SlideShare a Scribd company logo
Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.047-049
47 | P a g e
Audio Watermarking Using Lsb With Adjustment Method
Ansith.S1
, Priyanka Udayabhanu2
1(Assist. Prof., Department of Electronics and Communication Engineering, Mookambika Technical Campus,
Moovattupuzha)
2
(Assist. Prof., Department of Electronics and Communication Engineering, SNGCE, Kadayiruppu)
ABSTRACT
In this paper we are discussing
watermarking on audio signals. In this method
the recorded audio data is first sampled using a
sampling frequency of 22050 Hz. Then the
watermark message is watermarked into the
sampled data of the audio signal. In this method
the adjustment is done to increase the accuracy of
the watermarked signal. Finally we extract the
message from the audio data.
Keywords— Watermarking, LSB, Adjustment
method
I. INTRODUCTION
In this paper we are discussing
watermarking on audio signals. In this method the
recorded audio data is first sampled using a sampling
frequency of 22050 Hz. The sampled audio data is
then transformed into Discrete Cosine Transform
domain. Then the watermark message is
watermarked into the DCT coefficients of the audio
signal. In this method the adjustment is done to
increase the accuracy of the watermarked signal.
Finally we extract the message from the audio data
after performing Inverse Discrete Cosine Transform
to the watermarked audio signal.
.
II. WATERMARKING
In this method the watermarking is done
using LSB (least significant bit). First we capture the
audio data. Then the audio data is sampled using a
sampling frequency of 22050 Hz. The message
which is to be watermarked into the audio signal is
entered into the text box. Each letter in the message
is converted into its ascii value. The ascii values are
represented by 7 bit binary representation. These
binary bits are stored into a column vector. Each bit
is bitwise xored with the 2nd
bit of sampled audio
data. The resultant bits after bitwise xoring are the
watermark bits. These watermark bits are
watermarked into the 2nd
bit of each sampled audio
data.
III. ADJUSTMENT METHOD
Here let ‗a‘ be the value of original data
(sampled audio data), ‗b‘ be the value of
watermarked data. Then we choose a value ‗c‘ as the
watermarked data such that it is very close the value
of ‗a‘ and the watermark bit should remain as that of
the watermarked data ‗b‘. If a > b, then b ≤ c < a or
if a < b, then a < c ≤ b.
For example, consider an 8 bit
representation. Let the 3rd
bit is to be watermarked
by a watermark bit ‗1‘. Let ‗a‘=‗00001011‘ (11d) be
the sampled data of audio signal. After
watermarking ‗a‘ will become ‗b‘= ‗00001111‘
(15d). This watermarked data is adjusted to a new
value ‗c‘= ‗00001100‘ (12d). Here ‗c‘ is very close
to ‗a‘ and the watermark bit remains same as that of
‗b‘ ie; ‗1‘. Hence now we select the watermarked
data as ‗c‘.
a=00001011=11d
b=00001111=15d
c=00001100=12d
IV. EXTRACTION OF MESSAGE
We are using the property of bitwise xoring
for extraction of message from the watermarked
signal. If C= A xor B, then A= C xor B. Hence the
2nd
bits of watermarked audio data are bitwise xored
with 2nd
bits of sampled audio data before
watermarking. The resultant bits are the message bits
and are converted into the message data.
V. EXPERIMENTAL RESULTS
.
Fig 1: Block diagram of watermarking using LSB
with adjustment method
Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.047-049
48 | P a g e
Fig 2: Output window
The output window consists of push buttons
‗record‘, ‗Play Host‘, ‗process‘ and ‗Play
Watermarked‘ and the edit text box for typing the
message. The edit text box contains ‗msg‘ as default
watermark message. When we select the push
button ‗record‘, the recording takes place for 5
seconds of time. The extracted message will be
displayed in the text box provided for it.
Fig 3: Output window after recording finished
The original audio signal will be displayed
after the recording finished. We can check the
recorded audio data by selecting the ‗Play Host‘
push button.
Fig 4:The watermarked signal and extracted message
on the output window while using the adjustment
method
VI. ANALYSIS
Fig 5: Analysis
The mean squared error between the
original signal and the watermarked signal is
calculated for both the watermarking methods with
and without using the adjustment method. The mean
squared error can be calculated as follows.
Mean squared error =
1
𝑁
𝑌 𝑛 −𝑛=𝑁−1
𝑛=0
𝑋(𝑛)2
Where N-total number of data taken
Y(n)- watermarked data
X(n)- sampled audio data.
The mean squared errors for both the cases
are calculated for 7 audio test files. It can be seen
that the mean squared error is higher for the
Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.047-049
49 | P a g e
watermarking method without using the adjustment
method.
VII. CONCLUSION
In this paper we discussed about LSB
watermarking method. The watermarking is done
with and without using the adjustment method. In
both the cases the watermarking is performed on the
sampled audio data. The adjustment method is used
to increase the accuracy of the watermarking. An
analysis is carried out for seven audio files using the
three watermarking methods. The analysis is carried
out by calculating the mean squared error between
the watermarked signal and the original signal. From
the result we can conclude that the mean squared
error is less for watermarking using the adjustment
method. The accuracy is therefore more for the
watermarking using adjustment method.
REFERENCES
[1] F. Hartung and M. Kutter, ―Multimedia
Watermarking Techniques,‖ in
Proceedings of the IEEE, vol. 87, no.7, pp.
1079-1107, July 1999.
[2] Chi-Kwong Chan , L.M. Cheng ―Hiding
data in images by simple LSB
substitution ―Pattern Recognition 37 (2004)
469– 474 , ww.elsevier.com/locate/patcog.
[3] Dr.M.A.Dorairangaswamy ―A Robust
Blind Image Watermarking Scheme in
Spatial Domain for Copyright Protection‖
International Journal of Engineering and
Technology Vol. 1, No.3, August, 2009 ,
ISSN: 1793-8236 .
[4] I. Pitas,‖A method for signature casting on
digital images,‖Proceedings of IEEE
International Conference on Image
Processing,‖ Vol. 3, pp.215-318 ,1996.
[5] R. Wolfgang and E. Delp, ‖ A watermark
for digital images,‖ Proceeding of IEEE
International Conference on Image
Processing, Vol. 2, pp.319-222, 1996.
[6] Sanghyun Joo, Youngho Suh, Jaeho Shin,
and Hisakazu Kikuchi ―A New Robust
Watermark Embedding into Wavelet DC
Components ‖ ETRI Journal, Volume 24,
Number 5, October 2002.
[7] Sadi Vural, Hiromi Tomii, Hironori
Yamauchi ―DWT Based Robust
Watermarking Embeded Using CRC-32
Techniques‖ World Academy of Science,
Engineering and Technology 5 2005.
[8] Kundur D., and Hatzinakos, D., ‗A
Robust Digital Image Water- marking
Scheme using Wavelet-Based fusion,‘ Proc.
IEEE Int. Conf. On Image Processing,
Santa Barbara, California, vol. 1, pp. 544-
547, October 1997.

