CHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION
|
|
- Emerald Matthews
- 6 years ago
- Views:
Transcription
1 CHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION In chapter 4, SVD based watermarking schemes are proposed which met the requirement of imperceptibility, having high payload and are robust to most common signal processing attacks. But, the problem is that when the watermarked audios are compressed at a higher compression i.e. compression at lower bit rate, the percentage retrieval of the watermark is reduced. Since the audios posted on the networked environment i.e. WWW are mostly mp3 audios compressed at different compression rate, there is a need to develop a watermarking scheme which is inherently robust to compression attack at different bit rate or which is applicable to compressed audios. Schemes presented in Section and Section are having a high payload and can be considered as a good candidate that qualifies for making a scheme which is inherently robust to compression attack by selection of the blocks that resists compression. It s always a better idea to do a preliminary analysis of the mp3 attack on the individual blocks before finally embedding the watermark for making a watermarking scheme robust to mp3 compression. Scheme presented in Section shows more robustness than Scheme presented in Section 4.3.1therefore the former scheme is selected for embedding of watermark. So, in this chapter a dual pass audio watermarking scheme using the second norm/third norm of the group of SVs inherently robust to compression attack by block selection is proposed. In the Scheme presented in Section all the blocks are selected for watermark embedding but in the proposed scheme the block selection is based on robustness of the block to mp3 attack. The chapter is organized in 4 sections. Section 5.1 gives the analysis of some of the audio watermarking schemes used for mp3 audios and the idea which lead to problem statement. Section 5.2 presents our proposed watermarking scheme which makes the watermarked audio inherently robust to compression mp3 attack followed by results of the experiments in Section 5.3. The chapter is summarized in Section
2 5.1 Analysis of Some Audio Watermarking Schemes for Mp3 Audios and Problem Statement Most of the audios posted on WWW are posted in a compressed form. The compressed audios require a lesser space as far as memory is concerned. The mp3 compression is considered as a good compression technique in which the audibility of the audio doesn t change too much. The original and the compressed audio sound almost imperceptible. So, as far as embedding of watermark on a compressed audio or a watermarked audio robust to compression is concerned, there are two options. One option is to develop an audio watermarking scheme for compressed mp3 audios and the second option is to develop an audio watermarking scheme on which mp3 compression won t have any effect. There are some schemes developed for option 1. Qiao [120] proposed two audio watermarking schemes for MPEG encoded audios. In the first scheme the header of the audio mpeg file is used to embed watermark. In the second scheme the mpeg encoded samples are used for watermark embedding. For imperceptibility requirement only few encoded samples are used for embedding. The disadvantage of the approach is the weakness in sustaining the re-quantization and noise addition attacks. D. K. Koukopoulos [121] also proposed a blind digital watermarking scheme for mp3 audio files. The audio watermarking is done on the compressed audio directly. For watermark embedding, the scale factor is manipulated. The scheme claimed to overcome the disadvantage of the schemes operated on PCM coded audios which are vulnerable to compression/recompression attacks. Rade Petrovic [122] proposed a scheme in which prior to compression using AAC, multiple copies of the audio is produced and on each copy a single watermark bit is embedded. After perceptual compression using MDCT, a multiplexer is used to perform the task of selection of compression unit according to the code. Neuber et. al. [123] did it for AAC MPEG- 2 bit stream. For getting the frequency information, Huffman coding and de-multiplexers are used. The problem with the approach is the imperceptibility which is not guaranteed because of the unavailability of precise perceptual information at the embedding side. Cheng also proposed scheme for AAC audios in which watermark is embedded directly on to the quantization indices. Further, enhanced spread spectrum based scheme is used to improve the payload and robustness. The watermarked audio 114
