step.
• Step 7: Increase I by 1 and slide the window to
the next L = N1 samples and repeat Step 6.
• Step 8: Evaluate similarity between the second
extracted segment, V’ = y(I + N
+ N2) and U bit by bit.
• Step 9: I ← I + N1 + N2 , of the new
equal to sequence length of bits, go to Step 10
else repeat Step 7.
• Step 10: Extract the P watermarks and make
comparison bit by bit between these marks, for
correction, and finally extract the desired
watermark.
Fig. 3: Watermark Extraction
4) Encryption :
Encryption is the most effective way to achieve data
security. In encryption, a key is a piece of information
that determines the functional output of a cryptographic
algorithm. In our system, the DES algorithm is used for
encrypting and decrypting data. DES was classified as a
predominant symmetric-key algorithm for the
encryption of electronic data. The key is entered during
the embedding process which needs to
before the secret message is extracted. The same key is
used for encryption and decryption, thus making it a
symmetric key algorithm. This enhances the robustness
of the watermarking technique. The key based technique
for encryption ensures that the hidden data is not
International Journal of Advanced Engineering, Management and Science (IJAEMS)
Infogainpublication.com)
signal. Basic steps involved in the watermarking
the watermarked signal into
Step 2: Decompose each frame into IMFs.
{ei
*
} of IMFc.
using the following
≥ sgn (S/2)
S < sgn (S/2)
Step 5: Set the start index of the extracted data,
select samples (sliding
Step 6: Evaluate the similarity between the
V = y(I : L) and bit by bit. If
, then V is taken as the
SC and go to Step 8. Otherwise proceed to the
by 1 and slide the window to
samples and repeat Step 6.
Step 8: Evaluate similarity between the second
V’ = y(I + N1+ N2 : I + 2N1
, of the new I value is
ence length of bits, go to Step 10
watermarks and make
comparison bit by bit between these marks, for
correction, and finally extract the desired
Watermark Extraction
Encryption is the most effective way to achieve data
security. In encryption, a key is a piece of information
that determines the functional output of a cryptographic
lgorithm is used for
decrypting data. DES was classified as a
key algorithm for the
key is entered during
the embedding process which needs to be verified
is extracted. The same key is
encryption and decryption, thus making it a
symmetric key algorithm. This enhances the robustness
of the watermarking technique. The key based technique
for encryption ensures that the hidden data is not
retrieved by someone who’s not intended to access th
file. A valid key should always be entered
decryption side.
5) Decryption :
Decryption is the process of taking encoded or the
encrypted data and using a valid key, converting it back
to understandable form or in this case, to extract the
watermark. Decryption is done by entering the valid key
during watermark extraction. This is done symmetrically
i.e. the same key used for encryption and decryption.
Because both parties have the same key, the decryption
essentially is performed by reversing some p
encryption process. In case if a
during decryption then the user won’t be able to extract
the embedded watermark.
III. WORKFLOW
The figure explains the flow of the system and the steps of
shifting process used for watermark e
watermark i.e. the text message
the audio signal needs to be segmented into multiple IMFs.
Each IMF can then be embedded with the secret
with the synchronization bits. The concatenation of all the
IMFs gives the resultant watermarked audio signal.
extremas of the audio signal are first found so as to form the
mean envelope. The envelope is then processed using EMD
to find the resultant IMFs. The signal that is left after
extracting the IMFs is called the residue signal.
Fig. 4:Finding IMF and Watermark Embedding
[Vol-2, Issue-4, April- 2016]
ISSN : 2454-1311
Page | 220
retrieved by someone who’s not intended to access the
file. A valid key should always be entered at the
Decryption is the process of taking encoded or the
encrypted data and using a valid key, converting it back
to understandable form or in this case, to extract the
. Decryption is done by entering the valid key
during watermark extraction. This is done symmetrically
i.e. the same key used for encryption and decryption.
Because both parties have the same key, the decryption
essentially is performed by reversing some part of the
encryption process. In case if an invalid key is entered
then the user won’t be able to extract
WORKFLOW
The figure explains the flow of the system and the steps of
shifting process used for watermark embedding. For the
i.e. the text message to be embedded in an audio,
the audio signal needs to be segmented into multiple IMFs.
embedded with the secret data along
. The concatenation of all the
IMFs gives the resultant watermarked audio signal. The
extremas of the audio signal are first found so as to form the
mean envelope. The envelope is then processed using EMD
to find the resultant IMFs. The signal that is left after
alled the residue signal.
Finding IMF and Watermark Embedding
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 221