More Related Content

Viewers also liked

Dh33653657
Dh33653657Dh33653657
Dh33653657
IJERA Editor
 
Di33658661
Di33658661Di33658661
Di33658661
IJERA Editor
 
Du33731735
Du33731735Du33731735
Du33731735
IJERA Editor
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
IJERA Editor
 
Sistema de computo
Sistema de computoSistema de computo
Sistema de computo
preciusidianita
 
El roi en la prensa
El roi en la prensaEl roi en la prensa
El roi en la prensa
Claudia Obando Botero
 
Poster case studies
Poster case studiesPoster case studies
Poster case studies
Sadiyya96
 
01 pengenalan algoritma
01   pengenalan algoritma01   pengenalan algoritma
01 pengenalan algoritmakua
 
11 operasi dasar masukan dan keluaran
11   operasi dasar masukan dan keluaran11   operasi dasar masukan dan keluaran
11 operasi dasar masukan dan keluaran
kua
 
Materi kuliah 15 array part 1
Materi kuliah 15   array part 1Materi kuliah 15   array part 1
Materi kuliah 15 array part 1
kua
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
rosu555
 
10 operator dan ungkapan part 2
10   operator dan ungkapan part 210   operator dan ungkapan part 2
10 operator dan ungkapan part 2kua
 
Em defesa do Twitter
Em defesa do TwitterEm defesa do Twitter
Em defesa do Twitter
Moreno Barros
 
