Digital Watermarking in Audio Using Least Significant Bit and Discrete Cosine Transform

Similar documents
A Study of Digital Audio Watermarking for copyright using DCT and LSB Technique

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Digital Watermarking Using 2-DCT

A New Approach to Compressed Image Steganography Using Wavelet Transform

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Robust Image Watermarking based on DCT-DWT- SVD Method

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Digital Color Image Watermarking In RGB Planes Using DWT-DCT-SVD Coefficients

Digital Image Watermarking: An Overview

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Invisible Watermarking Audio Digital with Discrete Cosine Transform

Invisible Watermarking Using Eludician Distance and DWT Technique

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

A Digital Video Watermarking Algorithm Based on LSB and DCT

Implementation of Audio Watermarking Using Wavelet Families

Implementation of Audio Watermarking Using Wavelet Families

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Keywords PSNR, NCC, DCT, DWT, HAAR

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

Audio Watermarking using DWT-SVD-BFO

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Efficient Image Steganography Using Integer Wavelet Transform

A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Improved Qualitative Color Image Steganography Based on DWT

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

Region Based Even Odd Watermarking Method With Fuzzy Wavelet

International Journal of Advance Research in Computer Science and Management Studies

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

An Improved Performance of Watermarking In DWT Domain Using SVD

DWT-SVD based Multiple Watermarking Techniques

Digital Watermarking with Copyright Authentication for Image Communication

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Image Processing and Watermark

Invisible Video Watermarking For Secure Transmission Using DWT and PCA

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Robust Watermarking Method for Color Images Using DCT Coefficients of Watermark

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A DWT Based Steganography Approach

Audio Watermarking using Empirical Mode Decomposition

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Digital Image Watermarking Using DWT Based DCT Technique

Robust DWT Based Technique for Digital Watermarking

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Audio Watermarking using Colour Image Based on EMD and DCT

A New DCT based Color Video Watermarking using Luminance Component

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

DIGITAL WATERMARKING OF VIDEO USING DCT AND EXTRACTION FROM ATTACKED FRAMES

Speech Modulation for Image Watermarking

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A New DCT Based Watermarking Method Using Luminance Component

Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption

Reversible Non-Blind Video Watermarking Based on Interlacing using 3-level DWT & Alpha Blending Technique

Implementation of DCT DWT SVD based watermarking algorithms for copyright protection

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

An Improved DWT-SVD based Digital Watermarking Algorithm for Images Pracheta Bansal 1, R.P.Mahapatra 2 and Divya Gupta 3

A High Payload Audio Watermarking Algorithm Robust against Mp3 Compression

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

A Robust Image Watermarking Scheme using Image Moment Normalization

Image Steganography Method Using Integer Wavelet Transform

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

IMAGE FUSION PARAMETER ESTIMATION AND COMPARISON BETWEEN SVD AND DWT TECHNIQUE

Implementation and Comparison of Watermarking Algorithms using DWT

Efficient & Secure Data Hiding Using Secret Reference Matrix

An Invisible, Robust and Secure DWT-SVD Based Digital Image Watermarking Technique with Improved Noise Immunity

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

A Reversible Data Hiding Scheme for BTC- Compressed Images

Mrs. Vandana Assistant Professor (Dept. of Computer Science and Engg.) Hindu College of Engineering, Sonepat, Haryana, India

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2

Image Enhancement in Digital Image Watermarking Using Hybrid Image Transformation Techniques

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Metamorphosis of High Capacity Steganography Schemes

Transcription:

Digital Watermarking in Audio Using Least Significant Bit and Discrete Cosine Transform Priyanka Pattanshetti 1, Prof.Shabda Dongaonkar 2, Prof. Sharmila Karpe 3 ME student,dept of Computer Engg, G.H.Raisoni College of Engineering, University of Pune,Pune, Maharashtra Abstract-In recent era it has grown to be important to protect the digital media content like audio using technique Discrete Cosine Transform (DCT) and Least Significant Bit (LSB). In our proposed system image and audio are embedded into audio file and while extraction we get the embedded, video or image. It has been observed that the digital media are hacked and its copyright is being misused to their own, even if it is the work of others. To protect from this malicious use we are proposing the digital audio watermarking d content. The technique used is Discrete Cosine Transform which divides the image and audio file into parts and applies the protection and Least Significant Bit divides the bits into binary and applies the protection. This system gives the double protection to the media content and it cannot be hacked. Keywords- Audio signals, audio watermarking, DCT, LSB, copyright. I. INTRODUCTION The recent development of digital media has increased. The nasty users can copy and store the digital media like audio, video, image without any loss of conformity. This has to be protected from the malicious use. The people using the internet download the audio files from various websites and they modify the work as their own copyright. This has become an large issue today in the internet world. The protection is being vanished and the immoral use is done. To protect this Digital Audio Watermarking is used. This technique protects from nasty users and provides copyright, robustness, security to digital contents. The audio watermarking is technique of embedding and extraction procedures. In embedding process the content like audio, video or image is embedded into a original file which is to be secured. The extraction procedure allows us to extract the content but the file is being still protected. There are about some properties that satisfy the need for effective watermarking applications.these are Inaudible- The digital watermark is embedded into audio data as it should not be audible to human ear. Security- A system is believed to be protected if the cracker cannot take away the watermark applied without having the knowledge of embedded algorithm, detector and composition of watermark. Only the authorized users can access it. Verifiability- It can be used to check the object is protected i.e. copyright-protected and identify the authenticity and control of illegal copying Robustness- It is the capability to deal with the copyright information of digital works, the embedded watermark can refuse to accept the common editing process, processing the image and lossy compression. Also after attacks the watermark cannot be damaged and can be still detected to offer certification. For example filtering, noise, compression, cropping, A/D-D/A conversions, geometrical or non-geometrical attacks etc. Fragile- Fragile watermarking is used for mainly integrity protection which is very sensitive to the changes of the signal. We can determine tampered data in accordance with the state of fragile watermarking. Semi fragile- It is proficient in managing changes made to watermarked image such as addition of lossy compression (i.e. noise). Constant Bit-rate- The amount of watermark data may be securely embedded within the host signal per unit space or time. For solving the data security the watermarking techniques are introduced to provide security of information. In recent years the watermarking techniques have been introduced to focus on images and video clips but audio watermarking is more complicated that video and image watermarking. [4] Here are two key reasons so as audio watermarking has become complicated. First, the Human Auditory System (HAS) has larger sensitivity than the Human Visual System (HVS) since human ear is capable of detecting the amplitude and frequency changes of the signal. Second, the duration and size of the audio signal are very shorter than a video clips and image files and this information reduces the audio signal quality. Discrete Cosine Transform The discrete cosine transform (DCT) is well known technique for audio and image watermarking. The DCT breaks the image into spectral sub bands (small parts) considering the image and audio quality. The DCT is similar to Discrete Fourier Transform because it transforms the spatial domain to frequency domain. (fig 1) www.ijcsit.com 3688