IV. IMPLEMENTATION
A. Shifting Process :
The Shifting process is used for watermark embedding.
There are two conditions that need to be satisfied by the
IMF function, viz.
• In the whole data set, the number of extrema and
the number of zero crossings must either equal or
differ at most by one.
• At any point, the mean value of the envelope
defined by the local maxima and the envelope
defined by the local minima is zero.
The implementation of the shifting process can
explained using the following steps-
• Step 1: Take a complicated data set x(t) (the audio
signal that will hold the text message data) and
identify all the upper extrema of x(t).
• Step 2: Interpolate the local maxima to form the
upper envelope u(x).
• Step 3: Identify all the lower extrema of x(t).
• Step 4: Interpolate the local minima to form the
lower envelope l(x).
• Step 5: Calculate the mean envelope,
m(t) = [u(x) + l(x)]/2
• Step 6: Extract the mean from the signal,
h(t) = x(t) - m(t)
• Step 7: Check whether h(t) satisfies the IMF
condition.
YES: h(t) is an IMF, stop shifting.
NO: let x(t) = h(t), keep shifting.
There seems to be negligible or no difference between
the original audio and the watermarked audio, that
contains the hidden text message. obtained by this
method. The extraction is carried out in the similar
fashion by applying EMD inversely and concatenating
the IMFs and the residue signal.
B. Experimental Results :
Fig. 5: Comparison of Watermarked and Original Signal
The above graph shows the difference between the original
signal and the signal after watermarking. The difference is
not much and the distortion is not audible to the human ear.
V. CONCLUSION
The secret text message that is embedded in the form of a
watermark is in very low frequency, it is also associated with
synchronization codes and thus the synchronized watermark
has the ability to resist shifting and cropping. Extensive
simulations over different audio signals indicate that the
proposed watermarking scheme has comparatively greater
robustness against common attacks. In all audio test signals,
the text message introduced no audible distortion to the
transmitted voice message. Experiments demonstrate that the
watermarked audio signals are indistinguishable from
original ones. Our watermarking method involves easy
calculation and uses the same algorithm in inverse for
extracting the text data from the voice messages. In the
conducted experiments the embedding strength is kept
constant for all audio files.
VI. FUTURE SCOPE
This method can be effectively used in sending hidden text
messages over audio signals. With the increasing use of
social media applications that allow us to send voice
messages, our technique can be collaborated with such
applications so as to send secret text messages within the
voice message in real time. This technique can also be used
for message passing in military where prime focus is given
to maintain the confidentiality and authenticity of
transmitted data. Secret text messages can be hidden in the
form of a watermark within the audio signals to be
transmitted. A key can also be specified during the encoding
process. A text message can masked with a random audio
signal thus, fooling the intruder. The proposed technique also
includes DES algorithm, a symmetric key matching
algorithm, to maintain optimum security. Intruder trying to
access the hidden text has to know the key used during
encryption. No further action is possible in case a invalid key
is entered.
REFERENCES
[1] Kais Khaldi and Abdel-Ouahab Boudraa, Senior
member, “Audio Watermarking via EMD” IEEE
transactions on audio, speech and language processing,
VOL.21, NO.3 MARCH 2013.
[2] B. Pang, L. Lee, and S. Vaithyanathan, “Thumbs up?:
Sentiment classification using machine learning
techniques,” in Proc. ACL-02 Conf. Empirical Methods
Natural Lang. Process., 2002, pp. 79–86.
[3] P. D. Turney, “Thumbs up or thumbs down?: Semantic
orientation applied To unsupervised classification of
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 222
reviews,” in Proc. 40th Annu. Meeting Assoc. Comput.
Linguist., 2002, pp. 417–424.
[4] A. Esuli and F. Sebastiani, “Determining the semantic
orientation of terms Through gloss classification,” in
Proc. 14th ACM Int. Conf. Inf. Knowl. Manage. 2005,
pp. 617–624.
[5] S. H. Choi, Y.-S. Jeong, and M. K. Jeong, “A hybrid
recommendation Method with reduced data for large-
scale application,” IEEE Trans. Syst., Man, Cybern. C,
Appl. Rev., vol. 40, no. 5, pp. 557–566, Sep. 2010.
[6] T. Mullen and N. Collier, “Sentiment analysis using
support vector machines With diverse information
sources,” in Proc. EMNLP, 2004, pp. 412–418.
[7] M. Hu and B. Liu, “Mining and summarizing customer
reviews,” in Proc.10th ACMSIGKDD Int. Conf.Knowl.
Discov.DataMining, 2004, pp. 168–177.
[8] V. Hatzivassiloglou and K. R. McKeown, “Predicting
the semantic orientation of adjectives,” in Proc. 8th
Conf. Eur. Chap. Assoc. Comput. Linguist., Morristown,
NJ:Assoc. Comput. Linguist., 1997, pp. 174–181.
[9] A. Esuli and F. Sebastiani, “SENTIWORDNET: A
publicly available Lexical resource for opinion mining,”
in Proc. 5th Conf. Lang. Res. Eval.,2006, pp. 417–422.

