CHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION

Size: px
Start display at page:

Download "CHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION"

Transcription

1 CHAPTER 5 AUDIO WATERMARKING SCHEME INHERENTLY ROBUST TO MP3 COMPRESSION In chapter 4, SVD based watermarking schemes are proposed which met the requirement of imperceptibility, having high payload and are robust to most common signal processing attacks. But, the problem is that when the watermarked audios are compressed at a higher compression i.e. compression at lower bit rate, the percentage retrieval of the watermark is reduced. Since the audios posted on the networked environment i.e. WWW are mostly mp3 audios compressed at different compression rate, there is a need to develop a watermarking scheme which is inherently robust to compression attack at different bit rate or which is applicable to compressed audios. Schemes presented in Section and Section are having a high payload and can be considered as a good candidate that qualifies for making a scheme which is inherently robust to compression attack by selection of the blocks that resists compression. It s always a better idea to do a preliminary analysis of the mp3 attack on the individual blocks before finally embedding the watermark for making a watermarking scheme robust to mp3 compression. Scheme presented in Section shows more robustness than Scheme presented in Section 4.3.1therefore the former scheme is selected for embedding of watermark. So, in this chapter a dual pass audio watermarking scheme using the second norm/third norm of the group of SVs inherently robust to compression attack by block selection is proposed. In the Scheme presented in Section all the blocks are selected for watermark embedding but in the proposed scheme the block selection is based on robustness of the block to mp3 attack. The chapter is organized in 4 sections. Section 5.1 gives the analysis of some of the audio watermarking schemes used for mp3 audios and the idea which lead to problem statement. Section 5.2 presents our proposed watermarking scheme which makes the watermarked audio inherently robust to compression mp3 attack followed by results of the experiments in Section 5.3. The chapter is summarized in Section

2 5.1 Analysis of Some Audio Watermarking Schemes for Mp3 Audios and Problem Statement Most of the audios posted on WWW are posted in a compressed form. The compressed audios require a lesser space as far as memory is concerned. The mp3 compression is considered as a good compression technique in which the audibility of the audio doesn t change too much. The original and the compressed audio sound almost imperceptible. So, as far as embedding of watermark on a compressed audio or a watermarked audio robust to compression is concerned, there are two options. One option is to develop an audio watermarking scheme for compressed mp3 audios and the second option is to develop an audio watermarking scheme on which mp3 compression won t have any effect. There are some schemes developed for option 1. Qiao [120] proposed two audio watermarking schemes for MPEG encoded audios. In the first scheme the header of the audio mpeg file is used to embed watermark. In the second scheme the mpeg encoded samples are used for watermark embedding. For imperceptibility requirement only few encoded samples are used for embedding. The disadvantage of the approach is the weakness in sustaining the re-quantization and noise addition attacks. D. K. Koukopoulos [121] also proposed a blind digital watermarking scheme for mp3 audio files. The audio watermarking is done on the compressed audio directly. For watermark embedding, the scale factor is manipulated. The scheme claimed to overcome the disadvantage of the schemes operated on PCM coded audios which are vulnerable to compression/recompression attacks. Rade Petrovic [122] proposed a scheme in which prior to compression using AAC, multiple copies of the audio is produced and on each copy a single watermark bit is embedded. After perceptual compression using MDCT, a multiplexer is used to perform the task of selection of compression unit according to the code. Neuber et. al. [123] did it for AAC MPEG- 2 bit stream. For getting the frequency information, Huffman coding and de-multiplexers are used. The problem with the approach is the imperceptibility which is not guaranteed because of the unavailability of precise perceptual information at the embedding side. Cheng also proposed scheme for AAC audios in which watermark is embedded directly on to the quantization indices. Further, enhanced spread spectrum based scheme is used to improve the payload and robustness. The watermarked audio 114

3 showed robustness against compression attacks but the experimentation for checking the robustness against other signal processing attacks were not conducted and reported. There are two main problems that are associated with the schemes that embed watermark directly on the mp3 encoded coefficients and the header used for mp3 codec. One is the results of robustness against most of the signal processing operations are not favorable and the second is the transformation of the codec i.e. if the format of the audio file is changed then the header information is removed altogether which is containing the watermark information. Our scheme in Section showed perfect robustness to re-sampling. Requantization, low pass filtering, extra stereo addition etc. and reasonably good robustness to other common signal processing including the mp3 compression. The robustness towards the mp3 compression using the same embedding strategy as used in Section can be further be improved by selection of the blocks from which the watermark bit is perfectly retrieved i.e. without any false positive or false negative. 5.2 Proposed Scheme In this scheme, before doing the final embedding we identify the blocks that can sustain compression at different bit rates. The process of embedding requires two passes. In the first iteration the audio is watermarked with multiple watermarks using scheme of Section and the watermarked audio is subjected to mp3 compression at different bit rate and again decompressed and converted into the wav file with the original bit rate. The multiple watermarks are retrieved from the audio and are compared with the original watermark. The block index corresponding to the audio is saved for which the retrieved bit is the same as the original watermark bit. The process is repeated for all the watermarked audio compressed at different bit rate. Finally a set of the block indexes is formed from the sets of perfectly retrieved watermark bit indexes which are common in all the sets. In the second pass this set of identified block indexes are used for watermark embedding. In this way all the blocks from which the watermark bit was retrieved perfectly are only used for watermark bit embedding in pass 2. Thus, an inherently robust nature against mp3 compression is 115

