SlideShare a Scribd company logo
1 of 7
Download to read offline
International Association of Scientific Innovation and Research (IASIR)
(An Association Unifying the Sciences, Engineering, and Applied Research)
International Journal of Emerging Technologies in Computational
and Applied Sciences (IJETCAS)
www.iasir.net
IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 536
ISSN (Print): 2279-0047
ISSN (Online): 2279-0055
Robust Spread Spectrum Watermarking Technique Based on Empirical
Mode Decomposition
Jeebananda Panda1
, Karan Raj Gera2
, Asok Bhattacharyya3
1
Deptt. of Electronics and Communication Engineering, Delhi Technological University, INDIA
2
Deptt. of Electronics and Communication Engineering, S.V National Institute of Technology, INDIA
3
Deptt. of Electronics and Communication Engineering, Delhi Technological University, INDIA
Abstract: In this paper, an audio watermarking scheme based on Empirical Mode Decomposition (EMD) is
proposed that uses spread spectrum technique for the embedding process. The audio signal is separated into
segments, which, by EMD are decomposed into their respective frequencies that are represented by intrinsic
mode functions (IMFs). These functions are fully described by their extrema. Having the lowest frequency, the
spread spectrum technique is performed over the extrema points of the last IMF. The technique involves
Discrete Cosine Transform (DCT) of the extremas, that are rearranged in descending order before the
watermarking bits are added to them using additive embedding technique. The embedding process is carried put
on the last IMF while the extraction procedure is performed over the lower order IMFs using non-blind
technique. Through rigorous simulations, the scheme is proved to be robust against various attacks like additive
noise, cropping, high pass and low pass filtering, and wiener filter..
Keywords: Additive Watermarking, Empirical Mode Decomposition, Intrinsic Mode Function, Spread
Spectrum, Non Blind Technique
I. Introduction
Recent improvement and growth of the cyber world has generated the capability and motivation for electronic
watermarking as means of copyright protection [1]. The watermarking techniques are categorized into fragile or
robust, and blind and non-blind embedding techniques. This paper concerns robust watermarking technique that
uses non-blind technique for the extraction of the same. Robustness means that the algorithm is resilient to some
audio distortions such as cropping, filtering, additive noise and mp3 compression. At this stage, the scheme
possesses tolerable immunity against the first three attacks, but near future is expected to see the scheme to work
its way out of the last attack too.
An audio watermarking scheme needs to bear some basic features: 1) Imperceptibility: the quality of the audio
signal should remain intact after the watermarking process; 2) Robustness: the watermarking technique should
be robust against various attacks; 3) Capacity: the watermarking scheme should bear enough capacity to embed
a certain amount of watermarking bits into the audio signal; 4) Security: security implies that the watermark can
be detected only by the authorized person. Often, these featured compliment each other which calls for the need
for proposition of different watermarking techniques to reach an optimum result.
Recently, EMD [2]-[4] has gained popularity as a method to extract the constituent frequencies from a signal as
compared to the wavelet transform [5]. In [5], many multi-resolution sub-bands are created when Discrete
Wavelet Transform (DWT) is performed over the host audio signal; and the watermarking bits are embedded in
the highest resolution sub-band. However, its basic functions are fixed and may not match the shape of the
considered data series in every instant in time limiting its usage and growing interest in EMD. EMD, on the other
hand divides the signal into a set of functions called the Intrinsic Mode Functions (IMF), by a process known as
the sifting process. According to the decomposition rule, any signal can be expanded as:
Where C is the number of IMFs and Cr (t) denotes the final residual.
Moreover, introduction of an embedding technique called the spread spectrum [6] increases the robustness of
the scheme. In [6], Cox et. al. constructed the watermarks based on the principle that they be identically
distributed (i.i.d) Gaussian random vector that are inserted into significantly spectral components of the data,
with minimal detection. The basic concept involved the Discrete Cosine Transform of the image signal [7]. In
[7], it is shown that DCT gives a good approximation, Ψ, to the eigenvectors of the Toeplitz matrices that plays
x(t) = jIMFj=1
C
∑ (t) + Cr (t) (1)
Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014,
pp. 536-542
IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 537
(2)
an important role in signal processing (especially image processing). However, we would perform DCT on the
extrema points of the last IMF of the host audio signal, whose coefficients are provided by the following
equations:
where X(m) is the signal on which the transform is to be performed.
To reduce the risk of decoding the scheme, the sequence is then arranged in descending order with the original
sequence saved as a secret key, which is then embedded with the watermarking bits treated in the same manner.
In spread spectrum watermarking, a narrow-band signal is transmitted over a much larger bandwidth such that
the signal energy presented in any signal frequency is undetectable. Thus, the watermark is spread over many