More Related Content

What's hot

Energy Aware performance evaluation of WSNs.
Energy Aware performance evaluation of WSNs.Energy Aware performance evaluation of WSNs.
Energy Aware performance evaluation of WSNs.ikrrish
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection cscpconf
 
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmModified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmTELKOMNIKA JOURNAL
 
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality EstimationAdaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimationpaperpublications3
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaIAEME Publication
 
Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...TELKOMNIKA JOURNAL
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
 
Architectural implementation of video compression
Architectural implementation of video compressionArchitectural implementation of video compression
Architectural implementation of video compressioniaemedu
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking MethodsIRJET Journal
 
A Discrete-Time Polynomial Model of Single Channel Long-Haul Fiber-Optic Comm...
A Discrete-Time Polynomial Model of Single Channel Long-Haul Fiber-Optic Comm...A Discrete-Time Polynomial Model of Single Channel Long-Haul Fiber-Optic Comm...
A Discrete-Time Polynomial Model of Single Channel Long-Haul Fiber-Optic Comm...West Virginia University
 
Bb2419581967
Bb2419581967Bb2419581967
Bb2419581967IJMER
 
Analysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition TechniquesAnalysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition Techniquesidescitation
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
 
Data Communications and Matlab
Data Communications and MatlabData Communications and Matlab
Data Communications and MatlabChanaka Lasantha
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audioinventy
 

What's hot (20)

Energy Aware performance evaluation of WSNs.
Energy Aware performance evaluation of WSNs.Energy Aware performance evaluation of WSNs.
Energy Aware performance evaluation of WSNs.
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection A Novel Digital Watermarking Technique for Video Copyright Protection
A Novel Digital Watermarking Technique for Video Copyright Protection
 
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmModified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
 
Adaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality EstimationAdaptive Video Watermarking and Quality Estimation
Adaptive Video Watermarking and Quality Estimation
 
I43014752
I43014752I43014752
I43014752
 
Hybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pcaHybrid video watermarking technique by using dwt & pca
Hybrid video watermarking technique by using dwt & pca
 
Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...Robust audio watermarking based on transform domain and SVD with compressive ...
Robust audio watermarking based on transform domain and SVD with compressive ...
 
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionAdvance Digital Video Watermarking based on DWT-PCA for Copyright protection
Advance Digital Video Watermarking based on DWT-PCA for Copyright protection
 
Ai25204209
Ai25204209Ai25204209
Ai25204209
 
Architectural implementation of video compression
Architectural implementation of video compressionArchitectural implementation of video compression
Architectural implementation of video compression
 
Z4301132136
Z4301132136Z4301132136
Z4301132136
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking Methods
 
A Discrete-Time Polynomial Model of Single Channel Long-Haul Fiber-Optic Comm...
A Discrete-Time Polynomial Model of Single Channel Long-Haul Fiber-Optic Comm...A Discrete-Time Polynomial Model of Single Channel Long-Haul Fiber-Optic Comm...
A Discrete-Time Polynomial Model of Single Channel Long-Haul Fiber-Optic Comm...
 
Bb2419581967
Bb2419581967Bb2419581967
Bb2419581967
 
Analysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition TechniquesAnalysis of PEAQ Model using Wavelet Decomposition Techniques
Analysis of PEAQ Model using Wavelet Decomposition Techniques
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
 
Data Communications and Matlab
Data Communications and MatlabData Communications and Matlab
Data Communications and Matlab
 
Dsp ppt
Dsp pptDsp ppt
Dsp ppt
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
 

Viewers also liked

Kitchen sink declutter key
Kitchen sink declutter keyKitchen sink declutter key
Kitchen sink declutter keyCecilia Macaulay
 
“International Journal of Scientific and Innovative Research Vol.2, Issue1 (J...
“International Journal of Scientific and Innovative Research Vol.2, Issue1 (J...“International Journal of Scientific and Innovative Research Vol.2, Issue1 (J...
“International Journal of Scientific and Innovative Research Vol.2, Issue1 (J...Sanjay Dixit
 
Ressenya de bearn o la sala de les nines
Ressenya de bearn o la sala de les ninesRessenya de bearn o la sala de les nines
Ressenya de bearn o la sala de les ninesbryan15_16
 
Surgical anatomy of nose
Surgical anatomy of noseSurgical anatomy of nose
Surgical anatomy of noseAugustine raj
 
Holyweekandeasterfamouspaintings 160323172653
Holyweekandeasterfamouspaintings 160323172653Holyweekandeasterfamouspaintings 160323172653
Holyweekandeasterfamouspaintings 160323172653Vera Kovaleva
 
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...INFOGAIN PUBLICATION
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
 
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...INFOGAIN PUBLICATION
 
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...INFOGAIN PUBLICATION
 
Kilian Fisher UFIT Launch
Kilian Fisher UFIT Launch Kilian Fisher UFIT Launch
Kilian Fisher UFIT Launch Kilian Fisher
 
Radiombligo, Un Fenomeno
Radiombligo, Un FenomenoRadiombligo, Un Fenomeno
Radiombligo, Un FenomenoFERMIN LEDESMA
 