4 induced on the watermarked audio. The advantage of this approach is that the watermark is neither embedded on the compressed form nor on the header of the mp3 codec. Additionally, complex Psychoacoustic analysis is not need to be completed prior and after the watermark embedding. Next we give the elaborated algorithm for watermark embedding and watermark extraction Watermark Embedding As already mentioned two passes are required to actually embed the watermark. Pass 1 of embedding identifies the most suitable blocks for embedding. The final watermarked audio is obtained after pass 2 of embedding which uses the block identified in pass 1. The two dimensional watermark is converted into a one dimensional sequence of bits 0 and 1., ;,,, (5.1) where Len = (W)=M x N Watermark Embedding for Pass 1 For watermark embedding group of SVs are used. The second/third norm corresponding to the group of selected singular values is modified and quantized. Through the modified norm the change is scattered to the selected individual SVs. The steps involved in embedding of the multiple watermarks on to a cover audio signal are as follows: Step 1: Let X denotes the audio signal which is sampled at 44.1 khz. X { x 1,x 2,.x N } where N is no. of samples. Partition X into frames of length L. Let X i denotes i th frame. X i {x Lxi+1 x (i+1)xl-1 } 116

5 Step 2: Each X i is transformed into a square matrix A i of dimension u. A i = T(X i ) where T(.) is the transformation function Step 3: Perform SVD on the matrix thus formed. This operation produces the three orthonormal matrices S, U and V T as follows: [U i *S i * V i T ] = Š(A i ) where S. is the singular value decomposition function Step 4: Embedding one watermark bit Embed the binary watermark bits into the SVD-transformed audio signal using dither modulation as follows: W = {0, 1} Let Y i be the watermarked diagonal matrix then Y i = EmbedUsingNom(S i, W i,,p) // EmbedUsingNom(S i, W i,,p) is the function defined for Section Step 5: Perform Inverse SVD Apply inverse SVD using U and V T matrices which is unchanged and S matrix which is modified in step 5 as follows: B wi = U i *S im *V i T B wi matrix is watermarked version of B i matrix obtained in step 3. Step 6: Multiple watermark bit addition Repeat step 2- step 5 on each segment to embed multiple bits on the audio signal. For one watermark the process is repeated Len times where Len is the total number of bits within one watermark. Step 7: Multiple watermark embedding Repeat step 2- step 6 on the next Len segments to embed multiple watermarks on the audio signal. 117

6 MP3 Compression of Watermarked Audio The watermarked audio embedded with multiple watermarks is obtained after steps given in section are applied on the original audio. The watermarked audio is subjected to mp3 compression at different bit rates i.e. 128 kbps, 96 kbps, 64 kbps and 32 kbps. Let the audios obtained after decompression to the original watermarked wav files with original bit rate are WA 128, WA 96, WA 64 and WA Finding Block Indexes for Pass 2 Step 1: Obtain SVD Matrix Perform steps 1 through step 4 of the embedding procedure given in section until the S matrix is obtained for all frames of the watermarked audio signal. Step 2: Extraction of multiple watermarks. For each segment of the frame, ExtractUsingNom function is called which returns the watermark bit. // ExtractUsingNom is defined in section Step 3: Construct the watermark sequence by appending the bits retrieved from each block. Step 4: The watermark bit sequence is compared with the original watermark bit sequence and the index corresponding to the blocks from which watermark bit is retrieved successfully is stored. Step 5: Step 1 to step 4 are repeated to extract block indexes corresponding to each watermark sequence. Step 6: Store all these block indexes in a set. Let SBI bp is such a set of block indexes. 118

7 bps ={ 32, 64,96,128} //bps (bit per second) Step 7: Step 1 to step 6 are repeated to extract SBI bps for each bps using WA 128, WA 96, WA 64 and WA 32. Step 8: The final block indexes are given by SBI = {SBI 32 Ώ SBI 64 Ώ SBI 96 Ώ SBI 128 } Ώ -> used for intersection. //SBI is the set of block indexes for which the watermark bit is retrieved perfectly for the compression at different bit rates Preprocessing of Watermark For the robustness and security of the watermark, the watermark is scrambled or encrypted using Baker s chaotic map. Let the size of the image I(x, y) of the image to be embedded is M x N with M & N as the number of rows and columns respectively. Before converting the image into one dimensional binary sequence the image I (x, y) produces permuted version I`(x, y) using Baker s chaotic with security key k1. Then I`(x,y) is converted into a binary watermark using as follows, ;,,, where Len = (W)=M x N This imposes robustness for the correct estimation or removal of watermark without the use of secret key. In the best case, the extraction is that of a chaotic permuted watermark which is required to be decoded to the original watermark through the key Watermark Embedding for Pass 2 For watermark embedding group of SVs are used. The second or the third norm corresponding to 119