frequency bins so that the energy in one bin is undetectable. Thus, to destroy it, noise of high amplitude is
required to be added to all frequency bins. This type of watermarking is robust, since to be confident of
eliminating a watermark, the attack must attack all possible frequency bins with modifications of considerable
strength.
II. Proposed Watermark Embedding Algorithm
Fig 1. Watermarking embedding algorithm
The basic concept as stated in [9], behind watermarking algorithm is that the image is first converted into its
binary form so that it can be represented by a matrix M ∈ 0,1{ }. It is then converted into a 1-D array
A ∈ 0,1{ }, which is combined with the synchronization bits to form the watermark array A ∈ 0,1{ }. The
synchronization code is a stream of bits ∈ 0,1{ } chosen, to differentiate between two consecutive message bits.
The present sequence of the watermark array is stored before it is arranged in descending order. This key serves
as a security confirmation when extracting the watermark. The extrema points of the last IMF are also treated in
the same manner before embedding the watermarking bits. The basic steps to embed the watermark, as shown in
fig. 1, are explained as follows:
1. The original audio signal is to be divided into segments.
2. The Empirical Mode decomposition should be performed separately on all the segments.
3. Perform DCT on segments of the extrema points of the last IMFs concatenated together as IMFc, of the
xG (0) =
2
M
X(m)
m=0
M −1
∑
(3)xG (0) =
2
M
X(m)
m=0
M−1
∑ cos
(2m +1)kπ
2M k = 1,2,...,M −1
Audio signal
Watermarked
signal
Watermarking bits
iwm{ }
DCT (
iwm{ })
Descending order seq.
stored as ia{ }
Segmentation EMD Concatenated IMFc DCT (
ie{ })
Segmentation
−1
EMDConcatenation Restoring seq. as ia{ }
and IDCT
Synchronization bits
1-D binary
watermark
Descending order key
stored as ik{ }
Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014,
pp. 536-542
IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 538
size of watermarking bits. Store the sequence as an array ia{ } before arranging it into descending
order as ie{ }.
4. The same procedure is carried out on the watermarking bits and the key is stored as an array ik{ }.
5. Embed times ik{ } into maximas in ie{ } and/or minimas in ie{ } by additive embedding [9]:
where sgn function denotes ‘+’ if ie is a maxima, else it represents a ‘-’operation. S is the embedding
strength [10] fixed to an optimum value.
6. The embedded points i
*
e are arranged in the original order using the key ia{ } before IDCT (inverse
DCT) is performed on i
*
e .
7. Separate the concatenated watermarked IMFc into its respective segments.
8. Reconstruct segments by −1
EMD using the modified last IMFs of each segment and concatenate the
watermarked segments to retrieve the watermarked signal.
III. The Watermark Extraction Algorithm
Fig 2 . Watermark extraction algorithm
The proposed extraction process is based on non-blind method, and is carried out on the lower order IMFs. This
is done due to the fact that the dependency of the selected frequencies on standard deviation causes the
magnitude of the watermarked spikes to move up to the higher frequencies from where it can be successfully
extracted. As the deviation reduces as the IMF order increases, the strength of the watermark also reduces. The
extraction involves using the secret key to arrange the extracted watermarking bits in the original order. The
basic steps involved in the extraction process, as shown in fig. 2, are explained as follows:
1. The watermarked signal is to be divided into segments.
2. IMFs should be obtained by performing EMD on all the segments.
3. The IMF order of all the segments, from which the extrema points i
*
e{ }need to be extracted, need to be
concatenated.
i
*
e{ }= ie + sgn(S* ik ) (4)
Watermarked
signal
Descending order
Concatenated IMF1, or
IMF2… of the original
audio signal
DCT on extrema and
arrangement into
descending order
Watermarking bits
1-D binary
watermark
using τ
Original order
by using key Ki
and IDCT
Segmentation EMD Concatenated
IMF1 or IMF2…. DCT ie{ }
Extraction of
ie{ }
Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014,
pp. 536-542
IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 539
4. Perform DCT on segments i
*
e{ } of the size of the watermarking bits before arranging it into
descending order. Also perform the same on the corresponding IMF of the original audio signal to get
ie{ }.
5. Obtain i
*
m{ } from i
*
e{ } by:
6. Arrange i
*
m{ } into the original order i
**
m{ } by using the secret key provided to authorized personnel.
7. Perform IDCT on i
**
m{ } before setting a threshold value τ by:
8. Obtain the binary 1-D array ix of the image by:
9. Recreate the 2-D binary image by ix{ }.
IV. Experimental Analysis
This Technique has been formulated over a 2 sec wav audio signal sampled at 44.1 khz which gives us 88200
samples to embed the image. Each segment contains 441 samples, which divides the audio signal into 200
segments. The binary image to be watermarked is taken as of M × N =10 × 20 = 200 bits (fig. 3). This 2-D
image is converted into a 1-D array in order to embed it into the audio signal. The synchronization code is chosen
to be [0 1 1 1 1 1 1 0] based on the concept of byte-stuffing in synchronous transmissions in serial medium.
As stated earlier, spread spectrum allows all energy, corresponding to any one of the frequency bins, to be
dissipated across many frequency bins thus making the scheme quite robust. The process performed over the
maxima values is been shown in fig. 4.
i
*
m = i
*
e − ie
τ =
max( i
**
m )+ min( i
**
m )
2
ix =
1
0