Terapias celulares en isquemia critica miembros inferiores
Terapias celulares en isquemia critica miembros inferioresTerapias celulares en isquemia critica miembros inferiores
Terapias celulares en isquemia critica miembros inferioresenriqueta jimenez cuadra
 

Viewers also liked (17)

Kitchen sink declutter key
Kitchen sink declutter keyKitchen sink declutter key
Kitchen sink declutter key
 
Resenya Bearn o Sala de les Nines
Resenya Bearn o Sala de les Nines Resenya Bearn o Sala de les Nines
Resenya Bearn o Sala de les Nines
 
“International Journal of Scientific and Innovative Research Vol.2, Issue1 (J...
“International Journal of Scientific and Innovative Research Vol.2, Issue1 (J...“International Journal of Scientific and Innovative Research Vol.2, Issue1 (J...
“International Journal of Scientific and Innovative Research Vol.2, Issue1 (J...
 
Ressenya de bearn o la sala de les nines
Ressenya de bearn o la sala de les ninesRessenya de bearn o la sala de les nines
Ressenya de bearn o la sala de les nines
 
Surgical anatomy of nose
Surgical anatomy of noseSurgical anatomy of nose
Surgical anatomy of nose
 
Q2 representation
Q2 representationQ2 representation
Q2 representation
 
Holyweekandeasterfamouspaintings 160323172653
Holyweekandeasterfamouspaintings 160323172653Holyweekandeasterfamouspaintings 160323172653
Holyweekandeasterfamouspaintings 160323172653
 
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...
 
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...
 
Kilian Fisher UFIT Launch
Kilian Fisher UFIT Launch Kilian Fisher UFIT Launch
Kilian Fisher UFIT Launch
 
Radiombligo, Un Fenomeno
Radiombligo, Un FenomenoRadiombligo, Un Fenomeno
Radiombligo, Un Fenomeno
 
Propriedade da Esperança Matemática
Propriedade da Esperança MatemáticaPropriedade da Esperança Matemática
Propriedade da Esperança Matemática
 
Terapias celulares en isquemia critica miembros inferiores
Terapias celulares en isquemia critica miembros inferioresTerapias celulares en isquemia critica miembros inferiores
Terapias celulares en isquemia critica miembros inferiores
 
UR BOSNA MENU
UR BOSNA MENUUR BOSNA MENU
UR BOSNA MENU
 

Similar to Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Encryption with Added Security

Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
Digital Signal Processing Quiz
Digital Signal Processing QuizDigital Signal Processing Quiz
Digital Signal Processing QuizMelissa Luster
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...ijma
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...ijma
 
Performance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
Performance Evaluation of MC-CDMA for Fixed WiMAX with EqualizationPerformance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
Performance Evaluation of MC-CDMA for Fixed WiMAX with EqualizationIRJET Journal
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxAyushJaiswal781174
 
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ijcsit
 
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) SystemPerformance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) SystemIJERA Editor
 
Speech Compression Using Wavelets
Speech Compression Using Wavelets Speech Compression Using Wavelets
Speech Compression Using Wavelets IJMER
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital mediaijctet
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
 
IRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET Journal
 

Similar to Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Encryption with Added Security (20)

Ijetcas14 493
Ijetcas14 493Ijetcas14 493
Ijetcas14 493
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Digital Signal Processing Quiz
Digital Signal Processing QuizDigital Signal Processing Quiz
Digital Signal Processing Quiz
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
 
I017446164
I017446164I017446164
I017446164
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
 
F5242832
F5242832F5242832
F5242832
 
G0523444
G0523444G0523444
G0523444
 
Performance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
Performance Evaluation of MC-CDMA for Fixed WiMAX with EqualizationPerformance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
Performance Evaluation of MC-CDMA for Fixed WiMAX with Equalization
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
 
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) SystemPerformance Analysis of Optical Code Division Multiple Access (OCDMA) System
Performance Analysis of Optical Code Division Multiple Access (OCDMA) System
 
Speech Compression Using Wavelets
Speech Compression Using Wavelets Speech Compression Using Wavelets
Speech Compression Using Wavelets
 
Commutative approach for securing digital media
Commutative approach for securing digital mediaCommutative approach for securing digital media
Commutative approach for securing digital media
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
I010435659
I010435659I010435659
I010435659
 
50120140506015
5012014050601550120140506015
50120140506015
 
IRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode DecompositionIRJET-Retina Image Decomposition using Variational Mode Decomposition
IRJET-Retina Image Decomposition using Variational Mode Decomposition
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Encryption with Added Security