8 the group of selected singular values is modified and quantized. Through the modified norm the change is scattered to the selected individual SVs. The steps involved in embedding of the watermark on to a cover audio signal are as follows: Step 1: Let X denotes the audio signal which is sampled at 44.1kHz. X { x 1,x 2,.x N } where N is no. of samples. Partition X into frames of length L. Let X i denotes i th frame where i belongs to {SBI}. X i {x Lxi+1 x (i+1)xl-1 } Step 2: Each X i is transformed into a square matrix A i of dimension u. A i = T(X i ) where T(.) is the transformation function Step 3: Baker s map chaotic encryption is done on each A i to produce B i using key k of p elements B i =Ê(A i,k,p) where Ê(.) is Baker s encryption function. Step 4: Perform SVD on the matrix thus formed. This operation produces the three orthonormal matrices S, U and V T as follows: [U i *S i * V i T ] = Š(B i ) where Š is the singular value decomposition function Step 5: Embed the watermark Bit Embed the binary watermark bits into the SVD-transformed audio signal using dither modulation as follows: W = {0, 1} Let Y i be the watermarked diagonal matrix then Y i = EmbedUsingNom(S i, W i,,p) where EmbedUsingNom is the embedding function which returns the diagonal matrix after embedding and is defined in step 5 of section Step 6: Perform Inverse SVD 120

9 Apply inverse SVD using U and V T matrices which is unchanged and S matrix which is modified in step 5 as follows: B wi = U i *S im *V T i B wi matrix is watermarked version of B i matrix obtained in step 3. Step 7: The decryption is done using the same key used in step 2 A i,m =Ð(B wi,k,p) where D is Baker s decryption function. Step 8: Multiple watermark bit addition Repeat step 2- step 7 on each segment X i where i SBI //All the watermark bits are embedded on the audio signal. For one watermark the process is repeated Len times where Len is the total number of bits within one watermark Watermark Extraction Step 1: Obtain SVD Matrix Perform step 1 through step 4 of the embedding procedure given in section until the S matrix is obtained for all frames of the watermarked audio signal. The key used for making the intermediate matrix before SVD operation for every segment is the same key used for embedding in watermark embedding procedure. Step 2: Extraction of watermark bit For each segment of the frame, ExtractUsingNom function is called which returns the watermark bit. // ExtractUsingNom (Si,,p) is defined in step 2 of section Step 3: Construct the watermark sequence by appending the bits retrieved from each segment block. Step 4: Construct the 2-d image by taking M elements corresponding to each row. The 2- d image thus formed is decrypted using the same key which is used at the time of pre processing of the watermark to obtain the final watermark. 121

10 In the next section, the results of experiments conducted on the same set audios are presented. 5.3 Results Since the embedding function used to embed a watermark bit on a block in Section is the same function used for Section 5.2.1, the results obtained for imperceptibility in terms of SNR and robustness against all attacks used for evaluating are expected to be same except mp3 compression attack. Explicit results for imperceptibility in terms of SNR of the watermarked audio and robustness to attacks other than mp3 compression are not presented here. The first set of experiments is conducted to identify the blocks which can resist mp3 compression at different bit rates. The count of such blocks is compared against the total number of blocks used in Pass 1 for different categories of music. 10 copies of the watermarks carrying a total of 1000 bits each are embedded on the succeeding portions of the original audios. So, the total number of blocks used in Pass 1 is equal to 10,000. A comparison of the total number of blocks which resist mp3 compression against 10,000 is done to give an estimate of the number of blocks that can be used for making the scheme inherently robust to compression attack. Table 5.1 present results of the count of such blocks for different audios under different categories. Table 5.1: Count of blocks in SBI for different audios. Classical Country Pop Folk S S S S S S S S S S S S S S S S The results show that the count of blocks that can resist mp3 compression is highest for classical music category and it is lowest for folk music category. Further, table 5.2 presents the percentage of the average count of such blocks for different categories of music which gives the estimate of the payload of the scheme. 122

11 Table 5.2: Average Percentage count of blocks in SBI for different audios. Music Category Percentage Count Classical Country Pop Folk The result shows that the average percentage count of the SBI blocks varies from 0.52 to This average actually gives the idea of the payload of the scheme. Almost 52 Percent of the blocks are able to resist the mp3 compression at different bit rate using scheme of Section The payload of the proposed scheme depends upon the count of such identified blocks. More is the count more will be the payload of the scheme. Since the payload of CH4PS2 is 441 bps in which all the blocks are used for watermark embedding. Using our proposed scheme by embedding the watermark bit in the selected 52 Percent of the blocks, scheme CH4PS2 can be made inherently robust to mp3 compression attack with a minimum payload of 229 bps. The robustness against mp3 compression attack is highly increased by selection of the blocks and CC of the retrieved watermark is 1 in most of the cases of audio samples. The result of robustness against different attacks given in section is presented in table 5.3. Table 5.3: Robustness against different attacks Attack CC Attack CC Requantization 1 Flip Sample 1 Resampling 1 Noise addition 0.75 Echo addition 0.91 Increase volume 0.78 Low pass 0.99 Decrease Volume 0.78 high pass 0.6 mp3 compression 1 Invert 1 LSB Zero 1 Extra stereo 1 Closed loop 1 The result shows that the proposed scheme is inherently robust to compression attacks in addition to showing good robustness to all the other mentioned attacks. Also the payload of the scheme varies from 229 bps to 300 bps. 123