3 showed robustness against compression attacks but the experimentation for checking the robustness against other signal processing attacks were not conducted and reported. There are two main problems that are associated with the schemes that embed watermark directly on the mp3 encoded coefficients and the header used for mp3 codec. One is the results of robustness against most of the signal processing operations are not favorable and the second is the transformation of the codec i.e. if the format of the audio file is changed then the header information is removed altogether which is containing the watermark information. Our scheme in Section showed perfect robustness to re-sampling. Requantization, low pass filtering, extra stereo addition etc. and reasonably good robustness to other common signal processing including the mp3 compression. The robustness towards the mp3 compression using the same embedding strategy as used in Section can be further be improved by selection of the blocks from which the watermark bit is perfectly retrieved i.e. without any false positive or false negative. 5.2 Proposed Scheme In this scheme, before doing the final embedding we identify the blocks that can sustain compression at different bit rates. The process of embedding requires two passes. In the first iteration the audio is watermarked with multiple watermarks using scheme of Section and the watermarked audio is subjected to mp3 compression at different bit rate and again decompressed and converted into the wav file with the original bit rate. The multiple watermarks are retrieved from the audio and are compared with the original watermark. The block index corresponding to the audio is saved for which the retrieved bit is the same as the original watermark bit. The process is repeated for all the watermarked audio compressed at different bit rate. Finally a set of the block indexes is formed from the sets of perfectly retrieved watermark bit indexes which are common in all the sets. In the second pass this set of identified block indexes are used for watermark embedding. In this way all the blocks from which the watermark bit was retrieved perfectly are only used for watermark bit embedding in pass 2. Thus, an inherently robust nature against mp3 compression is 115
4 induced on the watermarked audio. The advantage of this approach is that the watermark is neither embedded on the compressed form nor on the header of the mp3 codec. Additionally, complex Psychoacoustic analysis is not need to be completed prior and after the watermark embedding. Next we give the elaborated algorithm for watermark embedding and watermark extraction Watermark Embedding As already mentioned two passes are required to actually embed the watermark. Pass 1 of embedding identifies the most suitable blocks for embedding. The final watermarked audio is obtained after pass 2 of embedding which uses the block identified in pass 1. The two dimensional watermark is converted into a one dimensional sequence of bits 0 and 1., ;,,, (5.1) where Len = (W)=M x N Watermark Embedding for Pass 1 For watermark embedding group of SVs are used. The second/third norm corresponding to the group of selected singular values is modified and quantized. Through the modified norm the change is scattered to the selected individual SVs. The steps involved in embedding of the multiple watermarks on to a cover audio signal are as follows: Step 1: Let X denotes the audio signal which is sampled at 44.1 khz. X { x 1,x 2,.x N } where N is no. of samples. Partition X into frames of length L. Let X i denotes i th frame. X i {x Lxi+1 x (i+1)xl-1 } 116
5 Step 2: Each X i is transformed into a square matrix A i of dimension u. A i = T(X i ) where T(.) is the transformation function Step 3: Perform SVD on the matrix thus formed. This operation produces the three orthonormal matrices S, U and V T as follows: [U i *S i * V i T ] = Š(A i ) where S. is the singular value decomposition function Step 4: Embedding one watermark bit Embed the binary watermark bits into the SVD-transformed audio signal using dither modulation as follows: W = {0, 1} Let Y i be the watermarked diagonal matrix then Y i = EmbedUsingNom(S i, W i,,p) // EmbedUsingNom(S i, W i,,p) is the function defined for Section Step 5: Perform Inverse SVD Apply inverse SVD using U and V T matrices which is unchanged and S matrix which is modified in step 5 as follows: B wi = U i *S im *V i T B wi matrix is watermarked version of B i matrix obtained in step 3. Step 6: Multiple watermark bit addition Repeat step 2- step 5 on each segment to embed multiple bits on the audio signal. For one watermark the process is repeated Len times where Len is the total number of bits within one watermark. Step 7: Multiple watermark embedding Repeat step 2- step 6 on the next Len segments to embed multiple watermarks on the audio signal. 117
6 MP3 Compression of Watermarked Audio The watermarked audio embedded with multiple watermarks is obtained after steps given in section are applied on the original audio. The watermarked audio is subjected to mp3 compression at different bit rates i.e. 128 kbps, 96 kbps, 64 kbps and 32 kbps. Let the audios obtained after decompression to the original watermarked wav files with original bit rate are WA 128, WA 96, WA 64 and WA Finding Block Indexes for Pass 2 Step 1: Obtain SVD Matrix Perform steps 1 through step 4 of the embedding procedure given in section until the S matrix is obtained for all frames of the watermarked audio signal. Step 2: Extraction of multiple watermarks. For each segment of the frame, ExtractUsingNom function is called which returns the watermark bit. // ExtractUsingNom is defined in section Step 3: Construct the watermark sequence by appending the bits retrieved from each block. Step 4: The watermark bit sequence is compared with the original watermark bit sequence and the index corresponding to the blocks from which watermark bit is retrieved successfully is stored. Step 5: Step 1 to step 4 are repeated to extract block indexes corresponding to each watermark sequence. Step 6: Store all these block indexes in a set. Let SBI bp is such a set of block indexes. 118