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 218 Digital Audio Watermarking using EMD for Voice Message Encryption with Added Security Kunal Gawale1 , Harshali Chaudhari2 , Vasundhara Kandesar3 , Smita Sakharwade (Makade)4 Student, Smt. Indira Gandhi College of Engineering, Koparkhairne, Navi Mumbai, India Assistant Professor, Smt. Indira Gandhi College of Engineering, Koparkhairne, Navi Mumbai, India Abstract— Several accurate watermarking methods for image watermarking have being suggested and implemented to secure various forms of digital data, images and videos however, very few algorithms are proposed for audio watermarking. This is also because human audio system has dynamic range which is wider in comparison with human vision system. In this paper, a new audio watermarking algorithm for voice message encryption based on Empirical Mode Decomposition (EMD) is introduced. The audio signal is divided into frames and each frame is then decomposed adaptively, by EMD, into intrinsic oscillatory components called Intrinsic Mode Functions (IMFs). The watermark, which is the secret message that is to be sent, along with the synchronization codes are embedded into the extrema of the last IMF, a low frequency mode stable under different attacks and preserving the perceptual quality of the host signal. Based on exhaustive simulations, we show the robustness of the hidden watermark for audio compression, false decryption, re-quantization, resampling. The comparison analysis shows that our method has better performance than other steganography schemes recently reported. Keywords— Empirical mode decomposition, intrinsic mode function, audio watermarking, voice message encryption, quantization index modulation, synchronization code. I. INTRODUCTION A. What is a Watermark? A watermark is defined as a distinguishing mark impressed on paper during manufacture; visible when paper is held up to the light (e.g. $ Bill). Physical objects can be watermarked using special dyes and inks or during paper manufacturing. A digital watermark is a kind of marker covertly embedded in a noise tolerant signal such as an audio, video or image data. It is typically used to identify ownership of the copyright of such signal. Our paper focuses on using the watermarking technique to embed a secret message within the transmitted audio signal ( voice message). B. Digital Audio Watermarking Digital audio watermarking has been proved successful to provide efficient solutions for copyright protection of digital media by means of embedding a watermark in the original audio signal. Main requirements of digital audio watermarking are imperceptibility, robustness and data capacity. More precisely, the watermark must not be audible within the host audio data or the secret message hidden should not affect the audio signal in any way to maintain the quality of audio and must be robust to signal distortions applied to the host data. Finally, the watermark must be easy to extract in order to prove ownership. To achieve these requirements, seeking new watermarking schemes is a very challenging problem. Various watermarking techniques of varying complexities have been proposed. In a robust watermarking scheme solutions to different attacks are proposed but with a limited transmission bit rate. To improve the watermarking bit rate, watermarked schemes performed in the wavelets domain have been proposed. A limitation of wavelet approach is that the basis functions are fixed, and thus they do not necessarily match all real signals. C. Audio Watermarking Techniques There are several major audio watermarking techniques. They are: • Discrete Cosine Transformation (DCT) • Discrete Wavelet Transformation (DWT) • Quantization Index Modulation (QIM) • Empirical Mode Decomposition (EMD) 1) Discrete Cosine Transformation (DCT) : DCT like a Fourier Transform, it represents data in terms of frequency space rather than an amplitude space. DCT based watermarking techniques are robust compared to spatial domain techniques. Such algorithms are robust against simple image processing operations like low pass filtering, brightness and contrast adjustment, blurring etc. However, they are difficult to implement and are computationally more expensive. 2) Discrete Wavelet Transformation (DWT) : The Discrete Wavelet Transform (DWT) is currently used in a wide variety of signal processing applications, such as in audio and video compression, removal of noise in audio, and the simulation of wireless antenna
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) Infogain Publication (Infogainpublication.com www.ijaems.com distribution. Wavelets have their energy c time and are well suited for the analysis of transient, time-varying signals. Since most of the real life signals encountered are time varying in nature, the Wavelet Transform suits many applications very well. The major drawback is lack of shift invariance, which means that small shifts in the input signal can cause major variations in the distribution of energy between DWT coefficients at different scales. 3) Quantization Index Modulation (QIM) The quantization index modulation method is r noise, signal strength variations. Also it does not require linear amplifiers in the transmitter. This method enables greater efficiency than many other modes requires more complicated demodulator. Compared to this method some other modes have higher data spectral efficiency. The sidebands extend to infinity either side. 4) Empirical Mode Decomposition (EMD) : In EMD, the essential functions are fastened, and therefore they are doing not essentially match all real signals. To overcome this limitation, recently, a new signal decomposition method referred to as Empirical Mode Decomposition (EMD) has been introduced for analysing non-stationary signals derived or not from linear systems in totally adaptive way. A major advantage of EMD relies on no a priori choice of filters or basis functions. Compared to classical kernel based approaches, EMD