if i
**
m ≥ τ
if i
**
m ≤τ
Fig. 4. DCT performed over the maxima values and then
arranged into descending order.
Fig 3 . Binary watermark
(5)
(6)
(7)
Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014,
pp. 536-542
IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 540
Moreover, the embedded bits can be observed across IMF 1 and IMF 2 clearly as shown in fig. 5 and fig. 6.
However, the percentage similarity of the extracted watermark from IMF 3 came out to be only 14.81%, which
may be neglected.
Managing the imperceptibility and the robustness of the scheme, 0.73 came out to be the best possible value of
the embedding coefficient that allowed us to extract 100% watermark from both IMF 1 and IMF 2. This value is
much less than that proposed in [8]. Also, the value of the embedding strength can be reduced to 0.52 in case of
100% extraction from only IMF 1. The range and percentage similarities of the extracted watermarks are been
shown in table no.1.
Table 1: Percentage similarity of the extracted watermark for different values of S
Value of
S
IMF order
Percentage
similarity
Extracted
watermark
0.52
IMF 1
IMF 2
100
81
0.73
IMF 1
IMF 2
100
100
Fig. 5 IMF 1 before and after watermarking one segment
Fig. 6 IMF 2 before and after watermarking one segment
Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014,
pp. 536-542
IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 541
V. Results
To evaluate the robustness of the proposed scheme, different attacks have been performed:
1) Noise – White Gaussian Noise (WGN) is added to the signal to make the Signal to Noise Ratio (SNR)
as 20 dB.
2) Filtering – The signal is filtered through the low pass as well as a high pass filter.
3) Cropping – Segments of 441 samples are removes at about 13 locations and are replaced with those
segments contaminated with WGN.
4) Compression – The watermarked signal compressed and eventually decompressed using MP3
compression at 320 kbps.
Table 2 and 3 show the results of the extraction from IMF 1 and IMF 2 after attacks on the watermarked signal.
Given all the attacks, including WGN, detection over 50% is possible.
Detection through multiple IMFs gives us the advantage over the filtering attack. If a particular frequency
corresponding to an IMF is masked, the watermarked can be successfully extracted from the other frequency
bearing the magnitude change. The scheme has even proved to be robust enough against wiener filter attack.
Moreover, the spread spectrum technique has been proved to be efficient for a range of values of the embedding
strength that provides an option to decide an optimum value considering the compromising factor between
imperceptibility and robustness. Also, by table no. 3, the scheme has proved that it is robust even in the case of
attacks being performed on the lower order IMFs. Table no. 4 gives the experimental results proving the scheme
to be robust against the additive white Gaussian noise attack for range of values. The technique extracts the
watermark from the signal, adultered with noise up to 4dB SNR, with 100% percentage similarity. The
experimental results for the same are shown in table no. 4.
Attack type
Percentage
similarity
Extracted
watermark
No attack
AWGN (20 dB)
Cropping
High pass filter
Wiener filter (10 dB)
100
55.75
68.19
72.37
91.60
Attack type
Percentage
similarity
Extracted
watermark
No attack
AWGN (20 dB)
Cropping
Low pass filter
Wiener filter (10
dB)
100
100
100
84.61
75.59
Table 2: Percentage similarity of the extracted
watermark for different attacks from IMF1
Table 3: Percentage similarity of the extracted
watermark for different attacks from IMF2
Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014,
pp. 536-542
IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 542
VI. Conclusion
In this paper, a new scheme to embed the watermark has been proposed. Watermark is embedded in the lowest
frequency, and also, the embedding process is through spread spectrum technique thus achieving good
performance against various attacks. Extensive simulations have been performed and the scheme has been proved
to be robust. However, this scheme did not give positive results for mp3 compression attack. Our future work
concerns the same. Moreover, effort is being carried out for embedding the watermark with varying values of
embedding strengths, which would allow better inaudibility.
References
[1] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “A secure, robust watermark for multimedia,” LNCS, vol. 1174, pp. 185–206,
1996.
[2] N. E. Huang et al., “The empirical mode decomposition and Hilbert spectrum for nonlinear and non-stationary time series
analysis,” Proc. R. Soc., vol. 454, no. 1971, pp. 903–995, 1998.
[3] Schlurmann, T. "The empirical mode decomposition and the Hilbert Spectra to analyse embedded characteristic oscillations of
extreme waves." Actes de Colloques-IFREMER 32 (2001).
[4] Khaldi, Kais, et al. "Audio encoding using Huang and Hilbert transforms." Communications, Control and Signal Processing
(ISCCSP), 2010 4th International Symposium on. IEEE, 2010.
[5] Al-Haj, A., L. Bata, and A. Mohammad. "Audio watermarking using wavelets." Networked Digital Technologies, 2009. NDT'09.
First International Conference on. IEEE, 2009.
[6] Cox, Ingemar J., et al. "Secure spread spectrum watermarking for multimedia." Image Processing, IEEE Transactions on 6.12
(1997): 1673-1687.
[7] Ahmed, N., T. Natarajan, and K. R. Rao. "Discrete Cosine Transform." Selected Papers on Visual Communication: Technology
and Applications 13 (1990): 145.
[8] Kais Khaldi and Abdel-Ouahab Boudraa, “Audio Watermarking Via EMD,” IEEE Trans. Audio Speech Language Process., vol.
21, no. 3, pp. 675–680, Mar. 2013.
[9] Khokhar, Hafiz Malik Ashfaq, Rashid Ansari, and Marco Salvemini. "Blind Detection for Additive Embedding Using
Underdetermined ICA." Multimedia, 2006. ISM'06. Eighth IEEE International Symposium on. IEEE, 2006.
[10] Vuckovic, Vesna. "Embedding Strength Criteria for AWGN Watermark, Robust Against Expected Distortion." Computing and
Informatics 29 (2010): 357-387.
SNR after
AWGN
Percentage
similarity
Extracted
watermark
3
4
5
10
15
20
98.18
100
100
100
100
100
Table 4: Percentage similarity of the extracted watermark
for different values of SNR after AWGN