7 bps ={ 32, 64,96,128} //bps (bit per second) Step 7: Step 1 to step 6 are repeated to extract SBI bps for each bps using WA 128, WA 96, WA 64 and WA 32. Step 8: The final block indexes are given by SBI = {SBI 32 Ώ SBI 64 Ώ SBI 96 Ώ SBI 128 } Ώ -> used for intersection. //SBI is the set of block indexes for which the watermark bit is retrieved perfectly for the compression at different bit rates Preprocessing of Watermark For the robustness and security of the watermark, the watermark is scrambled or encrypted using Baker s chaotic map. Let the size of the image I(x, y) of the image to be embedded is M x N with M & N as the number of rows and columns respectively. Before converting the image into one dimensional binary sequence the image I (x, y) produces permuted version I`(x, y) using Baker s chaotic with security key k1. Then I`(x,y) is converted into a binary watermark using as follows, ;,,, where Len = (W)=M x N This imposes robustness for the correct estimation or removal of watermark without the use of secret key. In the best case, the extraction is that of a chaotic permuted watermark which is required to be decoded to the original watermark through the key Watermark Embedding for Pass 2 For watermark embedding group of SVs are used. The second or the third norm corresponding to 119
8 the group of selected singular values is modified and quantized. Through the modified norm the change is scattered to the selected individual SVs. The steps involved in embedding of the watermark on to a cover audio signal are as follows: Step 1: Let X denotes the audio signal which is sampled at 44.1kHz. X { x 1,x 2,.x N } where N is no. of samples. Partition X into frames of length L. Let X i denotes i th frame where i belongs to {SBI}. X i {x Lxi+1 x (i+1)xl-1 } Step 2: Each X i is transformed into a square matrix A i of dimension u. A i = T(X i ) where T(.) is the transformation function Step 3: Baker s map chaotic encryption is done on each A i to produce B i using key k of p elements B i =Ê(A i,k,p) where Ê(.) is Baker s encryption function. Step 4: Perform SVD on the matrix thus formed. This operation produces the three orthonormal matrices S, U and V T as follows: [U i *S i * V i T ] = Š(B i ) where Š is the singular value decomposition function Step 5: Embed the watermark Bit Embed the binary watermark bits into the SVD-transformed audio signal using dither modulation as follows: W = {0, 1} Let Y i be the watermarked diagonal matrix then Y i = EmbedUsingNom(S i, W i,,p) where EmbedUsingNom is the embedding function which returns the diagonal matrix after embedding and is defined in step 5 of section Step 6: Perform Inverse SVD 120
9 Apply inverse SVD using U and V T matrices which is unchanged and S matrix which is modified in step 5 as follows: B wi = U i *S im *V T i B wi matrix is watermarked version of B i matrix obtained in step 3. Step 7: The decryption is done using the same key used in step 2 A i,m =Ð(B wi,k,p) where D is Baker s decryption function. Step 8: Multiple watermark bit addition Repeat step 2- step 7 on each segment X i where i SBI //All the watermark bits are embedded on the audio signal. For one watermark the process is repeated Len times where Len is the total number of bits within one watermark Watermark Extraction Step 1: Obtain SVD Matrix Perform step 1 through step 4 of the embedding procedure given in section until the S matrix is obtained for all frames of the watermarked audio signal. The key used for making the intermediate matrix before SVD operation for every segment is the same key used for embedding in watermark embedding procedure. Step 2: Extraction of watermark bit For each segment of the frame, ExtractUsingNom function is called which returns the watermark bit. // ExtractUsingNom (Si,,p) is defined in step 2 of section Step 3: Construct the watermark sequence by appending the bits retrieved from each segment block. Step 4: Construct the 2-d image by taking M elements corresponding to each row. The 2- d image thus formed is decrypted using the same key which is used at the time of pre processing of the watermark to obtain the final watermark. 121