Unilabor Novedades 2013
Unilabor Novedades 2013Unilabor Novedades 2013
Unilabor Novedades 2013
Unilabor Uniformes
 
Tanishka Latest Stills
Tanishka Latest Stills Tanishka Latest Stills
Tanishka Latest Stills
telugustop.com
 
Impress 3 a
Impress 3 aImpress 3 a
Impress 3 a
mymsiempre
 
Pesquisa de mercado- Infoglobo XD
Pesquisa de mercado- Infoglobo XDPesquisa de mercado- Infoglobo XD
Pesquisa de mercado- Infoglobo XD
Eric Schmidt
 
Controversia en los sistemas de informacion contable integrados
Controversia en los sistemas de informacion contable integradosControversia en los sistemas de informacion contable integrados
Controversia en los sistemas de informacion contable integrados
olgalucia32
 

Viewers also liked (20)

Dh33653657
Dh33653657Dh33653657
Dh33653657
 
Di33658661
Di33658661Di33658661
Di33658661
 
Du33731735
Du33731735Du33731735
Du33731735
 
Dq33705710
Dq33705710Dq33705710
Dq33705710
 
Sistema de computo
Sistema de computoSistema de computo
Sistema de computo
 
El roi en la prensa
El roi en la prensaEl roi en la prensa
El roi en la prensa
 
Poster case studies
Poster case studiesPoster case studies
Poster case studies
 
01 pengenalan algoritma
01   pengenalan algoritma01   pengenalan algoritma
01 pengenalan algoritma
 
11 operasi dasar masukan dan keluaran
11   operasi dasar masukan dan keluaran11   operasi dasar masukan dan keluaran
11 operasi dasar masukan dan keluaran
 
Materi kuliah 15 array part 1
Materi kuliah 15   array part 1Materi kuliah 15   array part 1
Materi kuliah 15 array part 1
 
Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29Network Diagram of a company ABCD Roshan basnet it 29
Network Diagram of a company ABCD Roshan basnet it 29
 
10 operator dan ungkapan part 2
10   operator dan ungkapan part 210   operator dan ungkapan part 2
10 operator dan ungkapan part 2
 
Juegos olímpicos informatica,,
Juegos olímpicos informatica,,Juegos olímpicos informatica,,
Juegos olímpicos informatica,,
 
Em defesa do Twitter
Em defesa do TwitterEm defesa do Twitter
Em defesa do Twitter
 
Unilabor Novedades 2013
Unilabor Novedades 2013Unilabor Novedades 2013
Unilabor Novedades 2013
 
Treballdels nuvols
Treballdels nuvolsTreballdels nuvols
Treballdels nuvols
 
Tanishka Latest Stills
Tanishka Latest Stills Tanishka Latest Stills
Tanishka Latest Stills
 
Impress 3 a
Impress 3 aImpress 3 a
Impress 3 a
 
Pesquisa de mercado- Infoglobo XD
Pesquisa de mercado- Infoglobo XDPesquisa de mercado- Infoglobo XD
Pesquisa de mercado- Infoglobo XD
 
Controversia en los sistemas de informacion contable integrados
Controversia en los sistemas de informacion contable integradosControversia en los sistemas de informacion contable integrados
Controversia en los sistemas de informacion contable integrados
 

Similar to J33047049

Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalEvaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
IJRES Journal
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking Methods
IRJET Journal
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
sophiabelthome
 
Jk3516211625
Jk3516211625Jk3516211625
Jk3516211625
IJERA Editor
 
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital ImagesIRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET Journal
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
Kalyan Anugu
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
CSCJournals
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
ijcisjournal
 
Denoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transformDenoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transform
eSAT Publishing House
 
F5242832
F5242832F5242832
F5242832
IOSR-JEN
 
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
ijwmn
 
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
ijwmn
 
J03502050055
J03502050055J03502050055
J03502050055
theijes
 
Performance analysis of bio-Signal processing in ocean Environment using soft...
Performance analysis of bio-Signal processing in ocean Environment using soft...Performance analysis of bio-Signal processing in ocean Environment using soft...
Performance analysis of bio-Signal processing in ocean Environment using soft...
IJECEIAES
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
CSCJournals
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
ijcisjournal
 