More Related Content

What's hot

NetSim Technology Library- Propagation models
NetSim Technology Library- Propagation modelsNetSim Technology Library- Propagation models
NetSim Technology Library- Propagation modelsVishal Sharma
 
Ofdm sim-matlab-code-tutorial web for EE students
Ofdm sim-matlab-code-tutorial web for EE studentsOfdm sim-matlab-code-tutorial web for EE students
Ofdm sim-matlab-code-tutorial web for EE studentsMike Martin
 
Iaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression forIaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression forIaetsd Iaetsd
 
Ber performance analysis of mimo systems using equalization
Ber performance analysis of mimo systems using equalizationBer performance analysis of mimo systems using equalization
Ber performance analysis of mimo systems using equalizationAlexander Decker
 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precodingadeelrazi
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
EE443 - Communications 1 - Lab 3 - Loren Schwappach.pdf
EE443 - Communications 1 - Lab 3 - Loren Schwappach.pdfEE443 - Communications 1 - Lab 3 - Loren Schwappach.pdf
EE443 - Communications 1 - Lab 3 - Loren Schwappach.pdfLoren Schwappach
 
Performance analysis of radar based on ds bpsk modulation technique
Performance analysis of radar based on ds bpsk modulation techniquePerformance analysis of radar based on ds bpsk modulation technique
Performance analysis of radar based on ds bpsk modulation techniqueIAEME Publication
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...CSCJournals
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnologyPrashant Madnavat
 
MartinDickThesis
MartinDickThesisMartinDickThesis
MartinDickThesisMartin Dick
 
Report :- MIMO features In WiMAX and LTE: An Overview
Report :- MIMO features In WiMAX and LTE: An OverviewReport :- MIMO features In WiMAX and LTE: An Overview
Report :- MIMO features In WiMAX and LTE: An OverviewPrav_Kalyan
 

What's hot (17)

NetSim Technology Library- Propagation models
NetSim Technology Library- Propagation modelsNetSim Technology Library- Propagation models
NetSim Technology Library- Propagation models
 
Ofdm sim-matlab-code-tutorial web for EE students
Ofdm sim-matlab-code-tutorial web for EE studentsOfdm sim-matlab-code-tutorial web for EE students
Ofdm sim-matlab-code-tutorial web for EE students
 
Iaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression forIaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression for
 
Beamforming for Antenna Array
Beamforming for Antenna ArrayBeamforming for Antenna Array
Beamforming for Antenna Array
 
Ber performance analysis of mimo systems using equalization
Ber performance analysis of mimo systems using equalizationBer performance analysis of mimo systems using equalization
Ber performance analysis of mimo systems using equalization
 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precoding
 
Ipmc003 2
Ipmc003 2Ipmc003 2
Ipmc003 2
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
EE443 - Communications 1 - Lab 3 - Loren Schwappach.pdf
EE443 - Communications 1 - Lab 3 - Loren Schwappach.pdfEE443 - Communications 1 - Lab 3 - Loren Schwappach.pdf
EE443 - Communications 1 - Lab 3 - Loren Schwappach.pdf
 
Performance analysis of radar based on ds bpsk modulation technique
Performance analysis of radar based on ds bpsk modulation techniquePerformance analysis of radar based on ds bpsk modulation technique
Performance analysis of radar based on ds bpsk modulation technique
 
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
A Dual Tree Complex Wavelet Transform Construction and Its Application to Ima...
 