10 In the next section, the results of experiments conducted on the same set audios are presented. 5.3 Results Since the embedding function used to embed a watermark bit on a block in Section is the same function used for Section 5.2.1, the results obtained for imperceptibility in terms of SNR and robustness against all attacks used for evaluating are expected to be same except mp3 compression attack. Explicit results for imperceptibility in terms of SNR of the watermarked audio and robustness to attacks other than mp3 compression are not presented here. The first set of experiments is conducted to identify the blocks which can resist mp3 compression at different bit rates. The count of such blocks is compared against the total number of blocks used in Pass 1 for different categories of music. 10 copies of the watermarks carrying a total of 1000 bits each are embedded on the succeeding portions of the original audios. So, the total number of blocks used in Pass 1 is equal to 10,000. A comparison of the total number of blocks which resist mp3 compression against 10,000 is done to give an estimate of the number of blocks that can be used for making the scheme inherently robust to compression attack. Table 5.1 present results of the count of such blocks for different audios under different categories. Table 5.1: Count of blocks in SBI for different audios. Classical Country Pop Folk S S S S S S S S S S S S S S S S The results show that the count of blocks that can resist mp3 compression is highest for classical music category and it is lowest for folk music category. Further, table 5.2 presents the percentage of the average count of such blocks for different categories of music which gives the estimate of the payload of the scheme. 122
11 Table 5.2: Average Percentage count of blocks in SBI for different audios. Music Category Percentage Count Classical Country Pop Folk The result shows that the average percentage count of the SBI blocks varies from 0.52 to This average actually gives the idea of the payload of the scheme. Almost 52 Percent of the blocks are able to resist the mp3 compression at different bit rate using scheme of Section The payload of the proposed scheme depends upon the count of such identified blocks. More is the count more will be the payload of the scheme. Since the payload of CH4PS2 is 441 bps in which all the blocks are used for watermark embedding. Using our proposed scheme by embedding the watermark bit in the selected 52 Percent of the blocks, scheme CH4PS2 can be made inherently robust to mp3 compression attack with a minimum payload of 229 bps. The robustness against mp3 compression attack is highly increased by selection of the blocks and CC of the retrieved watermark is 1 in most of the cases of audio samples. The result of robustness against different attacks given in section is presented in table 5.3. Table 5.3: Robustness against different attacks Attack CC Attack CC Requantization 1 Flip Sample 1 Resampling 1 Noise addition 0.75 Echo addition 0.91 Increase volume 0.78 Low pass 0.99 Decrease Volume 0.78 high pass 0.6 mp3 compression 1 Invert 1 LSB Zero 1 Extra stereo 1 Closed loop 1 The result shows that the proposed scheme is inherently robust to compression attacks in addition to showing good robustness to all the other mentioned attacks. Also the payload of the scheme varies from 229 bps to 300 bps. 123
12 Here, we are not explicitly comparing the robustness results of our proposed scheme with other schemes as it is an improvement over the scheme proposed in Section for which comparison results are already given in the previous chapter. The compromise to scheme in Section is only in the payload which is reduced by a maximum of 42 percent. However, the observed payload is still much higher than the contemporary schemes that are evident from the following table. Table 5.4: Payload & SNR comparison for the proposed scheme Schemes SNR(dB) Payload(bps) Proposed Scheme Shahriar[118 ] Wang [114 ] Fathi [117 ] N/A From the table it can be inferred that the proposed scheme is still having a payload which is higher than proposed by Shahriar [118], Wang [114] and Fathi [117] with almost similar SNR and robust to most common signal processing operation. 5.4 Summary In this chapter, an audio watermarking scheme inherently robust to mp3 compression is proposed based on the embedding strategy used in Section The inherent robust nature against the mp3 compression attack is induced through the selection of the watermark embedding blocks which are resistant to mp3 compression. The result of robustness against other attacks also shows the effectiveness of embedding strategy and block selection. Also block selection don t has any adverse effect on the SNR of the watermarked audio. Still after selecting the blocks, the payload of our scheme varies from 229 bps to 300 bps for different content categories of music. 124
SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL
SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,
More informationAudio-coding standards
Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.
More informationA High Payload Audio Watermarking Algorithm Robust against Mp3 Compression
A High Payload Audio Watermarking Algorithm Robust against Mp3 Compression 1 Arashdeep Kaur, 1 Malay Kishore Dutta, 1 K.M.Soni and 2 Nidhi Taneja. 1 Amity School of Engineering & Technology, Amity University,
More informationSparse Watermark Embedding and Recovery using Compressed Sensing Framework for Audio Signals
Sparse Watermark Embedding and Recovery using Compressed Sensing Framework for Audio Signals Mohamed Waleed Fakhr Electrical and Electronics Department, University of Bahrain Isa Town, Manama, Bahrain
More informationAudio-coding standards
Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.
More informationCompressed Audio Demystified by Hendrik Gideonse and Connor Smith. All Rights Reserved.
