CFP last date
22 April 2024
Reseach Article

Sound Watermarking Utilizing Spread Spectrum

by Komal Goswami, Nitika Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 7
Year of Publication: 2015
Authors: Komal Goswami, Nitika Sharma
10.5120/ijca2015906856

Komal Goswami, Nitika Sharma . Sound Watermarking Utilizing Spread Spectrum. International Journal of Computer Applications. 129, 7 ( November 2015), 17-21. DOI=10.5120/ijca2015906856

@article{ 10.5120/ijca2015906856,
author = { Komal Goswami, Nitika Sharma },
title = { Sound Watermarking Utilizing Spread Spectrum },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 7 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number7/23085-2015906856/ },
doi = { 10.5120/ijca2015906856 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:47.685711+05:30
%A Komal Goswami
%A Nitika Sharma
%T Sound Watermarking Utilizing Spread Spectrum
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 7
%P 17-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the new headway in the PC and telecom to store, delivered and disperse media, records over the globe turn out to be simple. However the possession and copyright of these are generally not ensured. Computerized watermarking plans have been considered as a mean of ensuring these documents. The calculations for watermarking propose so far work just for computerized picture and video. Exploration work in light of spread range procedure for watermark implanting. The calculation needn't bother with the first sound transporter signal for removing watermark; the first flag is utilized just for correlation with the installed sound. The Results show that the watermark installing calculation is capable of being heard as well as more strong against the assaults like separating and pressure. Examinations have demonstrated that the unintelligibility and vigor execution objectives can be accomplished.

References
  1. Can, Yekta Said, et al . "A Novel Spread Spectrum Digital Audio Watermarking." (2014).
  2. lal Verma, Mr Munna, and Miss Lakhwinder Kaur. "An Efficient Audio Watermark Embedding & Extraction DWT Method with Noise Removing Technique." (2013).
  3. Kirovski, Darko, and Henrique S. Malvar. "Spread-spectrum watermarking of audio signals." Signal Processing, IEEE Transactions on 51, no. 4 (2003): 1020-1033
  4. Guo, Yuhong, Qingsheng Yuan, Xuemin Zhao, Jian Liu, and Yonghong Yan. "Mixing-attack-proof Randomized Embedding Audio Watermarking System." Journal of Computers 8, no. 12 (2013).
  5. Ghobadi, Alireza, A. Boroujerdizadeh, A. H. Yaribakht, and Roozbeh Karimi. "Blind audio watermarking for tamper detection based on LSB." In Advanced Communication Technology (ICACT), 2013 15th International Conference on, pp. 1077-1082. IEEE, 2013
Index Terms

Computer Science
Information Sciences

Keywords

Digital Signal Processing Watermarking Process Audio Watermark