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNERNOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
IJCI JOURNAL
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
eSAT Journals
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
eSAT Publishing House
 
20575-38936-1-PB.pdf
20575-38936-1-PB.pdf20575-38936-1-PB.pdf
20575-38936-1-PB.pdf
IjictTeam
 

Similar to J33047049 (20)

Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalEvaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking Methods
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Jk3516211625
Jk3516211625Jk3516211625
Jk3516211625
 
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital ImagesIRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
IRJET- SEPD Technique for Removal of Salt and Pepper Noise in Digital Images
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
Denoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transformDenoising of heart sound signal using wavelet transform
Denoising of heart sound signal using wavelet transform
 
F5242832
F5242832F5242832
F5242832
 
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
ENERGY EFFICIENT OPTIMUM SAMPLING RATE FOR ANALOGUE SIGNALS WITH EXTREMELY WI...
 
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
Energy Efficient Optimum Sampling Rate for Analogue Signals with Extremely Wi...
 
J03502050055
J03502050055J03502050055
J03502050055
 
Performance analysis of bio-Signal processing in ocean Environment using soft...
Performance analysis of bio-Signal processing in ocean Environment using soft...Performance analysis of bio-Signal processing in ocean Environment using soft...
Performance analysis of bio-Signal processing in ocean Environment using soft...
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
Noise Immune Convolutional Encoder Design and Its Implementation in Tanner
 
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNERNOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
NOISE IMMUNE CONVOLUTIONAL ENCODER DESIGN AND ITS IMPLEMENTATIONIN TANNER
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
 
20575-38936-1-PB.pdf
20575-38936-1-PB.pdf20575-38936-1-PB.pdf
20575-38936-1-PB.pdf
 

Recently uploaded

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 

Recently uploaded (20)