Gu2512391243
Gu2512391243Gu2512391243
Gu2512391243
 
Wavelet video processing tecnology
Wavelet video processing tecnologyWavelet video processing tecnology
Wavelet video processing tecnology
 
Ppt
PptPpt
Ppt
 
MartinDickThesis
MartinDickThesisMartinDickThesis
MartinDickThesis
 
A0530106
A0530106A0530106
A0530106
 
Report :- MIMO features In WiMAX and LTE: An Overview
Report :- MIMO features In WiMAX and LTE: An OverviewReport :- MIMO features In WiMAX and LTE: An Overview
Report :- MIMO features In WiMAX and LTE: An Overview
 

Similar to Ijetcas14 493

DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...INFOGAIN PUBLICATION
 
Application of smart antenna interference suppression techniques in tdscdma
Application of smart antenna interference suppression techniques in tdscdmaApplication of smart antenna interference suppression techniques in tdscdma
Application of smart antenna interference suppression techniques in tdscdmamarwaeng
 
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmModified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmTELKOMNIKA JOURNAL
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesIJEEE
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...IJCNCJournal
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Publishing House
 
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAKARTHIKEYAN V
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1KARTHIKEYAN V
 
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...cscpconf
 
Mc cdma performance on single
Mc cdma performance on singleMc cdma performance on single
Mc cdma performance on singlecsandit
 
SC-FDM-IDMA Scheme Employing BCH Coding
SC-FDM-IDMA Scheme Employing BCH Coding SC-FDM-IDMA Scheme Employing BCH Coding
SC-FDM-IDMA Scheme Employing BCH Coding IJECEIAES
 
Optimized implementation of an innovative digital audio equalizer
Optimized implementation of an innovative digital audio equalizerOptimized implementation of an innovative digital audio equalizer
Optimized implementation of an innovative digital audio equalizera3labdsp
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System IJECEIAES
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...IOSR Journals
 
Digital Signal Processing Quiz
Digital Signal Processing QuizDigital Signal Processing Quiz
Digital Signal Processing QuizMelissa Luster
 

Similar to Ijetcas14 493 (20)

DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
Application of smart antenna interference suppression techniques in tdscdma
Application of smart antenna interference suppression techniques in tdscdmaApplication of smart antenna interference suppression techniques in tdscdma
Application of smart antenna interference suppression techniques in tdscdma
 
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics AlgorithmModified DCT-based Audio Watermarking Optimization using Genetics Algorithm
Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm
 
20120140505013
2012014050501320120140505013
20120140505013
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time Techniques
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1
 
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
 
Mc cdma performance on single
Mc cdma performance on singleMc cdma performance on single
Mc cdma performance on single
 
SC-FDM-IDMA Scheme Employing BCH Coding
SC-FDM-IDMA Scheme Employing BCH Coding SC-FDM-IDMA Scheme Employing BCH Coding
SC-FDM-IDMA Scheme Employing BCH Coding
 
D010512126
D010512126D010512126
D010512126
 
Optimized implementation of an innovative digital audio equalizer
Optimized implementation of an innovative digital audio equalizerOptimized implementation of an innovative digital audio equalizer
Optimized implementation of an innovative digital audio equalizer
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...Robust Digital Image Watermarking based on spread spectrum and convolutional ...
Robust Digital Image Watermarking based on spread spectrum and convolutional ...
 
Digital Signal Processing Quiz
Digital Signal Processing QuizDigital Signal Processing Quiz
Digital Signal Processing Quiz
 

More from Iasir Journals (20)

ijetcas14 650
ijetcas14 650ijetcas14 650
ijetcas14 650
 
Ijetcas14 648
Ijetcas14 648Ijetcas14 648
Ijetcas14 648
 
Ijetcas14 647
Ijetcas14 647Ijetcas14 647
Ijetcas14 647
 
Ijetcas14 643
Ijetcas14 643Ijetcas14 643
Ijetcas14 643
 
Ijetcas14 641
Ijetcas14 641Ijetcas14 641
Ijetcas14 641
 
Ijetcas14 639
Ijetcas14 639Ijetcas14 639
Ijetcas14 639
 
Ijetcas14 632
Ijetcas14 632Ijetcas14 632
Ijetcas14 632
 
Ijetcas14 624
Ijetcas14 624Ijetcas14 624
Ijetcas14 624
 
Ijetcas14 619
Ijetcas14 619Ijetcas14 619
Ijetcas14 619
 
Ijetcas14 615
Ijetcas14 615Ijetcas14 615
Ijetcas14 615
 
Ijetcas14 608
Ijetcas14 608Ijetcas14 608
Ijetcas14 608
 
Ijetcas14 605
Ijetcas14 605Ijetcas14 605
Ijetcas14 605
 
Ijetcas14 604
Ijetcas14 604Ijetcas14 604
Ijetcas14 604
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Ijetcas14 594
Ijetcas14 594Ijetcas14 594
Ijetcas14 594
 
Ijetcas14 593
Ijetcas14 593Ijetcas14 593
Ijetcas14 593
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Ijetcas14 589
Ijetcas14 589Ijetcas14 589
Ijetcas14 589
 
Ijetcas14 585
Ijetcas14 585Ijetcas14 585
Ijetcas14 585
 
Ijetcas14 584
Ijetcas14 584Ijetcas14 584
Ijetcas14 584
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Ijetcas14 493