12 Here, we are not explicitly comparing the robustness results of our proposed scheme with other schemes as it is an improvement over the scheme proposed in Section for which comparison results are already given in the previous chapter. The compromise to scheme in Section is only in the payload which is reduced by a maximum of 42 percent. However, the observed payload is still much higher than the contemporary schemes that are evident from the following table. Table 5.4: Payload & SNR comparison for the proposed scheme Schemes SNR(dB) Payload(bps) Proposed Scheme Shahriar[118 ] Wang [114 ] Fathi [117 ] N/A From the table it can be inferred that the proposed scheme is still having a payload which is higher than proposed by Shahriar [118], Wang [114] and Fathi [117] with almost similar SNR and robust to most common signal processing operation. 5.4 Summary In this chapter, an audio watermarking scheme inherently robust to mp3 compression is proposed based on the embedding strategy used in Section The inherent robust nature against the mp3 compression attack is induced through the selection of the watermark embedding blocks which are resistant to mp3 compression. The result of robustness against other attacks also shows the effectiveness of embedding strategy and block selection. Also block selection don t has any adverse effect on the SNR of the watermarked audio. Still after selecting the blocks, the payload of our scheme varies from 229 bps to 300 bps for different content categories of music. 124

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,

More information

Audio-coding standards

Audio-coding standards Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.

More information

A High Payload Audio Watermarking Algorithm Robust against Mp3 Compression

A High Payload Audio Watermarking Algorithm Robust against Mp3 Compression A High Payload Audio Watermarking Algorithm Robust against Mp3 Compression 1 Arashdeep Kaur, 1 Malay Kishore Dutta, 1 K.M.Soni and 2 Nidhi Taneja. 1 Amity School of Engineering & Technology, Amity University,

More information

Sparse Watermark Embedding and Recovery using Compressed Sensing Framework for Audio Signals

Sparse Watermark Embedding and Recovery using Compressed Sensing Framework for Audio Signals Sparse Watermark Embedding and Recovery using Compressed Sensing Framework for Audio Signals Mohamed Waleed Fakhr Electrical and Electronics Department, University of Bahrain Isa Town, Manama, Bahrain

More information

Audio-coding standards

Audio-coding standards Audio-coding standards The goal is to provide CD-quality audio over telecommunications networks. Almost all CD audio coders are based on the so-called psychoacoustic model of the human auditory system.

More information

Compressed Audio Demystified by Hendrik Gideonse and Connor Smith. All Rights Reserved.

Compressed Audio Demystified by Hendrik Gideonse and Connor Smith. All Rights Reserved. Compressed Audio Demystified Why Music Producers Need to Care About Compressed Audio Files Download Sales Up CD Sales Down High-Definition hasn t caught on yet Consumers don t seem to care about high fidelity

More information

Mpeg 1 layer 3 (mp3) general overview

Mpeg 1 layer 3 (mp3) general overview Mpeg 1 layer 3 (mp3) general overview 1 Digital Audio! CD Audio:! 16 bit encoding! 2 Channels (Stereo)! 44.1 khz sampling rate 2 * 44.1 khz * 16 bits = 1.41 Mb/s + Overhead (synchronization, error correction,

More information

A Novel Audio Watermarking Algorithm Based On Reduced Singular Value Decomposition

A Novel Audio Watermarking Algorithm Based On Reduced Singular Value Decomposition A Novel Audio Watermarking Algorithm Based On Reduced Singular Value Decomposition Jian Wang 1, Ron Healy 2, Joe Timoney 3 Computer Science Department NUI Maynooth, Co. Kildare, Ireland jwang@cs.nuim.ie

More information

Appendix 4. Audio coding algorithms

Appendix 4. Audio coding algorithms Appendix 4. Audio coding algorithms 1 Introduction The main application of audio compression systems is to obtain compact digital representations of high-quality (CD-quality) wideband audio signals. Typically

More information

5: Music Compression. Music Coding. Mark Handley

5: Music Compression. Music Coding. Mark Handley 5: Music Compression Mark Handley Music Coding LPC-based codecs model the sound source to achieve good compression. Works well for voice. Terrible for music. What if you can t model the source? Model the

More information

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs Volume 73 No.6, July 2013 Performance Analysis of Discrete Wavelet Transform based Audio ing on Indian Classical Songs C. M. Juli Janardhanan Department of ECE Government Engineering College, Wayanad Mananthavady,

More information

Lecture 16 Perceptual Audio Coding

Lecture 16 Perceptual Audio Coding EECS 225D Audio Signal Processing in Humans and Machines Lecture 16 Perceptual Audio Coding 2012-3-14 Professor Nelson Morgan today s lecture by John Lazzaro www.icsi.berkeley.edu/eecs225d/spr12/ Hero

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Image Watermarking by SCHUR Decomposition

Image Watermarking by SCHUR Decomposition International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1155-1159 International Research Publications House http://www. irphouse.com Image Watermarking

More information

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute

More information

Optical Storage Technology. MPEG Data Compression

Optical Storage Technology. MPEG Data Compression Optical Storage Technology MPEG Data Compression MPEG-1 1 Audio Standard Moving Pictures Expert Group (MPEG) was formed in 1988 to devise compression techniques for audio and video. It first devised the

More information

Audio Watermarking using Colour Image Based on EMD and DCT

Audio Watermarking using Colour Image Based on EMD and DCT Audio Watermarking using Colour Image Based on EMD and Suhail Yoosuf 1, Ann Mary Alex 2 P. G. Scholar, Department of Electronics and Communication, Mar Baselios College of Engineering and Technology, Trivandrum,

