ebook img

Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach PDF

104 Pages·2021·4.288 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach

SPRINGER BRIEFS IN ELECTRICAL AND COMPUTER ENGINEERING  SPEECH TECHNOLOGY Krunal N. Patel Robust and Secured Digital Audio Watermarking Using a DWT-SVD- DSSS Hybrid Approach 123 SpringerBriefs in Speech Technology Studies in Speech Signal Processing, Natural Language Understanding, and Machine Learning SeriesEditor AmyNeustein,FortLee,NJ,USA SpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 125 pages, the series covers a range of content from professional to academic. Typicaltopicsmightinclude: (cid:129) Atimelyreportofstate-of-the-artanalyticaltechniques (cid:129) A bridge between new research results, as published in journal articles, and a contextualliteraturereview (cid:129) Asnapshotofahotoremergingtopic (cid:129) Anin-depthcasestudyorclinicalexample (cid:129) A presentation of core concepts that students must understand in order to make independentcontributions Briefs are characterized by fast, global electronic dissemination, standard pub- lishing contracts, standardized manuscript preparation and formatting guidelines, andexpeditedproductionschedules. The goal of theSpringerBriefs in Speech Technology series is to serve as an importantreferenceguideforspeechdevelopers,systemdesigners,speechengineers andotherprofessionalsinacademia,governmentandtheprivatesector.Toaccom- plish this task, the series will showcase the latest findings in speech technology, ranging from a comparative analysis of contemporary methods of speech parame- terizationtorecentadvancesincommercialdeploymentofspokendialogsystems. **Indexing:booksinthisseriesareindexedinScopus** Moreinformationaboutthisseriesathttp://www.springer.com/series/10043 Krunal N. Patel Robust and Secured Digital Audio Watermarking Using a DWT-SVD-DSSS Hybrid Approach KrunalN.Patel G.HPatelCollegeofEngineering andTechnology,CVMUniversity Bakrol,India ISSN2191-737X ISSN2191-7388 (electronic) SpringerBriefsinSpeechTechnology ISBN978-3-030-53910-8 ISBN978-3-030-53911-5 (eBook) https://doi.org/10.1007/978-3-030-53911-5 ©TheAuthor(s),underexclusivelicensetoSpringerNatureSwitzerlandAG2021 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe materialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors, and the editorsare safeto assume that the adviceand informationin this bookarebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface Today,theuseofdigitaldatalikeimage,audio,andvideoistremendouslyincreas- ing due to the advancement in technology and the Internet revolution. With these advancements, attaining one’s ownership and copyrights for this digital data is the biggest challenge. Digital watermarking is one of the technique to attain one’s ownership and copyrights securely. It is the technique in which the owner’s copy- rightinformationcanbeembeddedintotheoriginalmediaintheformofanimage, audio,text,orvideo.Therearetwomainfactorsweneedtoobservefordigitalaudio watermarkingtomaintaintherobustnessaswell asimperceptibility againstpiracy, malicious attacks, and various transformation operations. Though there are many challenges to achieve these results, there are two approaches presented for audio watermarking that are used to improve the robustness, and imperceptibility of the embeddedinformationwithsecurity.Toprovidethesecurity,DSSSEncryptionand Decryption algorithm is used which is based on synchronized secret key concept alongwithDWT,DFTandSVDtransformationmethods.DWT(DiscreetWavelet Transformation)isuseduptothefourthleveltogetthelowestfrequencysub-band andafterthatDFTisappliedtogetthelowestfrequencyfromthesub-bandfoundby DWTinwhichthemodificationsaredone,andthenSVD(SingularValueDecom- position)isappliedtoit,sothattheoriginalaudiofiledoesnothaveanyimpactof thewatermarkbitstogetthebetterrobustnessandimperceptibility. Bakrol,India KrunalN.Patel v Acknowledgments Firstandforemost,praisesandthankstotheGod,theAlmighty,forHisshowersof blessingsthroughoutmyresearchworktocompletetheresearchsuccessfully. IforwardmysincerethankstoProf.SaurabhA.ShahandProf.DiptiB.Shah fortheirvaluablehelpduringtheworkofthisbook.Theirsuggestionswerealways therewheneverIneededthem.Asaresearchsupervisor,theysparedtheirvaluable time for the in-depth discussion on this research work. Also, I would forward my hearty thanks to the Department of Computer Science and Engineering and the department head Dr. Chirag D. Patel for providing us the computer laboratory accessduringourneeds. Iamextremelygratefultomyparentsfortheirlove,prayers,caring,andsacrifices foreducatingandpreparingmeformyfuture.Also,Iexpressmythankstomysister andbrotherfortheirsupportandvaluableprayers. Hearty thanks to department administrators of C U SHAH University, for theirkindcooperationandprovidinguswithnecessarysoftwarewheneverweasked forit. Finally, I would like to thank all the people who were helpful to me, whether directlyorindirectlyforthecompletionofthisresearchwork. PatelKrunalkumarN. vii Contents 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Motivation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 TheContentoftheBook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2 PathtoDigitalWatermarking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1 IntroductiontoDigitalWatermarking. . . . . . . . . . . . . . . . . . . . . . . 7 2.2 WhyDigitalWatermarkingIsRequired?. . . . . . . . . . . . . . . . . . . . 7 2.3 FundamentalWorkingPrincipleofDigital WatermarkingProcess. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.4 TypesofDigitalWatermarking. . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.4.1 AccordingtoMediaType. . . . . . . . . . . . . . . . . . . . . . . . . 9 2.4.2 AccordingtoWorkingDomain. . . . . . . . . . . . . . . . . . . . . 10 2.5 DigitalAudioWatermarking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.6 ApplicationsofDigitalWatermarking. . . . . . . . . . . . . . . . . . . . . . 12 2.6.1 CopyrightProtection. . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.6.2 Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.6.3 Tamper-Proofing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.6.4 BroadcastMonitoring. . . . .. . . . . . . . . . . . . . .. . . . . . . . 13 2.6.5 Fingerprinting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.6.6 MediaForensics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.6.7 MedicalApplication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.6.8 PictureAuthentication. . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.6.9 AirlineTrafficMonitoring. . . . . . . . . . . . . . . . . . . . . . . . 14 2.6.10 CommunicationofOwnership. . . . . . . . . . . . . . . . . . . . . 14 2.7 PropertiesofEfficientDigitalWatermarking. . .. . . .. . . .. . . . .. . 14 2.7.1 Robustness. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.7.2 Perceptibility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.7.3 Reliability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.7.4 Security. . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . .. . . 16 ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.