  • 1. International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 536 ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 Robust Spread Spectrum Watermarking Technique Based on Empirical Mode Decomposition Jeebananda Panda1 , Karan Raj Gera2 , Asok Bhattacharyya3 1 Deptt. of Electronics and Communication Engineering, Delhi Technological University, INDIA 2 Deptt. of Electronics and Communication Engineering, S.V National Institute of Technology, INDIA 3 Deptt. of Electronics and Communication Engineering, Delhi Technological University, INDIA Abstract: In this paper, an audio watermarking scheme based on Empirical Mode Decomposition (EMD) is proposed that uses spread spectrum technique for the embedding process. The audio signal is separated into segments, which, by EMD are decomposed into their respective frequencies that are represented by intrinsic mode functions (IMFs). These functions are fully described by their extrema. Having the lowest frequency, the spread spectrum technique is performed over the extrema points of the last IMF. The technique involves Discrete Cosine Transform (DCT) of the extremas, that are rearranged in descending order before the watermarking bits are added to them using additive embedding technique. The embedding process is carried put on the last IMF while the extraction procedure is performed over the lower order IMFs using non-blind technique. Through rigorous simulations, the scheme is proved to be robust against various attacks like additive noise, cropping, high pass and low pass filtering, and wiener filter.. Keywords: Additive Watermarking, Empirical Mode Decomposition, Intrinsic Mode Function, Spread Spectrum, Non Blind Technique I. Introduction Recent improvement and growth of the cyber world has generated the capability and motivation for electronic watermarking as means of copyright protection [1]. The watermarking techniques are categorized into fragile or robust, and blind and non-blind embedding techniques. This paper concerns robust watermarking technique that uses non-blind technique for the extraction of the same. Robustness means that the algorithm is resilient to some audio distortions such as cropping, filtering, additive noise and mp3 compression. At this stage, the scheme possesses tolerable immunity against the first three attacks, but near future is expected to see the scheme to work its way out of the last attack too. An audio watermarking scheme needs to bear some basic features: 1) Imperceptibility: the quality of the audio signal should remain intact after the watermarking process; 2) Robustness: the watermarking technique should be robust against various attacks; 3) Capacity: the watermarking scheme should bear enough capacity to embed a certain amount of watermarking bits into the audio signal; 4) Security: security implies that the watermark can be detected only by the authorized person. Often, these featured compliment each other which calls for the need for proposition of different watermarking techniques to reach an optimum result. Recently, EMD [2]-[4] has gained popularity as a method to extract the constituent frequencies from a signal as compared to the wavelet transform [5]. In [5], many multi-resolution sub-bands are created when Discrete Wavelet Transform (DWT) is performed over the host audio signal; and the watermarking bits are embedded in the highest resolution sub-band. However, its basic functions are fixed and may not match the shape of the considered data series in every instant in time limiting its usage and growing interest in EMD. EMD, on the other hand divides the signal into a set of functions called the Intrinsic Mode Functions (IMF), by a process known as the sifting process. According to the decomposition rule, any signal can be expanded as: Where C is the number of IMFs and Cr (t) denotes the final residual. Moreover, introduction of an embedding technique called the spread spectrum [6] increases the robustness of the scheme. In [6], Cox et. al. constructed the watermarks based on the principle that they be identically distributed (i.i.d) Gaussian random vector that are inserted into significantly spectral components of the data, with minimal detection. The basic concept involved the Discrete Cosine Transform of the image signal [7]. In [7], it is shown that DCT gives a good approximation, Ψ, to the eigenvectors of the Toeplitz matrices that plays x(t) = jIMFj=1 C ∑ (t) + Cr (t) (1)
  • 2. Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 536-542 IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 537 (2) an important role in signal processing (especially image processing). However, we would perform DCT on the extrema points of the last IMF of the host audio signal, whose coefficients are provided by the following equations: where X(m) is the signal on which the transform is to be performed. To reduce the risk of decoding the scheme, the sequence is then arranged in descending order with the original sequence saved as a secret key, which is then embedded with the watermarking bits treated in the same manner. In spread spectrum watermarking, a narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented in any signal frequency is undetectable. Thus, the watermark is spread over many frequency bins so that the energy in one bin is undetectable. Thus, to destroy it, noise of high amplitude is required to be added to all frequency bins. This type of watermarking is robust, since to be confident of eliminating a watermark, the attack must attack all possible frequency bins with modifications of considerable strength. II. Proposed Watermark Embedding Algorithm Fig 1. Watermarking embedding algorithm The basic concept as stated in [9], behind watermarking algorithm is that the image is first converted into its binary form so that it can be represented by a matrix M ∈ 0,1{ }. It is then converted into a 1-D array A ∈ 0,1{ }, which is combined with the synchronization bits to form the watermark array A ∈ 0,1{ }. The synchronization code is a stream of bits ∈ 0,1{ } chosen, to differentiate between two consecutive message bits. The present sequence of the watermark array is stored before it is arranged in descending order. This key serves as a security confirmation when extracting the watermark. The extrema points of the last IMF are also treated in the same manner before embedding the watermarking bits. The basic steps to embed the watermark, as shown in fig. 1, are explained as follows: 1. The original audio signal is to be divided into segments. 