Fig 1. DCT Least Significant Bit Least Significant Bit embedding is simple strategy of watermarking. It embeds the data into the cover message so that it cannot be detected by visual eyes. This method works by replacing bits with secret message. It is possible by changing some bits with secret message. It is embeds data into image on any bit-plane. This reduces the variations in colors that embedding creates. For example embedding into the first bit plane change the value by 1. Similarly for second bit plane it changes the value by 2. This process is followed for all the bits. II. LITERATURE SURVEY Tejash Lad,Kaushal Doshi,[1] Audio watermarking is used to hide copyright information without affecting the original quality of audio signal. Embedding and Extraction in DCT domain. M. O Agbaje, A.T Akinwale and A.N Njah,[2] in this paper the view of work done on various digital audio watermarking using discrete wavelet transform (DWT) and discrete cosine transform (DCT) with chaotic watermarking towards carrying out investigation for real life application. Prabhishek Singh, R S Chadha, [3] has described the detail study watermarking definition, concept and contributions into this field such as categories of watermarking process that is of which method of watermarking be used. M. L. Mat Kiah, B. B. Zaidan, A. A. Zaidan, A. Mohammed Ahmed and Sameer Hasan A- Bakri, [4] has proposed a background for audio watermarking using various methods like low- bit encoding, phase coding, spread spectrum technique etc. Cheng-Yaw Low, Andrew Beng-Jin Teoh, Connie Tee [5] has proposed LSB-DWT scheme from the perspective of watermark imperceptibility and robustness. He validated the performance of LSB-DWT scheme against JPG compression, low pass filtering, median filtering, noise addition, scaling, rotation and cropping based on visual inspection, PSNR and watermark distortion rate. From experiment, LSB-DWT scheme shows remarkable immunity against the deliberate attempts to deteriorate the signature code. Bhuvnesh Kumar Singh[6] has proposed audio watermarking has the capability to deal with the copyright of watermark depends on the method used for audio. Pooja Dabas, Kavita Khanna[7], has analyzed that the digital watermarking techniques having the powers and limitations. According to the result table the LSB technique has less security. Although the embedding and extraction takes less time to execute. Abdullah Bamatraf, Rosziati Ibrahim [8] this paper proposed a digital watermarking scheme is LSB based, with the fourth and third LSB in the grayscale image. Once embedded secret data into 3 rd and 4 th LSB in the image in determine coordinates, we get the watermarked image. Therefore, this digital watermarking algorithm can be used to hide data inside image. Kamini Pawar, S. K. Parchandekar [9] This paper proposes Zero Watermarking scheme solves these problems successfully. Compared with the traditional audio watermarking algorithms, the proposed scheme introduces no audio quality degradation and can solve the challenge between robustness and imperceptibility perfectly. The multiresolution characteristic of DWT, the energy compression characteristic of DCT and the steady sign of certain DWT- DCT coefficients with absolute value are combined to extract important features which are used to generate the secret key and used for watermark recovery. Yatish Y. Jani, Yagnesh J. Parmar[10] In this technique in the audio file the bits used as watermark are inserted. First inserted into all frames in such a way that it should not affect the original audio file. This easy and more robust can handle more amount of data can be used as watermark. III. IMPLEMENTATION DETAILS A. Embedding Procedure This process is to insert the image into audio file using proposed techniques i.e. LSB and DCT. The LSB converts the image into binary bits and DCT divides the image and audio file into equal parts and applies the security key using AES. Inputs for the embedding procedure are image and audio file. Select the image which you want to insert as a watermark in audio file. 1. Select the image (".bmp", ".jpg", ".gif",.tif") file to embed. 2. Select the audio (".mp3", ".wav") file in which to be embedded. 3. Divide the image into binary bits and apply LSB. 4. Divide the image and audio file to equal parts. 5. Image is divided into 2D DCT form because it has height and width. 6. Audio is divided into 1D DCT form because it is in waves form. 7. Apply DCT on each divided frame on image and audio. 8. Apply 1D DCT on audio and 2D DCT on 2D DCT. 9. Embedding is done successfully for audio file. www.ijcsit.com 3689

Fig 2. Embedding procedure Fig 3. Extraction Procedure www.ijcsit.com 3690

B. Extraction Procedure This process is to extract the image from the audio file using proposed techniques i.e. LSB and DCT. Input provided is the original image and the embedded file i.e. audio + image with secret key provided. 1. Select the original audio file to extract. 2. Select the embedded file audio + image. 3. Divide the embedded file to equal parts. 4. Apply DCT on both file image and embedded file. 5. Subtract the original audio file from embedded file. 6. Extract using secret key. 7. We get the watermarked image. 8. Apply inverse DCT. 9. We get the extracted image file from audio. IV. MATHEMATICAL MODEL The DCT basic operation is as follows: The image inputed is of N by M pixels ; F (I, J ) is the intensity pixel of row I and column J F(u,v) is the coefficient DCT in row UI and column VJ of the DCT matrix. For image (and video), the DCT input is usually an 8 * 8 (or 16 * 16) array of integers. The image array contains the each window s of image respective to color band pixel levels. The popular domain for audio processing is that of the DCT - Discrete Cosine Transform technique or we can say it as DCT technique. In DCT watermark the data bits are extended over the host signal so that the robust is increased on the embedded signal. This technique we are using in our proposed work. In this technique we say even components are present so using DCT embedding gives better result against various attacks. The technique expressions are described as follows In our proposed work we give an effectual audio watermarking technique that gives the higher level of security and increases robustness and imperceptibility of the watermark. Proposed work is divided into two parts one is embedding procedure and extraction procedure. V. RESULTS The proposed system is developed in Java AWT Swing programming. The result is being depicted below. The figures contain original image, original audio, result displayed using (Mean Square Error) MSE, Signal to Noise Ratio (SNR), Peak Signal Noise Ratio (PSNR). These are the inputs provided to the embedding procedure. Fig 4. Original Image For a 1-D discrete signal with the length of N, Discrete cosine transform is described as Where m=0, 1, 2,...N-1 (1) Reverse DCT function for 1-D signal is described as follows In both the equations above m=0, 1,2,...N-1 Whereas (2) Fig 5. Original Audio www.ijcsit.com 3691