is fully data-driven method that recursively breaks down any signal into a reduced number of zero-mean with symmetric envelopes AM FM components called Intrinsic Mode Functions (IMFs). This method is adequate for both non and non-stationary signals. EMD gives sharper spectrum of audio than any other method. II. PROPOSED SYSTEM A. Overview of the Proposed Scheme The sample audio signal is first segmented to form smaller segments of the original signal. These segments undergo EMD to obtain even smaller components called Intrinsic Mode Functions (IMFs). The bits of data that is to be sent followed by the synchronization code is embedded into the IMFs. Encryption key is used during embedding, which adds a level of security to the watermarked data. During extraction, the same EMD algorithm is applied inversely. The IMFs are combined along with the residue signal to form the watermarked audio signal which contains the hidden message 1) Synchronization Code (SC) : To locate the embedding position of the hidden watermark bits in the host signal a SC is used. This code is unaffected by cropping and shifting attacks. Let International Journal of Advanced Engineering, Management and Science (IJAEMS) Infogainpublication.com) distribution. Wavelets have their energy concentrated in time and are well suited for the analysis of transient, varying signals. Since most of the real life signals encountered are time varying in nature, the Wavelet Transform suits many applications very well. The major shift invariance, which means that small shifts in the input signal can cause major variations in the distribution of energy between DWT QIM) : The quantization index modulation method is resilient to noise, signal strength variations. Also it does not require linear amplifiers in the transmitter. This method enables greater efficiency than many other modes. However, it requires more complicated demodulator. Compared to r modes have higher data spectral efficiency. The sidebands extend to infinity either side. Empirical Mode Decomposition (EMD) : In EMD, the essential functions are fastened, and therefore they are doing not essentially match all real e this limitation, recently, a new signal decomposition method referred to as Empirical Mode Decomposition (EMD) has been introduced for stationary signals derived or not from linear systems in totally adaptive way. A major elies on no a priori choice of filters or basis functions. Compared to classical kernel based driven method that recursively breaks down any signal into a reduced mean with symmetric envelopes AM- alled Intrinsic Mode Functions (IMFs). This method is adequate for both non-`linear stationary signals. EMD gives sharper spectrum PROPOSED SYSTEM segmented to form smaller segments of the original signal. These segments undergo EMD to obtain even smaller components called nctions (IMFs). The bits of data that followed by the synchronization code is IMFs. Encryption key is used during embedding, which adds a level of security to the watermarked data. During extraction, the same EMD algorithm is applied inversely. The IMFs are combined along with the residue signal to form the watermarked which contains the hidden message. To locate the embedding position of the hidden watermark bits in the host signal a SC is used. This code is unaffected by cropping and shifting attacks. Let U be the original SC and V be an u same length. Sequence V is considered as a SC if only the number of different bits between compared bit by bit, is less than or equal than to a predefined threshold. Fig.1: Data Structure 2) Watermark Embedding : Before embedding, SCs are combined with watermark bits to form a binary sequence denoted by watermark. If we design by bits of SC and watermark respectively, the length of binary sequence to be embedded is equal to Thus, these (2N1+ N2) bits are spread out on several last IMFs (extrema) of the consecutive frames. Further, this (2N1+ N2) sequence of bits is embedded times. our watermark embedding are detailed as follows: • Step 1: Split original audio signal into frames. • Step 2: Decompose each frame into IMFs. • Step 3: Embed P times the binary sequence into extrema of the last • Step 4: Reconstruct the (EMD modified IMFc and concatenate the watermarked frames to retrieve the watermarked signal text message to be passed) {ei * } = [ei/S] . S + sgn (3S / 4) if m {ei * } = [ei/S] . S + sgn (S / 4) where ei and ei * are the extrema of the host audio signal and the watermarked signal respectively. Fig.2: Watermark Embedding 3) Watermark Extraction : For watermark extraction, host signal is split into frames and EMD is performed on each one as in embedding. We extract binary data using the below given rule . We then search for SCs in the extracted data. This procedure is repeated by shifting the selected segment (window) one sample at time until a SC is found. Wit of SC determined, we can then extrac information bits, which follows the SC. denote the binary data to be extracted and U denote the original SC. To locate the embedded watermark we search the SCs in the sequence extraction is performed without using the original audio [Vol-2, Issue-4, April- 2016] ISSN : 2454-1311 Page | 219 be an unknown sequence of the is considered as a SC if only the number of different bits between U and V, when compared bit by bit, is less than or equal than to a Data Structure Before embedding, SCs are combined with watermark bits to form a binary sequence denoted by {mi}, ith bit of If we design by N1 and N2 the numbers of bits of SC and watermark respectively, the length of binary sequence to be embedded is equal to (2N1+ N2). bits are spread out on several last- IMFs (extrema) of the consecutive frames. Further, this of bits is embedded times. Basics of our watermark embedding are detailed as follows: Step 1: Split original audio signal into frames. Step 2: Decompose each frame into IMFs. Step 3: Embed P times the binary sequence {mi} into extrema of the last IMFc by QIM. Step 4: Reconstruct