More information

Audio Watermarking using Empirical Mode Decomposition

Audio Watermarking using Empirical Mode Decomposition Audio Watermarking using Empirical Mode Decomposition Charulata P. Talele 1, Dr A. M. Patil 2 1ME Student, Electronics and Telecommunication Department J. T. Mahajan College of Engineering, Faizpur, Maharashtra,

More information

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech

More information

ROBUST WATERMARKING USING COMPRESSED SENSING FRAMEWORK WITH APPLICATION TO MP3 AUDIO

ROBUST WATERMARKING USING COMPRESSED SENSING FRAMEWORK WITH APPLICATION TO MP3 AUDIO ROBUST WATERMARKING USING COMPRESSED SENSING FRAMEWORK WITH APPLICATION TO MP3 AUDIO Mohamed Waleed Fakhr Electrical and Electronics Engineering Department, University of Bahrain, Manama, Bahrain mfakhr@uob.edu.bh

More information

Robust Audio Watermarking Scheme with Synchronization Code and QIM

Robust Audio Watermarking Scheme with Synchronization Code and QIM Robust Audio Watermarking Scheme with Synchronization Code and QIM N.V.Lalitha #1, Ch.Srinivasa Rao *2, P.V.Y.Jaya Sree $3 # Department of ECE, GMR Institute of Technology RAJAM-532 127, A.P. INDIA. *

More information

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover 38 CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING Digital image watermarking can be done in both spatial domain and transform domain. In spatial domain the watermark bits directly added to the pixels of the

More information

Audio Watermarking Based on PCM Technique

Audio Watermarking Based on PCM Technique Audio Watermarking Based on PCM Technique Ranjeeta Yadav Department of ECE SGIT, Ghaziabad, INDIA Sachin Yadav Department of CSE SGIT, Ghaziabad, INDIA Jyotsna Singh Department of ECE NSIT, New Delhi,

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

ENEE408G Multimedia Signal Processing Design Project on Digital Audio Processing

ENEE408G Multimedia Signal Processing Design Project on Digital Audio Processing The Goals ENEE408G Multimedia Signal Processing Design Project on Digital Audio Processing 1. Learn the fundamentals of perceptual coding of audio and intellectual rights protection from multimedia. 2.

More information

ELL 788 Computational Perception & Cognition July November 2015

ELL 788 Computational Perception & Cognition July November 2015 ELL 788 Computational Perception & Cognition July November 2015 Module 11 Audio Engineering: Perceptual coding Coding and decoding Signal (analog) Encoder Code (Digital) Code (Digital) Decoder Signal (analog)

More information

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Neha Agrawal and Marios Savvides Carnegie Mellon University

More information

CHAPTER-6 WATERMARKING OF JPEG IMAGES

CHAPTER-6 WATERMARKING OF JPEG IMAGES CHAPTER-6 WATERMARKING OF JPEG IMAGES 6.1 INTRODUCTION In the Chapter 4, we have discussed that we can improve the robustness of DCT and DWT based watermarking schemes against some well known attacks by

More information

Part II Authentication Techniques

Part II Authentication Techniques Part II Authentication Techniques Authentication Codes Provides means for ensuring integrity of message Independent of secrecy - in fact sometimes secrecy may be undesirable! Techniques for Authentication

More information

Multimedia Communications. Audio coding

Multimedia Communications. Audio coding Multimedia Communications Audio coding Introduction Lossy compression schemes can be based on source model (e.g., speech compression) or user model (audio coding) Unlike speech, audio signals can be generated

More information

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION Chuhong Fei a, Raymond Kwong b, and Deepa Kundur c a A.U.G. Signals Ltd., 73 Richmond St. W, Toronto, ON M4H 4E8 Canada b University of Toronto,

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

An SVD-based Fragile Watermarking Scheme With Grouped Blocks

An SVD-based Fragile Watermarking Scheme With Grouped Blocks An SVD-based Fragile Watermarking Scheme With Grouped Qingbo Kang Chengdu Yufei Information Engineering Co.,Ltd. 610000 Chengdu, China Email: qdsclove@gmail.com Ke Li, Hu Chen National Key Laboratory of

More information

The MPEG-4 General Audio Coder

The MPEG-4 General Audio Coder The MPEG-4 General Audio Coder Bernhard Grill Fraunhofer Institute for Integrated Circuits (IIS) grl 6/98 page 1 Outline MPEG-2 Advanced Audio Coding (AAC) MPEG-4 Extensions: Perceptual Noise Substitution

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

CISC 7610 Lecture 3 Multimedia data and data formats

CISC 7610 Lecture 3 Multimedia data and data formats CISC 7610 Lecture 3 Multimedia data and data formats Topics: Perceptual limits of multimedia data JPEG encoding of images MPEG encoding of audio MPEG and H.264 encoding of video Multimedia data: Perceptual

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

VoIP Forgery Detection

VoIP Forgery Detection VoIP Forgery Detection Satish Tummala, Yanxin Liu and Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX, USA Emails: sct137@shsu.edu; yanxin@shsu.edu; liu@shsu.edu

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 5, Ver. I (Sep - Oct.2015), PP 06-13 www.iosrjournals.org Reversible Non-Blind