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 

J33047049

  • 1. Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.047-049 47 | P a g e Audio Watermarking Using Lsb With Adjustment Method Ansith.S1 , Priyanka Udayabhanu2 1(Assist. Prof., Department of Electronics and Communication Engineering, Mookambika Technical Campus, Moovattupuzha) 2 (Assist. Prof., Department of Electronics and Communication Engineering, SNGCE, Kadayiruppu) ABSTRACT In this paper we are discussing watermarking on audio signals. In this method the recorded audio data is first sampled using a sampling frequency of 22050 Hz. Then the watermark message is watermarked into the sampled data of the audio signal. In this method the adjustment is done to increase the accuracy of the watermarked signal. Finally we extract the message from the audio data. Keywords— Watermarking, LSB, Adjustment method I. INTRODUCTION In this paper we are discussing watermarking on audio signals. In this method the recorded audio data is first sampled using a sampling frequency of 22050 Hz. The sampled audio data is then transformed into Discrete Cosine Transform domain. Then the watermark message is watermarked into the DCT coefficients of the audio signal. In this method the adjustment is done to increase the accuracy of the watermarked signal. Finally we extract the message from the audio data after performing Inverse Discrete Cosine Transform to the watermarked audio signal. . II. WATERMARKING In this method the watermarking is done using LSB (least significant bit). First we capture the audio data. Then the audio data is sampled using a sampling frequency of 22050 Hz. The message which is to be watermarked into the audio signal is entered into the text box. Each letter in the message is converted into its ascii value. The ascii values are represented by 7 bit binary representation. These binary bits are stored into a column vector. Each bit is bitwise xored with the 2nd bit of sampled audio data. The resultant bits after bitwise xoring are the watermark bits. These watermark bits are watermarked into the 2nd bit of each sampled audio data. III. ADJUSTMENT METHOD Here let ‗a‘ be the value of original data (sampled audio data), ‗b‘ be the value of watermarked data. Then we choose a value ‗c‘ as the watermarked data such that it is very close the value of ‗a‘ and the watermark bit should remain as that of the watermarked data ‗b‘. If a > b, then b ≤ c < a or if a < b, then a < c ≤ b. For example, consider an 8 bit representation. Let the 3rd bit is to be watermarked by a watermark bit ‗1‘. Let ‗a‘=‗00001011‘ (11d) be the sampled data of audio signal. After watermarking ‗a‘ will become ‗b‘= ‗00001111‘ (15d). This watermarked data is adjusted to a new value ‗c‘= ‗00001100‘ (12d). Here ‗c‘ is very close to ‗a‘ and the watermark bit remains same as that of ‗b‘ ie; ‗1‘. Hence now we select the watermarked data as ‗c‘. a=00001011=11d b=00001111=15d c=00001100=12d IV. EXTRACTION OF MESSAGE We are using the property of bitwise xoring for extraction of message from the watermarked signal. If C= A xor B, then A= C xor B. Hence the 2nd bits of watermarked audio data are bitwise xored with 2nd bits of sampled audio data before watermarking. The resultant bits are the message bits and are converted into the message data. V. EXPERIMENTAL RESULTS . Fig 1: Block diagram of watermarking using LSB with adjustment method
  • 2. Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.047-049 48 | P a g e Fig 2: Output window The output window consists of push buttons ‗record‘, ‗Play Host‘, ‗process‘ and ‗Play Watermarked‘ and the edit text box for typing the message. The edit text box contains ‗msg‘ as default watermark message. When we select the push button ‗record‘, the recording takes place for 5 seconds of time. The extracted message will be displayed in the text box provided for it. Fig 3: Output window after recording finished The original audio signal will be displayed after the recording finished. We can check the recorded audio data by selecting the ‗Play Host‘ push button. Fig 4:The watermarked signal and extracted message on the output window while using the adjustment method VI. ANALYSIS Fig 5: Analysis The mean squared error between the original signal and the watermarked signal is calculated for both the watermarking methods with and without using the adjustment method. The mean squared error can be calculated as follows. Mean squared error = 1 𝑁 𝑌 𝑛 −𝑛=𝑁−1 𝑛=0 𝑋(𝑛)2 Where N-total number of data taken Y(n)- watermarked data X(n)- sampled audio data. The mean squared errors for both the cases are calculated for 7 audio test files. It can be seen that the mean squared error is higher for the
  • 3. Ansith.S, Priyanka Udayabhanu / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.047-049 49 | P a g e watermarking method without using the adjustment method. VII. CONCLUSION In this paper we discussed about LSB watermarking method. The watermarking is done with and without using the adjustment method. In both the cases the watermarking is performed on the sampled audio data. The adjustment method is used to increase the accuracy of the watermarking. An analysis is carried out for seven audio files using the three watermarking methods. The analysis is carried out by calculating the mean squared error between the watermarked signal and the original signal. From the result we can conclude that the mean squared error is less for watermarking using the adjustment method. The accuracy is therefore more for the watermarking using adjustment method. REFERENCES [1] F. Hartung and M. Kutter, ―Multimedia Watermarking Techniques,‖ in Proceedings of the IEEE, vol. 87, no.7, pp. 1079-1107, July 1999. [2] Chi-Kwong Chan , L.M. Cheng ―Hiding data in images by simple LSB substitution ―Pattern Recognition 37 (2004) 469– 474 , ww.elsevier.com/locate/patcog. [3] Dr.M.A.Dorairangaswamy ―A Robust Blind Image Watermarking Scheme in Spatial Domain for Copyright Protection‖ International Journal of Engineering and Technology Vol. 1, No.3, August, 2009 , ISSN: 1793-8236 . [4] I. Pitas,‖A method for signature casting on digital images,‖Proceedings of IEEE International Conference on Image Processing,‖ Vol. 3, pp.215-318 ,1996. [5] R. Wolfgang and E. Delp, ‖ A watermark for digital images,‖ Proceeding of IEEE International Conference on Image Processing, Vol. 2, pp.319-222, 1996. [6] Sanghyun Joo, Youngho Suh, Jaeho Shin, and Hisakazu Kikuchi ―A New Robust Watermark Embedding into Wavelet DC Components ‖ ETRI Journal, Volume 24, Number 5, October 2002. [7] Sadi Vural, Hiromi Tomii, Hironori Yamauchi ―DWT Based Robust Watermarking Embeded Using CRC-32 Techniques‖ World Academy of Science, Engineering and Technology 5 2005. [8] Kundur D., and Hatzinakos, D., ‗A Robust Digital Image Water- marking Scheme using Wavelet-Based fusion,‘ Proc. IEEE Int. Conf. On Image Processing, Santa Barbara, California, vol. 1, pp. 544- 547, October 1997.