the (EMD-1 ) frame using and concatenate the watermarked frames to retrieve the watermarked signal (secret text message to be passed). S + sgn (3S / 4) if mi = 1 S + sgn (S / 4) if mi = 0 are the extrema of the host audio signal and the watermarked signal respectively. Watermark Embedding For watermark extraction, host signal is split into frames EMD is performed on each one as in embedding. We extract binary data using the below given rule . We then search for SCs in the extracted data. This procedure is repeated by shifting the selected segment (window) one sample at time until a SC is found. With the position of SC determined, we can then extract the hidden which follows the SC. Let y = {mi * } denote the binary data to be extracted and U denote the To locate the embedded watermark we search the SCs in the sequence {mi * } bit by bit. The extraction is performed without using the original audio
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) Infogain Publication (Infogainpublication.com www.ijaems.com signal. Basic steps involved in the watermarking extraction are given as follows: • Step 1: Split the watermarked signal into frames. • Step 2: Decompose each frame into IMFs. • Step 3: Extract the extrema {e • Step 4: Extract mi * from ei * using the following rule mi * = 1 if ei * - [ ei * /S] . S ≥ mi * = 0 if ei * - [ ei * /S] . S < sgn (S/2) • Step 5: Set the start index of the extracted data, y , to I = 1 and L = N1 select samples (sliding window size). • Step 6: Evaluate the similarity between the extracted segment V = y(I : L) the similarity value is ≥ r, then SC and go to Step 8. Otherwise proceed to the next step. • Step 7: Increase I by 1 and slide the window to the next L = N1 samples and repeat Step 6. • Step 8: Evaluate similarity between the second extracted segment, V’ = y(I + N + N2) and U bit by bit. • Step 9: I ← I + N1 + N2 , of the new equal to sequence length of bits, go to Step 10 else repeat Step 7. • Step 10: Extract the P watermarks and make comparison bit by bit between these marks, for correction, and finally extract the desired watermark. Fig. 3: Watermark Extraction 4) Encryption : Encryption is the most effective way to achieve data security. In encryption, a key is a piece of information that determines the functional output of a cryptographic algorithm. In our system, the DES algorithm is used for encrypting and decrypting data. DES was classified as a predominant symmetric-key algorithm for the encryption of electronic data. The key is entered during the embedding process which needs to before the secret message is extracted. The same key is used for encryption and decryption, thus making it a symmetric key algorithm. This enhances the robustness of the watermarking technique. The key based technique for encryption ensures that the hidden data is not International Journal of Advanced Engineering, Management and Science (IJAEMS) Infogainpublication.com) signal. Basic steps involved in the watermarking the watermarked signal into Step 2: Decompose each frame into IMFs. {ei * } of IMFc. using the following ≥ sgn (S/2) S < sgn (S/2) Step 5: Set the start index of the extracted data, select samples (sliding Step 6: Evaluate the similarity between the V = y(I : L) and bit by bit. If , then V is taken as the SC and go to Step 8. Otherwise proceed to the by 1 and slide the window to samples and repeat Step 6. Step 8: Evaluate similarity between the second V’ = y(I + N1+ N2 : I + 2N1 , of the new I value is ence length of bits, go to Step 10 watermarks and make comparison bit by bit between these marks, for correction, and finally extract the desired Watermark Extraction Encryption is the most effective way to achieve data security. In encryption, a key is a piece of information that determines the functional output of a cryptographic lgorithm is used for decrypting data. DES was classified as a key algorithm for the key is entered during the embedding process which needs to be verified is extracted. The same key is encryption and decryption, thus making it a symmetric key algorithm. This enhances the robustness of the watermarking technique. The key based technique for encryption ensures that the hidden data is not retrieved by someone who’s not intended to access th file. A valid key should always be entered decryption side. 5) Decryption : Decryption is the process of taking encoded or the encrypted data and using a valid key, converting it back to understandable form or in this case, to extract the watermark. Decryption is done by entering the valid key during watermark extraction. This is done symmetrically i.e. the same key used for encryption and decryption. Because both parties have the same key, the decryption essentially is performed by reversing some p encryption process. In case if a during decryption then the user won’t be able to extract the embedded watermark. III. WORKFLOW The figure explains the flow of the system and the steps of shifting process used for watermark e watermark i.e. the text message the audio signal needs to be segmented into multiple IMFs. Each IMF can then be embedded with the secret with the synchronization bits. The concatenation of all the IMFs gives the resultant watermarked audio signal. extremas of the audio signal are first found so as to form the mean envelope. The envelope is then processed using EMD to find the resultant IMFs. The signal that is left after extracting the IMFs is called the residue signal. Fig. 4:Finding IMF and Watermark Embedding [Vol-2, Issue-4, April- 2016] ISSN : 2454-1311 Page | 220 retrieved by someone who’s not intended to access the file. A valid key should always be entered at the Decryption is the process of taking encoded or the encrypted data and using a valid key, converting it back to understandable form or in this case, to extract the . Decryption is done by entering the valid key during watermark extraction. This is done symmetrically i.e. the same key used for encryption and decryption. Because both parties have the same key, the decryption essentially is performed by reversing some part of the encryption process. In case if an invalid key is entered then the user won’t be able to extract WORKFLOW The figure explains the flow of the system and the steps of shifting process used for watermark embedding. For the i.e. the text message to be embedded in an audio, the audio signal needs to be segmented into multiple IMFs. embedded with the secret data along . The concatenation of all the IMFs gives the resultant watermarked audio signal. The extremas of the audio signal are first found so as to form the mean envelope. The envelope is then processed using EMD to find the resultant IMFs. The signal that is left after alled the residue signal. Finding IMF and Watermark Embedding