The result after inserting image into audio is VI. CONCLUSION In the proposed method the digital audio watermarking is given high security using the LSB and DCT technique which protects form the attacks of the unauthorized users. We have used two procedures for watermarking one is embedded watermarking and extraction watermarking. The Results obtained are compared with previous system. Future work will focus to find the possibility of organizing still more security and improving the results. REFERENCES [1] A DCT Based Watermarking Method For Copyright Protection, International Journal for Technological Research in Engineering Volume 1, Issue 8 April 2014. ISSN (On-Line) 2347-4718 by Miss Nidhi Gupta, Dr. S.A.Ladhake. [2] A New Adaptive Digital Audio Based on Support Vector Regression,IEEE Transactions on AUDIO, SPEECH, AND LANGUAGE PROCESSING,VOL. 15, NO. 8, NOVEMBER 2007. 558-7916/25.00 2007IEEE by Xian yang Wang, Wei Qi, and Panpan Niu. [3] A New Audio Watermarking Method Based on Discrete Cosine Transform with A Gray Image, International Journal of Computer Science & Information Technology (IJCSIT) Vol 4, No 4, August 2012, DOI : 10.5121/ijcsit.2012.4411 by Md. Iqbal Hasan Sarker2, Md.Hasan Furhad, Mohammad Ibrahim Khan and Kaushik Deb3 [4] A Novel Spread Spectrum Digital Audio Watermarking Technique, Journal of Advances in Computer Networks, Vol. 2, No. 1, March 2014, DOI: 10.7763/JACN.2014.V2.71, by Fatih Alagoz, Melih Evren Burus and Yekta Said Can, [5] A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT, IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 12, DECEMBER 2006, 1053-587X/20.00 2006 IEEE, by Xiang-Yang Wang and Hong Zhao. [6] A Robust Audio Watermarking Algorithm Based on SVD-DWT, ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. 20, NO. 1, 2014, http://dx.doi.org/10.5755/j01.eee.20.1.3948 by Huan Zhao, Fei Wang, Zuo Chen, Jun Liu [7] A Secured Algorithm Based On ECC and DWT with Watermarking, (An ISO 3297: 2007 Certified Organization) Vol. 2, Issue 5, May 2014, SSN(Online): 2320-9801,International Journal of Innovative Research in Computer and Communication Engineering by Sandeep Kumar U,.Manjula,Dr.K.B.Shivakumar, Dr.M.Z.Kurian. [8] A Study of Audio WatermarkingTechnique in DCT Domain, 2014 International Journal of Engineering Development and Research Volume 2, Issue 1 ISSN: 2321-9939, by Tejash Lad,Kaushal Doshi [9] A Survey on Audio Steganography Techniques for Digital Data Security, International Journal of Advanced Research in Computer Science and Software Engineering,Volume 4, Issue 4, April 2014 ISSN: 2277 128X by Ashima Wadhwa [10] Audio Steganography by LSB Method and Enhanced Security with AES, International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014), Vol. 2, Issue 2, Ver. 2 (April June 2014), ISSN : 2347-8446 (Online), by Gaurav Saini, Parulpreet Singh [11] Digital Audio Watermarking techniques with Musical Audio Feature Classification International Journal of Current Engineering and Technology, Vol.4, No.5 (Oct 2014) EISSN 2277 4106, P-ISSN 2347 5161 2014 INPRESSCO, by Faizur Rahman and Nitin N. Mandaogade. [12] Digital Watermarking: Comparing Two Techniques, International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014) Vol. 2, Issue 2, Ver. 2 (April - June 2014) ISSN : 2347 8446 (Online) by Jyoti Rani, Anupam. [13] Digital Watermarking of an Audio Signal Using an Image, ): 166-172, 2014, ISSN 1818-4952 IDOSI Publications, World Applied Sciences Journal 29 (Data Mining and Soft Computing Techniques [14] Image and Audio Embedding Technique in Image Steganography Using Neural Networks, International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 8, August 2014 by Dr.N.K Srinath, Sangeetha K N, Usha B.A, Sonia Maria Dsouza. [15] Imperceptible and Robust DWT-SVDBased Digital Audio Watermarking Algorithm, Journal of Software Engineering and Applications, 2014, 7, 859-871 Published Online September 2014 in SciRes. By Khalid A. Darabkh [16] Implementation of Audio Watermarking Using Wavelet Families, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 4, June 2014,by Mr. Kamlesh.C.Badhe, Prof.Jagruti.R.Panchal. www.ijcsit.com 3692