Compressed Audio Demystified Why Music Producers Need to Care About Compressed Audio Files Download Sales Up CD Sales Down High-Definition hasn t caught on yet Consumers don t seem to care about high fidelity
More informationMpeg 1 layer 3 (mp3) general overview
Mpeg 1 layer 3 (mp3) general overview 1 Digital Audio! CD Audio:! 16 bit encoding! 2 Channels (Stereo)! 44.1 khz sampling rate 2 * 44.1 khz * 16 bits = 1.41 Mb/s + Overhead (synchronization, error correction,
More informationA Novel Audio Watermarking Algorithm Based On Reduced Singular Value Decomposition
A Novel Audio Watermarking Algorithm Based On Reduced Singular Value Decomposition Jian Wang 1, Ron Healy 2, Joe Timoney 3 Computer Science Department NUI Maynooth, Co. Kildare, Ireland jwang@cs.nuim.ie
More informationAppendix 4. Audio coding algorithms
Appendix 4. Audio coding algorithms 1 Introduction The main application of audio compression systems is to obtain compact digital representations of high-quality (CD-quality) wideband audio signals. Typically
More information5: Music Compression. Music Coding. Mark Handley
5: Music Compression Mark Handley Music Coding LPC-based codecs model the sound source to achieve good compression. Works well for voice. Terrible for music. What if you can t model the source? Model the
More informationPerformance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs
Volume 73 No.6, July 2013 Performance Analysis of Discrete Wavelet Transform based Audio ing on Indian Classical Songs C. M. Juli Janardhanan Department of ECE Government Engineering College, Wayanad Mananthavady,
More informationLecture 16 Perceptual Audio Coding
EECS 225D Audio Signal Processing in Humans and Machines Lecture 16 Perceptual Audio Coding 2012-3-14 Professor Nelson Morgan today s lecture by John Lazzaro www.icsi.berkeley.edu/eecs225d/spr12/ Hero
More informationA NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO
International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationImage Watermarking by SCHUR Decomposition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1155-1159 International Research Publications House http://www. irphouse.com Image Watermarking
More informationSPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION
SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute
More informationOptical Storage Technology. MPEG Data Compression
Optical Storage Technology MPEG Data Compression MPEG-1 1 Audio Standard Moving Pictures Expert Group (MPEG) was formed in 1988 to devise compression techniques for audio and video. It first devised the
More informationAudio Watermarking using Colour Image Based on EMD and DCT
Audio Watermarking using Colour Image Based on EMD and Suhail Yoosuf 1, Ann Mary Alex 2 P. G. Scholar, Department of Electronics and Communication, Mar Baselios College of Engineering and Technology, Trivandrum,
More informationAudio Watermarking using Empirical Mode Decomposition
Audio Watermarking using Empirical Mode Decomposition Charulata P. Talele 1, Dr A. M. Patil 2 1ME Student, Electronics and Telecommunication Department J. T. Mahajan College of Engineering, Faizpur, Maharashtra,
More informationAudio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review
Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech
More informationROBUST WATERMARKING USING COMPRESSED SENSING FRAMEWORK WITH APPLICATION TO MP3 AUDIO
ROBUST WATERMARKING USING COMPRESSED SENSING FRAMEWORK WITH APPLICATION TO MP3 AUDIO Mohamed Waleed Fakhr Electrical and Electronics Engineering Department, University of Bahrain, Manama, Bahrain mfakhr@uob.edu.bh
More informationRobust Audio Watermarking Scheme with Synchronization Code and QIM
Robust Audio Watermarking Scheme with Synchronization Code and QIM N.V.Lalitha #1, Ch.Srinivasa Rao *2, P.V.Y.Jaya Sree $3 # Department of ECE, GMR Institute of Technology RAJAM-532 127, A.P. INDIA. *
More informationCHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover
38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the
More informationAudio Watermarking Based on PCM Technique
Audio Watermarking Based on PCM Technique Ranjeeta Yadav Department of ECE SGIT, Ghaziabad, INDIA Sachin Yadav Department of CSE SGIT, Ghaziabad, INDIA Jyotsna Singh Department of ECE NSIT, New Delhi,
More informationWatermarking Moble Phone Color Images With Error Correction Codes
IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes
More informationENEE408G Multimedia Signal Processing Design Project on Digital Audio Processing
The Goals ENEE408G Multimedia Signal Processing Design Project on Digital Audio Processing 1. Learn the fundamentals of perceptual coding of audio and intellectual rights protection from multimedia. 2.
