Different Types of Attacks and Performance Evaluation Factors in Digital Audio Watermarking
-
Published:2019-04-18
Issue:
Volume:
Page:754-762
-
ISSN:2394-4099
-
Container-title:International Journal of Scientific Research in Science, Engineering and Technology
-
language:en
-
Short-container-title:IJSRSET
Affiliation:
1. Department of Computer Science and Engineering, Madhuben & Bhanubhai Patel Women ICT College, New Vallabh Vidhyanagar, Gujarat, India
Abstract
The 21st century is the digital world, the utilization of digital information like multimedia that contains image, audio and video is massively expanding because of the progression in innovation and web transformation. With this headway to achieve the one's proprietorship and copyrights for this advanced information is the greatest test. Digital watermarking is one of the procedures to accomplish one's proprietorship and copyrights with safely and securely. Digital watermarking is the strategy in which the proprietor's copyright data can be installed into the original media either as an image, audio or video. There are two fundamental components we have to consider for this digital audio watermarking to get the high robustness and also imperceptibility against the piracy, malevolent assaults, and different kind of transformation attacks. Despite the fact that there are numerous difficulties to accomplish these outcomes, in this paper, our proposed audio watermarking system is utilized to enhance the robustness, reliability and imperceptibility of the embedded data with security. For Security, in our proposed work we are utilizing DSSS encryption algorithm and some vital transformation techniques utilized that are DWT (Discreet Wavelet Transformation) up to 4-level to get most reduced frequency sub-band and after that DFT(Discrete Fourier Transform) is applied to get least frequency component from sub-band found by DWT in which the alterations are done and after that SVD (Singular esteem Decomposition)is used to it, so unique audio document does not have any effect of watermark bits to improve robustness and imperceptibility. This algorithm is implemented in MATLAB software that is used for numerical computation and data analysis. The GUI is presented in this paper for audio watermarking with different calculations.
Publisher
Technoscience Academy
Reference30 articles.
1. H. J. Kim, Y. H. Choi, J. W. Seok, and J. W. Hong, Audio watermarking techniques, ser. Innovative Intelligence. World Scientific Publishing Co., 2004, vol. 7 (Intelligent Watermarking Techniques), ch. 8, pp. 185–218. 2. J. C. Davis, “Protecting intellectual property in cyberspace,” IEEE Technology and Society Magazine, vol. 17, no. 2, pp. 12 – 25, Summer 1998. 3. Johnson, N. F., & Katzenbeisser, S. C., “A survey of steganographic techniques”, F. A. P. Petitcolas & S. Katzenbeisser (Eds.), Information hiding: Techniques for steganography and digital watermarking (1 ed., pp. 43-78), 2000. 4. P. Dutta, D. Bhattacharyya, and T. Kim, “Data Hiding in Audio Signal: A Review,” in International Journal of Database Theory and Application, vol. 2, no. 2, June 2009. 5. Arnold, M., “Audio watermarking: features, applications and algorithms”, IEEE International Conference Multimedia and Expo, vol. 2, pp. 1013- 1016, 2000.
|
|