2. The Empirical Mode decomposition should be performed separately on all the segments. 3. Perform DCT on segments of the extrema points of the last IMFs concatenated together as IMFc, of the xG (0) = 2 M X(m) m=0 M −1 ∑ (3)xG (0) = 2 M X(m) m=0 M−1 ∑ cos (2m +1)kπ 2M k = 1,2,...,M −1 Audio signal Watermarked signal Watermarking bits iwm{ } DCT ( iwm{ }) Descending order seq. stored as ia{ } Segmentation EMD Concatenated IMFc DCT ( ie{ }) Segmentation −1 EMDConcatenation Restoring seq. as ia{ } and IDCT Synchronization bits 1-D binary watermark Descending order key stored as ik{ }
  • 3. Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 536-542 IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 538 size of watermarking bits. Store the sequence as an array ia{ } before arranging it into descending order as ie{ }. 4. The same procedure is carried out on the watermarking bits and the key is stored as an array ik{ }. 5. Embed times ik{ } into maximas in ie{ } and/or minimas in ie{ } by additive embedding [9]: where sgn function denotes ‘+’ if ie is a maxima, else it represents a ‘-’operation. S is the embedding strength [10] fixed to an optimum value. 6. The embedded points i * e are arranged in the original order using the key ia{ } before IDCT (inverse DCT) is performed on i * e . 7. Separate the concatenated watermarked IMFc into its respective segments. 8. Reconstruct segments by −1 EMD using the modified last IMFs of each segment and concatenate the watermarked segments to retrieve the watermarked signal. III. The Watermark Extraction Algorithm Fig 2 . Watermark extraction algorithm The proposed extraction process is based on non-blind method, and is carried out on the lower order IMFs. This is done due to the fact that the dependency of the selected frequencies on standard deviation causes the magnitude of the watermarked spikes to move up to the higher frequencies from where it can be successfully extracted. As the deviation reduces as the IMF order increases, the strength of the watermark also reduces. The extraction involves using the secret key to arrange the extracted watermarking bits in the original order. The basic steps involved in the extraction process, as shown in fig. 2, are explained as follows: 1. The watermarked signal is to be divided into segments. 2. IMFs should be obtained by performing EMD on all the segments. 3. The IMF order of all the segments, from which the extrema points i * e{ }need to be extracted, need to be concatenated. i * e{ }= ie + sgn(S* ik ) (4) Watermarked signal Descending order Concatenated IMF1, or IMF2… of the original audio signal DCT on extrema and arrangement into descending order Watermarking bits 1-D binary watermark using τ Original order by using key Ki and IDCT Segmentation EMD Concatenated IMF1 or IMF2…. DCT ie{ } Extraction of ie{ }
  • 4. Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 536-542 IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 539 4. Perform DCT on segments i * e{ } of the size of the watermarking bits before arranging it into descending order. Also perform the same on the corresponding IMF of the original audio signal to get ie{ }. 5. Obtain i * m{ } from i * e{ } by: 6. Arrange i * m{ } into the original order i ** m{ } by using the secret key provided to authorized personnel. 7. Perform IDCT on i ** m{ } before setting a threshold value τ by: 8. Obtain the binary 1-D array ix of the image by: 9. Recreate the 2-D binary image by ix{ }. IV. Experimental Analysis This Technique has been formulated over a 2 sec wav audio signal sampled at 44.1 khz which gives us 88200 samples to embed the image. Each segment contains 441 samples, which divides the audio signal into 200 segments. The binary image to be watermarked is taken as of M × N =10 × 20 = 200 bits (fig. 3). This 2-D image is converted into a 1-D array in order to embed it into the audio signal. The synchronization code is chosen to be [0 1 1 1 1 1 1 0] based on the concept of byte-stuffing in synchronous transmissions in serial medium. As stated earlier, spread spectrum allows all energy, corresponding to any one of the frequency bins, to be dissipated across many frequency bins thus making the scheme quite robust. The process performed over the maxima values is been shown in fig. 4. i * m = i * e − ie τ = max( i ** m )+ min( i ** m ) 2 ix = 1 0       if i ** m ≥ τ if i ** m ≤τ Fig. 4. DCT performed over the maxima values and then arranged into descending order. Fig 3 . Binary watermark (5) (6) (7)
