CFP last date
22 April 2024
Reseach Article

Digital Audio Watermarking using Frequency Masking Technique

by Ankita Tiwari, Lalit Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 4
Year of Publication: 2015
Authors: Ankita Tiwari, Lalit Jain
10.5120/ijca2015906026

Ankita Tiwari, Lalit Jain . Digital Audio Watermarking using Frequency Masking Technique. International Journal of Computer Applications. 126, 4 ( September 2015), 1-6. DOI=10.5120/ijca2015906026

@article{ 10.5120/ijca2015906026,
author = { Ankita Tiwari, Lalit Jain },
title = { Digital Audio Watermarking using Frequency Masking Technique },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 4 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number4/22537-2015906026/ },
doi = { 10.5120/ijca2015906026 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:16:32.645763+05:30
%A Ankita Tiwari
%A Lalit Jain
%T Digital Audio Watermarking using Frequency Masking Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 4
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There is a need of an effective watermarking technique for copyright protection and authentication of intellectual Property [12]. In this work we propose a digital watermarking technique which makes use of simultaneous frequency masking to hide the watermark information into host. The algorithm is based on Psychoacoustic Auditory Model and Spread Spectrum theory [2]. It generates a watermark signal using spread spectrum theory and embeds it into the signal by measuring the masking threshold using Modified Psychoacoustic Auditory model and using dct transform. Since the watermark is shaped to lie below the masking threshold, the difference between the original and the watermarked copy is imperceptible. Recovery of the watermark is performed without the knowledge of the original signal. The software system is implemented using MATLAB and the characteristics studied.

References
  1. Saravanan Chandran , Koushik Bhattacharya “Performance Analysis of LSB, DCT and DWT for Digital watermarking Application using Steganography” 978-14799-7678-2/15/31.00 ©2015IEEE.
  2. Ms. Komal V. Goenka et-al, “Overview of Audio Watermarking Techniques”, IJETAE, Volume 2, Issue 2, February 2012.
  3. Shweta Sharma et-al, “Survey on Different Level of Audio Watermarking Techniques”, International Journal of Computer Applications (IJCA), Volume 49– No.10, July 2012.
  4. K.B.Raja, C.R.Chowdary, Venugopal K R, L.M.Patnaik, “A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images”, IEEE-0-7803-9588-3/05/$20.00.
  5. NageswaraRaoThota, Srinivasa Kumar Devireddy, “Image Compression Using Discrete Cosine Transform”, Georgian Electronic Scientific Journal: Computer Science and Telecommunications, No.3 (17), 2008.
  6. Dhananjay Yadav et-al, “Reversible Data Hiding Techniques”, International Journal of Electronics and Computer Science Engineering (IJECSE), Volume 1, Number 2, 2013.
  7. Ali Al-Haj et-al, “DWT–Based Audio Watermarking”, The International Arab Journal of Information Technology, Vol. 8, No. 3, July 2011.
  8. N.F. Johnson, S. Jajodia, and Z. Duric, Information hiding: Steganography and watermarking attacks and countermeasures, Kluwer academic Publishers, 2000. 2. M. Goresky, A. M. Klapper.
  9. Fibonacci, and Galois, “Representations of Feedback-WithCarry Shift Registers,” IEEE Transaction on Information Theory, Vol. 48, No. 11, pp. 2826-2836. 2002.
  10. C. Shoemaker, “Hidden bits: A survey of techniques for digital watermarking,” Independent study, EER 290, spring 2002.
  11. B. Dumitrescu, and A. B. Rad, “A Method for Designing the Double-Density Dual-Tree Discrete Wavelet Transform,” Proc. Int. TICSP Workshop on Local and Non-Local Approximation in Image Processing, Lausanne, Switzerland, Aug. 2008.
  12. S. Katzenbeisser, and F.A.P. Petitcolas, Information hiding techniques for steganography and digital watermarking, Artech House Publishers, 2000
  13. G. Voyatzis, and I. Pitas, “Applications of toralautomorphisms in image watermarking,” Proceedings of International Conference on Image Processing, vol. 1, pp. 237– 240, 1996.
  14. S.A. Craver, B. Liu, and M. Wu, “What can we reasonably expect from watermarks? Applications of Signal Processing to Audio and Acoustics.” IEEE Workshop on 10/21/2001 -10/24/2001, pp. 223-226, 2001. Proceedings of the IEEE, vo. 7, Issue 87, pp. 1267- 1276, 1999.
  15. J. Bloom, I. Cox, T. Kalker, J. Linnartz, M. Miller, and C. Traw. “Copy protection for DVD video,” Proceedings of the IEEE, vo. 7, Issue 87, pp. 1267- 1276, 1999
  16. F.A.P Petitcolas. “Watermarking schemes evaluation,” IEEE Signal Processing Magazine, Volume 17, Issue 5, pp.58-64, 2000.
  17. M. Steinebach, F. Petitcolas, F. Raynal, J. Dittmann, C. Fontaine, S. Seibel, et al., “Stirmark benchmark: Audio watermarking attacks,” Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 49-54, 2001, Las Vegas, Nevada.
  18. X. Wang, and H. Zhao, “A Blind Audio Watermarking Robust Against Synchronization Attacks,” CIS 2005, Part II, LNAI 3802, pp. 617-622, 2005.
  19. Voloshynovski, S., Pereira, S., Iquise, V. & Pun, T. 2001, Attack modelling: towards a secondgeneration watermarking benchmark, Signal Processing 81(6): p 1177–1214.
  20. Miller, M, Dorr, G. & Cox, I. 2002, Dirty-paper trellis codes for watermarking, In: Proc. IEEE International Conference on Image Processing, Rochester, NY, p 129– 132.
  21. Petitcolas, F.A.P. 2000, Watermarking schemes evaluation, IEEE Signal Processing Magazine [Online], Volume 17, Issue 5, pp.58-64.
Index Terms

Computer Science
Information Sciences

Keywords

Frequency Masking Watermarking Embed MATLAB.