More information

CSCD 443/533 Advanced Networks Fall 2017

CSCD 443/533 Advanced Networks Fall 2017 CSCD 443/533 Advanced Networks Fall 2017 Lecture 18 Compression of Video and Audio 1 Topics Compression technology Motivation Human attributes make it possible Audio Compression Video Compression Performance

More information

Simple Watermark for Stereo Audio Signals with Modulated High-Frequency Band Delay

Simple Watermark for Stereo Audio Signals with Modulated High-Frequency Band Delay ACOUSTICAL LETTER Simple Watermark for Stereo Audio Signals with Modulated High-Frequency Band Delay Kazuhiro Kondo and Kiyoshi Nakagawa Graduate School of Science and Engineering, Yamagata University,

More information

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY BaSoTI 2012, Tartu Question Definition Can we send hidden information? Steganography is the art of transmitting information

More information

VS1063 ENCODER DEMONSTRATION

VS1063 ENCODER DEMONSTRATION PRELIMINARY DOCUMENT VS1063 ENCODER DEMONSTRATION VLSI Solution Audio Decoder Project Code: Project Name: All information in this document is provided as-is without warranty. Features are subject to change

More information

Robust Audio Watermarking Algorithm Based on Moving Average and DCT

Robust Audio Watermarking Algorithm Based on Moving Average and DCT Robust Audio Watermarking Algorithm Based on Moving Average and DCT Jinquan Zhang and Bin Han (College of Information security Engineering, Chengdu University of Information Technology, Chengdu, China)

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION T.Punithavalli 1, S. Indhumathi 2, V.Karthika 3, R.Nandhini 4 1 Assistant professor, P.A.College of Engineering and Technology, pollachi 2 Student,

More information

Perceptual Coding. Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding

Perceptual Coding. Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding Perceptual Coding Lossless vs. lossy compression Perceptual models Selecting info to eliminate Quantization and entropy encoding Part II wrap up 6.082 Fall 2006 Perceptual Coding, Slide 1 Lossless vs.

More information

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques 1 Himanshu Verma, Mr Tarun Rathi, 3 Mr Ashish Singh Chauhan 1 Research Scholar, Deptt of Electronics and

More information

Lossy compression CSCI 470: Web Science Keith Vertanen Copyright 2013

Lossy compression CSCI 470: Web Science Keith Vertanen Copyright 2013 Lossy compression CSCI 470: Web Science Keith Vertanen Copyright 2013 Digital audio Overview Sampling rate Quan5za5on MPEG audio layer 3 (MP3) JPEG s5ll images Color space conversion, downsampling Discrete

More information

MPEG-4 General Audio Coding

MPEG-4 General Audio Coding MPEG-4 General Audio Coding Jürgen Herre Fraunhofer Institute for Integrated Circuits (IIS) Dr. Jürgen Herre, hrr@iis.fhg.de 1 General Audio Coding Solid state players, Internet audio, terrestrial and

More information

Fig. 1: The perceptual audio coding procedure and three main embedding domains.

Fig. 1: The perceptual audio coding procedure and three main embedding domains. 1 Spec-ResNet: A General Audio Steganalysis Scheme based on a Deep Residual Network for Spectrograms Yanzhen Ren, Member, IEEE, Dengkai Liu, Qiaochu Xiong, Jianming Fu, and Lina Wang arxiv:191.6838v2 [cs.mm]

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

Lossy compression. CSCI 470: Web Science Keith Vertanen

Lossy compression. CSCI 470: Web Science Keith Vertanen Lossy compression CSCI 470: Web Science Keith Vertanen Digital audio Overview Sampling rate Quan5za5on MPEG audio layer 3 (MP3) JPEG s5ll images Color space conversion, downsampling Discrete Cosine Transform

More information

Audio Compression. Audio Compression. Absolute Threshold. CD quality audio:

Audio Compression. Audio Compression. Absolute Threshold. CD quality audio: Audio Compression Audio Compression CD quality audio: Sampling rate = 44 KHz, Quantization = 16 bits/sample Bit-rate = ~700 Kb/s (1.41 Mb/s if 2 channel stereo) Telephone-quality speech Sampling rate =

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Figure 1. Generic Encoder. Window. Spectral Analysis. Psychoacoustic Model. Quantize. Pack Data into Frames. Additional Coding.

Figure 1. Generic Encoder. Window. Spectral Analysis. Psychoacoustic Model. Quantize. Pack Data into Frames. Additional Coding. Introduction to Digital Audio Compression B. Cavagnolo and J. Bier Berkeley Design Technology, Inc. 2107 Dwight Way, Second Floor Berkeley, CA 94704 (510) 665-1600 info@bdti.com http://www.bdti.com INTRODUCTION

More information

19 th INTERNATIONAL CONGRESS ON ACOUSTICS MADRID, 2-7 SEPTEMBER 2007

19 th INTERNATIONAL CONGRESS ON ACOUSTICS MADRID, 2-7 SEPTEMBER 2007 19 th INTERNATIONAL CONGRESS ON ACOUSTICS MADRID, 2-7 SEPTEMBER 2007 SUBJECTIVE AND OBJECTIVE QUALITY EVALUATION FOR AUDIO WATERMARKING BASED ON SINUSOIDAL AMPLITUDE MODULATION PACS: 43.10.Pr, 43.60.Ek