  • 5. Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 536-542 IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 540 Moreover, the embedded bits can be observed across IMF 1 and IMF 2 clearly as shown in fig. 5 and fig. 6. However, the percentage similarity of the extracted watermark from IMF 3 came out to be only 14.81%, which may be neglected. Managing the imperceptibility and the robustness of the scheme, 0.73 came out to be the best possible value of the embedding coefficient that allowed us to extract 100% watermark from both IMF 1 and IMF 2. This value is much less than that proposed in [8]. Also, the value of the embedding strength can be reduced to 0.52 in case of 100% extraction from only IMF 1. The range and percentage similarities of the extracted watermarks are been shown in table no.1. Table 1: Percentage similarity of the extracted watermark for different values of S Value of S IMF order Percentage similarity Extracted watermark 0.52 IMF 1 IMF 2 100 81 0.73 IMF 1 IMF 2 100 100 Fig. 5 IMF 1 before and after watermarking one segment Fig. 6 IMF 2 before and after watermarking one segment
  • 6. Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 536-542 IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 541 V. Results To evaluate the robustness of the proposed scheme, different attacks have been performed: 1) Noise – White Gaussian Noise (WGN) is added to the signal to make the Signal to Noise Ratio (SNR) as 20 dB. 2) Filtering – The signal is filtered through the low pass as well as a high pass filter. 3) Cropping – Segments of 441 samples are removes at about 13 locations and are replaced with those segments contaminated with WGN. 4) Compression – The watermarked signal compressed and eventually decompressed using MP3 compression at 320 kbps. Table 2 and 3 show the results of the extraction from IMF 1 and IMF 2 after attacks on the watermarked signal. Given all the attacks, including WGN, detection over 50% is possible. Detection through multiple IMFs gives us the advantage over the filtering attack. If a particular frequency corresponding to an IMF is masked, the watermarked can be successfully extracted from the other frequency bearing the magnitude change. The scheme has even proved to be robust enough against wiener filter attack. Moreover, the spread spectrum technique has been proved to be efficient for a range of values of the embedding strength that provides an option to decide an optimum value considering the compromising factor between imperceptibility and robustness. Also, by table no. 3, the scheme has proved that it is robust even in the case of attacks being performed on the lower order IMFs. Table no. 4 gives the experimental results proving the scheme to be robust against the additive white Gaussian noise attack for range of values. The technique extracts the watermark from the signal, adultered with noise up to 4dB SNR, with 100% percentage similarity. The experimental results for the same are shown in table no. 4. Attack type Percentage similarity Extracted watermark No attack AWGN (20 dB) Cropping High pass filter Wiener filter (10 dB) 100 55.75 68.19 72.37 91.60 Attack type Percentage similarity Extracted watermark No attack AWGN (20 dB) Cropping Low pass filter Wiener filter (10 dB) 100 100 100 84.61 75.59 Table 2: Percentage similarity of the extracted watermark for different attacks from IMF1 Table 3: Percentage similarity of the extracted watermark for different attacks from IMF2
  • 7. Jeebananda Panda et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 536-542 IJETCAS 14-493; © 2014, IJETCAS All Rights Reserved Page 542 VI. Conclusion In this paper, a new scheme to embed the watermark has been proposed. Watermark is embedded in the lowest frequency, and also, the embedding process is through spread spectrum technique thus achieving good performance against various attacks. Extensive simulations have been performed and the scheme has been proved to be robust. However, this scheme did not give positive results for mp3 compression attack. Our future work concerns the same. Moreover, effort is being carried out for embedding the watermark with varying values of embedding strengths, which would allow better inaudibility. References [1] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “A secure, robust watermark for multimedia,” LNCS, vol. 1174, pp. 185–206, 1996. [2] N. E. Huang et al., “The empirical mode decomposition and Hilbert spectrum for nonlinear and non-stationary time series analysis,” Proc. R. Soc., vol. 454, no. 1971, pp. 903–995, 1998. [3] Schlurmann, T. "The empirical mode decomposition and the Hilbert Spectra to analyse embedded characteristic oscillations of extreme waves." Actes de Colloques-IFREMER 32 (2001). [4] Khaldi, Kais, et al. "Audio encoding using Huang and Hilbert transforms." Communications, Control and Signal Processing (ISCCSP), 2010 4th International Symposium on. IEEE, 2010. [5] Al-Haj, A., L. Bata, and A. Mohammad. "Audio watermarking using wavelets." Networked Digital Technologies, 2009. NDT'09. First International Conference on. IEEE, 2009. [6] Cox, Ingemar J., et al. "Secure spread spectrum watermarking for multimedia." Image Processing, IEEE Transactions on 6.12 (1997): 1673-1687. [7] Ahmed, N., T. Natarajan, and K. R. Rao. "Discrete Cosine Transform." Selected Papers on Visual Communication: Technology and Applications 13 (1990): 145. [8] Kais Khaldi and Abdel-Ouahab Boudraa, “Audio Watermarking Via EMD,” IEEE Trans. Audio Speech Language Process., vol. 21, no. 3, pp. 675–680, Mar. 2013. [9] Khokhar, Hafiz Malik Ashfaq, Rashid Ansari, and Marco Salvemini. "Blind Detection for Additive Embedding Using Underdetermined ICA." Multimedia, 2006. ISM'06. Eighth IEEE International Symposium on. IEEE, 2006. [10] Vuckovic, Vesna. "Embedding Strength Criteria for AWGN Watermark, Robust Against Expected Distortion." Computing and Informatics 29 (2010): 357-387. SNR after AWGN Percentage similarity Extracted watermark 3 4 5 10 15 20 98.18 100 100 100 100 100 Table 4: Percentage similarity of the extracted watermark for different values of SNR after AWGN