More informationELL 788 Computational Perception & Cognition July November 2015
ELL 788 Computational Perception & Cognition July November 2015 Module 11 Audio Engineering: Perceptual coding Coding and decoding Signal (analog) Encoder Code (Digital) Code (Digital) Decoder Signal (analog)
More informationBiometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching
Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Neha Agrawal and Marios Savvides Carnegie Mellon University
More informationCHAPTER-6 WATERMARKING OF JPEG IMAGES
CHAPTER-6 WATERMARKING OF JPEG IMAGES 6.1 INTRODUCTION In the Chapter 4, we have discussed that we can improve the robustness of DCT and DWT based watermarking schemes against some well known attacks by
More informationPart II Authentication Techniques
Part II Authentication Techniques Authentication Codes Provides means for ensuring integrity of message Independent of secrecy - in fact sometimes secrecy may be undesirable! Techniques for Authentication
More informationMultimedia Communications. Audio coding
Multimedia Communications Audio coding Introduction Lossy compression schemes can be based on source model (e.g., speech compression) or user model (audio coding) Unlike speech, audio signals can be generated
More informationSECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION
SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION Chuhong Fei a, Raymond Kwong b, and Deepa Kundur c a A.U.G. Signals Ltd., 73 Richmond St. W, Toronto, ON M4H 4E8 Canada b University of Toronto,
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationAn SVD-based Fragile Watermarking Scheme With Grouped Blocks
An SVD-based Fragile Watermarking Scheme With Grouped Qingbo Kang Chengdu Yufei Information Engineering Co.,Ltd. 610000 Chengdu, China Email: qdsclove@gmail.com Ke Li, Hu Chen National Key Laboratory of
More informationThe MPEG-4 General Audio Coder
The MPEG-4 General Audio Coder Bernhard Grill Fraunhofer Institute for Integrated Circuits (IIS) grl 6/98 page 1 Outline MPEG-2 Advanced Audio Coding (AAC) MPEG-4 Extensions: Perceptual Noise Substitution
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationCISC 7610 Lecture 3 Multimedia data and data formats
CISC 7610 Lecture 3 Multimedia data and data formats Topics: Perceptual limits of multimedia data JPEG encoding of images MPEG encoding of audio MPEG and H.264 encoding of video Multimedia data: Perceptual
More informationCHAPTER-4 WATERMARKING OF GRAY IMAGES
CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do
More informationVoIP Forgery Detection
VoIP Forgery Detection Satish Tummala, Yanxin Liu and Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX, USA Emails: sct137@shsu.edu; yanxin@shsu.edu; liu@shsu.edu
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationReversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 5, Ver. I (Sep - Oct.2015), PP 06-13 www.iosrjournals.org Reversible Non-Blind
More informationCSCD 443/533 Advanced Networks Fall 2017
CSCD 443/533 Advanced Networks Fall 2017 Lecture 18 Compression of Video and Audio 1 Topics Compression technology Motivation Human attributes make it possible Audio Compression Video Compression Performance
More informationSimple Watermark for Stereo Audio Signals with Modulated High-Frequency Band Delay
ACOUSTICAL LETTER Simple Watermark for Stereo Audio Signals with Modulated High-Frequency Band Delay Kazuhiro Kondo and Kiyoshi Nakagawa Graduate School of Science and Engineering, Yamagata University,
More informationClemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu
Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY BaSoTI 2012, Tartu Question Definition Can we send hidden information? Steganography is the art of transmitting information
More informationVS1063 ENCODER DEMONSTRATION
PRELIMINARY DOCUMENT VS1063 ENCODER DEMONSTRATION VLSI Solution Audio Decoder Project Code: Project Name: All information in this document is provided as-is without warranty. Features are subject to change
More informationRobust Audio Watermarking Algorithm Based on Moving Average and DCT
Robust Audio Watermarking Algorithm Based on Moving Average and DCT Jinquan Zhang and Bin Han (College of Information security Engineering, Chengdu University of Information Technology, Chengdu, China)
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationDIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION
DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION T.Punithavalli 1, S. Indhumathi 2, V.Karthika 3, R.Nandhini 4 1 Assistant professor, P.A.College of Engineering and Technology, pollachi 2 Student,
More informationPerceptual Coding. Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding
Perceptual Coding Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding Part II wrap up 6.082 Fall 2006 Perceptual Coding, Slide 1 Lossless vs.
More informationComparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques
Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques 1 Himanshu Verma, Mr Tarun Rathi, 3 Mr Ashish Singh Chauhan 1 Research Scholar, Deptt of Electronics and
More informationLossy compression CSCI 470: Web Science Keith Vertanen Copyright 2013
Lossy compression CSCI 470: Web Science Keith Vertanen Copyright 2013 Digital audio Overview Sampling rate Quan5za5on MPEG audio layer 3 (MP3) JPEG s5ll images Color space conversion, downsampling Discrete
More informationMPEG-4 General Audio Coding
MPEG-4 General Audio Coding Jürgen Herre Fraunhofer Institute for Integrated Circuits (IIS) Dr. Jürgen Herre, hrr@iis.fhg.de 1 General Audio Coding Solid state players, Internet audio, terrestrial and
More informationFig. 1: The perceptual audio coding procedure and three main embedding domains.
1 Spec-ResNet: A General Audio Steganalysis Scheme based on a Deep Residual Network for Spectrograms Yanzhen Ren, Member, IEEE, Dengkai Liu, Qiaochu Xiong, Jianming Fu, and Lina Wang arxiv:191.6838v2 [cs.mm]
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationLossy compression. CSCI 470: Web Science Keith Vertanen
Lossy compression CSCI 470: Web Science Keith Vertanen Digital audio Overview Sampling rate Quan5za5on MPEG audio layer 3 (MP3) JPEG s5ll images Color space conversion, downsampling Discrete Cosine Transform
More informationAudio Compression. Audio Compression. Absolute Threshold. CD quality audio:
Audio Compression Audio Compression CD quality audio: Sampling rate = 44 KHz, Quantization = 16 bits/sample Bit-rate = ~700 Kb/s (1.41 Mb/s if 2 channel stereo) Telephone-quality speech Sampling rate =
More informationA Robust Watermarking Algorithm For JPEG Images
nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationFigure 1. Generic Encoder. Window. Spectral Analysis. Psychoacoustic Model. Quantize. Pack Data into Frames. Additional Coding.