More information

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain Chinmay Maiti a *, Bibhas Chandra Dhara b a Department of Computer Science & Engineering, College of Engineering & Management, Kolaghat,

More information

Signal Processing 91 (2011) Contents lists available at ScienceDirect. Signal Processing. journal homepage:

Signal Processing 91 (2011) Contents lists available at ScienceDirect. Signal Processing. journal homepage: Signal Processing 91 (2011) 1693 1708 Contents lists available at ScienceDirect Signal Processing journal homepage: www.elsevier.com/locate/sigpro A robust audio watermarking scheme based on reduced singular

More information

Image Authentication and Recovery Scheme Based on Watermarking Technique

Image Authentication and Recovery Scheme Based on Watermarking Technique Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications

More information

Introducing Audio Signal Processing & Audio Coding. Dr Michael Mason Senior Manager, CE Technology Dolby Australia Pty Ltd

Introducing Audio Signal Processing & Audio Coding. Dr Michael Mason Senior Manager, CE Technology Dolby Australia Pty Ltd Introducing Audio Signal Processing & Audio Coding Dr Michael Mason Senior Manager, CE Technology Dolby Australia Pty Ltd Overview Audio Signal Processing Applications @ Dolby Audio Signal Processing Basics

More information

2.4 Audio Compression

2.4 Audio Compression 2.4 Audio Compression 2.4.1 Pulse Code Modulation Audio signals are analog waves. The acoustic perception is determined by the frequency (pitch) and the amplitude (loudness). For storage, processing and

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition

Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition Christy Atika Sari atika.sari@dsn.dinus.ac.id Eko Hari Rachmawanto eko.hari@dsn.dinus.ac.id De Rosal Ignatius

More information

Parametric Coding of High-Quality Audio

Parametric Coding of High-Quality Audio Parametric Coding of High-Quality Audio Prof. Dr. Gerald Schuller Fraunhofer IDMT & Ilmenau Technical University Ilmenau, Germany 1 Waveform vs Parametric Waveform Filter-bank approach Mainly exploits

More information

STEGANOGRAPHY is the technique that conceals secret. Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram

STEGANOGRAPHY is the technique that conceals secret. Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram 1 Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram Yanzhen Ren, Member, IEEE, Dengkai Liu, Qiaochu Xiong, Jianming Fu, and Lina Wang arxiv:191.6838v1 [cs.mm]

More information

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information? Clemens H. Cap Universität Rostock clemens.cap (at) uni rostock (dot) de STEGANOGRAPHY Question Definition Can we send hidden information? Steganography is the art of transmitting information but hiding

More information

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method Sonal Varshney M.tech Scholar Galgotias University Abhinandan Singh M.tech Scholar Galgotias University Abstract With the rapid

More information

MUSIC A Darker Phonetic Audio Coder

MUSIC A Darker Phonetic Audio Coder MUSIC 422 - A Darker Phonetic Audio Coder Prateek Murgai and Orchisama Das Abstract In this project we develop an audio coder that tries to improve the quality of the audio at 128kbps per channel by employing

More information

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES H. I. Saleh 1, M. E. Elhadedy 2, M. A. Ashour 1, M. A. Aboelsaud 3 1 Radiation Engineering Dept., NCRRT, AEA, Egypt. 2 Reactor Dept., NRC,

More information

Chapter 14 MPEG Audio Compression

Chapter 14 MPEG Audio Compression Chapter 14 MPEG Audio Compression 14.1 Psychoacoustics 14.2 MPEG Audio 14.3 Other Commercial Audio Codecs 14.4 The Future: MPEG-7 and MPEG-21 14.5 Further Exploration 1 Li & Drew c Prentice Hall 2003 14.1

More information

Module 9 AUDIO CODING. Version 2 ECE IIT, Kharagpur

Module 9 AUDIO CODING. Version 2 ECE IIT, Kharagpur Module 9 AUDIO CODING Lesson 29 Transform and Filter banks Instructional Objectives At the end of this lesson, the students should be able to: 1. Define the three layers of MPEG-1 audio coding. 2. Define

More information

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA

A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA A Robust Image Zero-Watermarking Algorithm Based on DWT and PCA Xiaoxu Leng, Jun Xiao, and Ying Wang Graduate University of Chinese Academy of Sciences, 100049 Beijing, China lengxiaoxu@163.com, {xiaojun,ywang}@gucas.ac.cn

More information

ROW.mp3. Colin Raffel, Jieun Oh, Isaac Wang Music 422 Final Project 3/12/2010

ROW.mp3. Colin Raffel, Jieun Oh, Isaac Wang Music 422 Final Project 3/12/2010 ROW.mp3 Colin Raffel, Jieun Oh, Isaac Wang Music 422 Final Project 3/12/2010 Motivation The realities of mp3 widespread use low quality vs. bit rate when compared to modern codecs Vision for row-mp3 backwards

More information

Audio issues in MIR evaluation

Audio issues in MIR evaluation Audio issues in MIR evaluation Overview of audio formats Preferred presentation of audio files in an MIR testbed A set of simple recommendations Audio Formats I 1. Apple AIFF (Audio Interchange File Format)

More information

CS 074 The Digital World. Digital Audio

CS 074 The Digital World. Digital Audio CS 074 The Digital World Digital Audio 1 Digital Audio Waves Hearing Analog Recording of Waves Pulse Code Modulation and Digital Recording CDs, Wave Files, MP3s Editing Wave Files with BinEd 2 Waves A