  • 4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 221 IV. IMPLEMENTATION A. Shifting Process : The Shifting process is used for watermark embedding. There are two conditions that need to be satisfied by the IMF function, viz. • In the whole data set, the number of extrema and the number of zero crossings must either equal or differ at most by one. • At any point, the mean value of the envelope defined by the local maxima and the envelope defined by the local minima is zero. The implementation of the shifting process can explained using the following steps- • Step 1: Take a complicated data set x(t) (the audio signal that will hold the text message data) and identify all the upper extrema of x(t). • Step 2: Interpolate the local maxima to form the upper envelope u(x). • Step 3: Identify all the lower extrema of x(t). • Step 4: Interpolate the local minima to form the lower envelope l(x). • Step 5: Calculate the mean envelope, m(t) = [u(x) + l(x)]/2 • Step 6: Extract the mean from the signal, h(t) = x(t) - m(t) • Step 7: Check whether h(t) satisfies the IMF condition. YES: h(t) is an IMF, stop shifting. NO: let x(t) = h(t), keep shifting. There seems to be negligible or no difference between the original audio and the watermarked audio, that contains the hidden text message. obtained by this method. The extraction is carried out in the similar fashion by applying EMD inversely and concatenating the IMFs and the residue signal. B. Experimental Results : Fig. 5: Comparison of Watermarked and Original Signal The above graph shows the difference between the original signal and the signal after watermarking. The difference is not much and the distortion is not audible to the human ear. V. CONCLUSION The secret text message that is embedded in the form of a watermark is in very low frequency, it is also associated with synchronization codes and thus the synchronized watermark has the ability to resist shifting and cropping. Extensive simulations over different audio signals indicate that the proposed watermarking scheme has comparatively greater robustness against common attacks. In all audio test signals, the text message introduced no audible distortion to the transmitted voice message. Experiments demonstrate that the watermarked audio signals are indistinguishable from original ones. Our watermarking method involves easy calculation and uses the same algorithm in inverse for extracting the text data from the voice messages. In the conducted experiments the embedding strength is kept constant for all audio files. VI. FUTURE SCOPE This method can be effectively used in sending hidden text messages over audio signals. With the increasing use of social media applications that allow us to send voice messages, our technique can be collaborated with such applications so as to send secret text messages within the voice message in real time. This technique can also be used for message passing in military where prime focus is given to maintain the confidentiality and authenticity of transmitted data. Secret text messages can be hidden in the form of a watermark within the audio signals to be transmitted. A key can also be specified during the encoding process. A text message can masked with a random audio signal thus, fooling the intruder. The proposed technique also includes DES algorithm, a symmetric key matching algorithm, to maintain optimum security. Intruder trying to access the hidden text has to know the key used during encryption. No further action is possible in case a invalid key is entered. REFERENCES [1] Kais Khaldi and Abdel-Ouahab Boudraa, Senior member, “Audio Watermarking via EMD” IEEE transactions on audio, speech and language processing, VOL.21, NO.3 MARCH 2013. [2] B. Pang, L. Lee, and S. Vaithyanathan, “Thumbs up?: Sentiment classification using machine learning techniques,” in Proc. ACL-02 Conf. Empirical Methods Natural Lang. Process., 2002, pp. 79–86. [3] P. D. Turney, “Thumbs up or thumbs down?: Semantic orientation applied To unsupervised classification of
  • 5. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 222 reviews,” in Proc. 40th Annu. Meeting Assoc. Comput. Linguist., 2002, pp. 417–424. [4] A. Esuli and F. Sebastiani, “Determining the semantic orientation of terms Through gloss classification,” in Proc. 14th ACM Int. Conf. Inf. Knowl. Manage. 2005, pp. 617–624. [5] S. H. Choi, Y.-S. Jeong, and M. K. Jeong, “A hybrid recommendation Method with reduced data for large- scale application,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 40, no. 5, pp. 557–566, Sep. 2010. [6] T. Mullen and N. Collier, “Sentiment analysis using support vector machines With diverse information sources,” in Proc. EMNLP, 2004, pp. 412–418. [7] M. Hu and B. Liu, “Mining and summarizing customer reviews,” in Proc.10th ACMSIGKDD Int. Conf.Knowl. Discov.DataMining, 2004, pp. 168–177. [8] V. Hatzivassiloglou and K. R. McKeown, “Predicting the semantic orientation of adjectives,” in Proc. 8th Conf. Eur. Chap. Assoc. Comput. Linguist., Morristown, NJ:Assoc. Comput. Linguist., 1997, pp. 174–181. [9] A. Esuli and F. Sebastiani, “SENTIWORDNET: A publicly available Lexical resource for opinion mining,” in Proc. 5th Conf. Lang. Res. Eval.,2006, pp. 417–422.