Introduction to Digital Audio Compression B. Cavagnolo and J. Bier Berkeley Design Technology, Inc. 2107 Dwight Way, Second Floor Berkeley, CA 94704 (510) 665-1600 info@bdti.com http://www.bdti.com INTRODUCTION
More information19 th INTERNATIONAL CONGRESS ON ACOUSTICS MADRID, 2-7 SEPTEMBER 2007
19 th INTERNATIONAL CONGRESS ON ACOUSTICS MADRID, 2-7 SEPTEMBER 2007 SUBJECTIVE AND OBJECTIVE QUALITY EVALUATION FOR AUDIO WATERMARKING BASED ON SINUSOIDAL AMPLITUDE MODULATION PACS: 43.10.Pr, 43.60.Ek
More informationA Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain
A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,
More informationSignal Processing 91 (2011) Contents lists available at ScienceDirect. Signal Processing. journal homepage:
Signal Processing 91 (2011) 1693 1708 Contents lists available at ScienceDirect Signal Processing journal homepage: www.elsevier.com/locate/sigpro A robust audio watermarking scheme based on reduced singular
More informationImage Authentication and Recovery Scheme Based on Watermarking Technique
Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications
More informationIntroducing Audio Signal Processing & Audio Coding. Dr Michael Mason Senior Manager, CE Technology Dolby Australia Pty Ltd
Introducing Audio Signal Processing & Audio Coding Dr Michael Mason Senior Manager, CE Technology Dolby Australia Pty Ltd Overview Audio Signal Processing Applications @ Dolby Audio Signal Processing Basics
More information2.4 Audio Compression
2.4 Audio Compression 2.4.1 Pulse Code Modulation Audio signals are analog waves. The acoustic perception is determined by the frequency (pitch) and the amplitude (loudness). For storage, processing and
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationRobust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition
Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition Christy Atika Sari atika.sari@dsn.dinus.ac.id Eko Hari Rachmawanto eko.hari@dsn.dinus.ac.id De Rosal Ignatius
More informationParametric Coding of High-Quality Audio
Parametric Coding of High-Quality Audio Prof. Dr. Gerald Schuller Fraunhofer IDMT & Ilmenau Technical University Ilmenau, Germany 1 Waveform vs Parametric Waveform Filter-bank approach Mainly exploits
More informationSTEGANOGRAPHY is the technique that conceals secret. Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram
1 Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram Yanzhen Ren, Member, IEEE, Dengkai Liu, Qiaochu Xiong, Jianming Fu, and Lina Wang arxiv:191.6838v1 [cs.mm]
More informationSTEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?
Clemens H. Cap Universität Rostock clemens.cap (at) uni rostock (dot) de STEGANOGRAPHY Question Definition Can we send hidden information? Steganography is the art of transmitting information but hiding
More informationDWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method
DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method Sonal Varshney M.tech Scholar Galgotias University Abhinandan Singh M.tech Scholar Galgotias University Abstract With the rapid
More informationMUSIC A Darker Phonetic Audio Coder
MUSIC 422 - A Darker Phonetic Audio Coder Prateek Murgai and Orchisama Das Abstract In this project we develop an audio coder that tries to improve the quality of the audio at 128kbps per channel by employing
More informationCOMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES
COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,
More informationChapter 14 MPEG Audio Compression
Chapter 14 MPEG Audio Compression 14.1 Psychoacoustics 14.2 MPEG Audio 14.3 Other Commercial Audio Codecs 14.4 The Future: MPEG-7 and MPEG-21 14.5 Further Exploration 1 Li & Drew c Prentice Hall 2003 14.1
More informationModule 9 AUDIO CODING. Version 2 ECE IIT, Kharagpur
Module 9 AUDIO CODING Lesson 29 Transform and Filter banks Instructional Objectives At the end of this lesson, the students should be able to: 1. Define the three layers of MPEG-1 audio coding. 2. Define
More informationA Robust Image Zero-Watermarking Algorithm Based on DWT and PCA
A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn
More informationROW.mp3. Colin Raffel, Jieun Oh, Isaac Wang Music 422 Final Project 3/12/2010
ROW.mp3 Colin Raffel, Jieun Oh, Isaac Wang Music 422 Final Project 3/12/2010 Motivation The realities of mp3 widespread use low quality vs. bit rate when compared to modern codecs Vision for row-mp3 backwards
More informationAudio issues in MIR evaluation
Audio issues in MIR evaluation Overview of audio formats Preferred presentation of audio files in an MIR testbed A set of simple recommendations Audio Formats I 1. Apple AIFF (Audio Interchange File Format)
More informationCS 074 The Digital World. Digital Audio