More information

A Robust Technique For Digital Watermarking using 3-DWT- SVD and Pattern Recognition Neural Network

A Robust Technique For Digital Watermarking using 3-DWT- SVD and Pattern Recognition Neural Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. II (May.-June. 2017), PP 23-29 www.iosrjournals.org A Robust Technique For Digital Watermarking

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

MPEG-4 aacplus - Audio coding for today s digital media world

MPEG-4 aacplus - Audio coding for today s digital media world MPEG-4 aacplus - Audio coding for today s digital media world Whitepaper by: Gerald Moser, Coding Technologies November 2005-1 - 1. Introduction Delivering high quality digital broadcast content to consumers

More information

ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking

ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking 1 Introduction This lab focuses on the storage and protection of digital media. First, we ll take a look at ways to

More information

AUDIOVISUAL COMMUNICATION

AUDIOVISUAL COMMUNICATION AUDIOVISUAL COMMUNICATION Laboratory Session: Audio Processing and Coding The objective of this lab session is to get the students familiar with audio processing and coding, notably psychoacoustic analysis

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

Interlude: Solving systems of Equations

Interlude: Solving systems of Equations Interlude: Solving systems of Equations Solving Ax = b What happens to x under Ax? The singular value decomposition Rotation matrices Singular matrices Condition number Null space Solving Ax = 0 under

More information

Introducing Audio Signal Processing & Audio Coding. Dr Michael Mason Snr Staff Eng., Team Lead (Applied Research) Dolby Australia Pty Ltd

Introducing Audio Signal Processing & Audio Coding. Dr Michael Mason Snr Staff Eng., Team Lead (Applied Research) Dolby Australia Pty Ltd Introducing Audio Signal Processing & Audio Coding Dr Michael Mason Snr Staff Eng., Team Lead (Applied Research) Dolby Australia Pty Ltd Introducing Audio Signal Processing & Audio Coding 2013 Dolby Laboratories,

More information

Fundamentals of Perceptual Audio Encoding. Craig Lewiston HST.723 Lab II 3/23/06

Fundamentals of Perceptual Audio Encoding. Craig Lewiston HST.723 Lab II 3/23/06 Fundamentals of Perceptual Audio Encoding Craig Lewiston HST.723 Lab II 3/23/06 Goals of Lab Introduction to fundamental principles of digital audio & perceptual audio encoding Learn the basics of psychoacoustic

More information

IEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH

IEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH IEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH 2005 69 Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission Shaoquan Wu, Jiwu Huang, Senior Member, IEEE, Daren

More information

MPEG-1. Overview of MPEG-1 1 Standard. Introduction to perceptual and entropy codings

MPEG-1. Overview of MPEG-1 1 Standard. Introduction to perceptual and entropy codings MPEG-1 Overview of MPEG-1 1 Standard Introduction to perceptual and entropy codings Contents History Psychoacoustics and perceptual coding Entropy coding MPEG-1 Layer I/II Layer III (MP3) Comparison and

More information

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala Tampere University of Technology Korkeakoulunkatu 1, 720 Tampere, Finland ABSTRACT In

More information

Image Steganography Method Using Integer Wavelet Transform

Image Steganography Method Using Integer Wavelet Transform ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

A Watermarking Algorithm Based on HT- DWT-TGF for Security Applications

A Watermarking Algorithm Based on HT- DWT-TGF for Security Applications ISSN: 78 33 Volume, Issue, December 03 A Watermaring Algorithm Based on HT- DWT-TGF for Security Applications C. SUBBA RAO M.E., (PhD) B.V.LAKSHMI (Mtech),ECE Associate Professor, ECE PVP Siddhartha Engineering

More information

Complex Encryption Methodology Based On Two Level Encryption Technique

Complex Encryption Methodology Based On Two Level Encryption Technique Complex Encryption Methodology Based On Two Level Encryption Technique Samir Kumar Bandyopadhyay University of Calcutta India skb1@vsnl.com ABSTRACT: In this paper a complex encryption methodology has

More information

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION 15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:

More information

A blind Wavelet-Based Digital Watermarking for Video

A blind Wavelet-Based Digital Watermarking for Video International Journal of Video & Image Processing and Network Security IJVIPNS Vol: 9 No: 9-471 - A blind Wavelet-Based Digital Watermarking for Video A.Essaouabi and F.Regragui Department of physics,

More information

Perceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects.

Perceptual coding. A psychoacoustic model is used to identify those signals that are influenced by both these effects. Perceptual coding Both LPC and CELP are used primarily for telephony applications and hence the compression of a speech signal. Perceptual encoders, however, have been designed for the compression of general

More information

AUDIOVISUAL COMMUNICATION

AUDIOVISUAL COMMUNICATION AUDIOVISUAL COMMUNICATION Laboratory Session: Audio Processing and Coding The objective of this lab session is to get the students familiar with audio processing and coding, notably psychoacoustic analysis

More information

Hiding Data in Wave Files

Hiding Data in Wave Files Hiding Data in Wave Files Pushpa Aigal Department of Computer Science, Shivaji University, Kolhapur, Maharashtra 416004. Pramod Vasambekar Department of Computer Science, Shivaji University, Kolhapur,

More information