CS 074 The Digital World Digital Audio 1 Digital Audio Waves Hearing Analog Recording of Waves Pulse Code Modulation and Digital Recording CDs, Wave Files, MP3s Editing Wave Files with BinEd 2 Waves A
More informationA Robust Technique For Digital Watermarking using 3-DWT- SVD and Pattern Recognition Neural Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. II (May.-June. 2017), PP 23-29 www.iosrjournals.org A Robust Technique For Digital Watermarking
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationMPEG-4 aacplus - Audio coding for today s digital media world
MPEG-4 aacplus - Audio coding for today s digital media world Whitepaper by: Gerald Moser, Coding Technologies November 2005-1 - 1. Introduction Delivering high quality digital broadcast content to consumers
More informationELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking
ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking 1 Introduction This lab focuses on the storage and protection of digital media. First, we ll take a look at ways to
More informationAUDIOVISUAL COMMUNICATION
AUDIOVISUAL COMMUNICATION Laboratory Session: Audio Processing and Coding The objective of this lab session is to get the students familiar with audio processing and coding, notably psychoacoustic analysis
More informationHiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT
More informationInterlude: Solving systems of Equations
Interlude: Solving systems of Equations Solving Ax = b What happens to x under Ax? The singular value decomposition Rotation matrices Singular matrices Condition number Null space Solving Ax = 0 under
More informationIntroducing Audio Signal Processing & Audio Coding. Dr Michael Mason Snr Staff Eng., Team Lead (Applied Research) Dolby Australia Pty Ltd
Introducing Audio Signal Processing & Audio Coding Dr Michael Mason Snr Staff Eng., Team Lead (Applied Research) Dolby Australia Pty Ltd Introducing Audio Signal Processing & Audio Coding 2013 Dolby Laboratories,
More informationFundamentals of Perceptual Audio Encoding. Craig Lewiston HST.723 Lab II 3/23/06
Fundamentals of Perceptual Audio Encoding Craig Lewiston HST.723 Lab II 3/23/06 Goals of Lab Introduction to fundamental principles of digital audio & perceptual audio encoding Learn the basics of psychoacoustic
More informationIEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH
IEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH 2005 69 Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission Shaoquan Wu, Jiwu Huang, Senior Member, IEEE, Daren
More informationMPEG-1. Overview of MPEG-1 1 Standard. Introduction to perceptual and entropy codings
MPEG-1 Overview of MPEG-1 1 Standard Introduction to perceptual and entropy codings Contents History Psychoacoustics and perceptual coding Entropy coding MPEG-1 Layer I/II Layer III (MP3) Comparison and
More informationCODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala
CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala Tampere University of Technology Korkeakoulunkatu 1, 720 Tampere, Finland ABSTRACT In
More informationImage Steganography Method Using Integer Wavelet Transform
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationA Watermarking Algorithm Based on HT- DWT-TGF for Security Applications
ISSN: 78 33 Volume, Issue, December 03 A Watermaring Algorithm Based on HT- DWT-TGF for Security Applications C. SUBBA RAO M.E., (PhD) B.V.LAKSHMI (Mtech),ECE Associate Professor, ECE PVP Siddhartha Engineering
More informationComplex Encryption Methodology Based On Two Level Encryption Technique
Complex Encryption Methodology Based On Two Level Encryption Technique Samir Kumar Bandyopadhyay University of Calcutta India skb1@vsnl.com ABSTRACT: In this paper a complex encryption methodology has
More information15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION
15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:
More informationA blind Wavelet-Based Digital Watermarking for Video
International Journal of Video & Image Processing and Network Security IJVIPNS Vol: 9 No: 9-471 - A blind Wavelet-Based Digital Watermarking for Video A.Essaouabi and F.Regragui Department of physics,
More informationPerceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects.
Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general
More informationAUDIOVISUAL COMMUNICATION
AUDIOVISUAL COMMUNICATION Laboratory Session: Audio Processing and Coding The objective of this lab session is to get the students familiar with audio processing and coding, notably psychoacoustic analysis
More informationHiding Data in Wave Files
Hiding Data in Wave Files Pushpa Aigal Department of Computer Science, Shivaji University, Kolhapur, Maharashtra 416004. Pramod Vasambekar Department of Computer Science, Shivaji University, Kolhapur,
More information