Different Types of Attacks and Performance Evaluation Factors in Digital Audio Watermarking

Authors

  • Krunalkumar N. Patel  Department of Computer Science and Engineering, Madhuben & Bhanubhai Patel Women ICT College, New Vallabh Vidhyanagar, Gujarat, India

DOI:

https://doi.org//10.32628/IJSRSET1962141

Keywords:

Digital Audio watermarking, DWT, DFT, SVD, DSSS, watermark embedding and extraction, robustness, imperceptibilty, SNR,BER.

Abstract

The 21st century is the digital world, the utilization of digital information like multimedia that contains image, audio and video is massively expanding because of the progression in innovation and web transformation. With this headway to achieve the one's proprietorship and copyrights for this advanced information is the greatest test. Digital watermarking is one of the procedures to accomplish one's proprietorship and copyrights with safely and securely. Digital watermarking is the strategy in which the proprietor's copyright data can be installed into the original media either as an image, audio or video. There are two fundamental components we have to consider for this digital audio watermarking to get the high robustness and also imperceptibility against the piracy, malevolent assaults, and different kind of transformation attacks. Despite the fact that there are numerous difficulties to accomplish these outcomes, in this paper, our proposed audio watermarking system is utilized to enhance the robustness, reliability and imperceptibility of the embedded data with security. For Security, in our proposed work we are utilizing DSSS encryption algorithm and some vital transformation techniques utilized that are DWT (Discreet Wavelet Transformation) up to 4-level to get most reduced frequency sub-band and after that DFT(Discrete Fourier Transform) is applied to get least frequency component from sub-band found by DWT in which the alterations are done and after that SVD (Singular esteem Decomposition)is used to it, so unique audio document does not have any effect of watermark bits to improve robustness and imperceptibility. This algorithm is implemented in MATLAB software that is used for numerical computation and data analysis. The GUI is presented in this paper for audio watermarking with different calculations.

References

  1. H. J. Kim, Y. H. Choi, J. W. Seok, and J. W. Hong, Audio watermarking techniques, ser. Innovative Intelligence. World Scientific Publishing Co., 2004, vol. 7 (Intelligent Watermarking Techniques), ch. 8, pp. 185–218.
  2. J. C. Davis, “Protecting intellectual property in cyberspace,” IEEE Technology and Society Magazine, vol. 17, no. 2, pp. 12 – 25, Summer 1998.
  3. Johnson, N. F., & Katzenbeisser, S. C., “A survey of steganographic techniques”, F. A. P. Petitcolas & S. Katzenbeisser (Eds.), Information hiding: Techniques for steganography and digital watermarking (1 ed., pp. 43-78), 2000.
  4. P. Dutta, D. Bhattacharyya, and T. Kim, “Data Hiding in Audio Signal: A Review,” in International Journal of Database Theory and Application, vol. 2, no. 2, June 2009.
  5. Arnold, M., “Audio watermarking: features, applications and algorithms”, IEEE International Conference Multimedia and Expo, vol. 2, pp. 1013- 1016, 2000.
  6. Natgunanathan, I., Xiang, Y., Rong, Y., Zhou, W. and Guo, S. (2012) Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking. IEEE Transactions on Audio, Speech, and Language Processing, 20, 2232-2239.
  7. Elshazly, A. R., M. M. Fouad, and M. E. Nasr. "Secure and robust high quality DWT domain audio watermarking algorithm with binary image." Computer Engineering & Systems (ICCES), 2012 Seventh International Conference on. IEEE, 2012.
  8. He, X. (2008) Watermarking in Audio: Key Techniques and Technologies. Cambria Press, Youngstown.
  9. Himeur Yassine, Boudraa Bachir, Khelalef Aziz “A Secure and High Robust Audio Watermarking System for Copyright Protection” International Journal of Computer Applications (0975 – 8887) Volume 53– No.17, September 2012, pp.33-39.
  10. Seitz, J. (2005) Digital Watermarking for Digital Media. Information Science, Hershey.
  11. Ms. Komal V. Goenka, “Overview of Audio Watermarking Techniques”, Volume 2, Issue 2, February 2012.
  12. Wei Li, Xiangyang Xue, and Peizhong Lu,“Localized Audio Watermarking Technique Robust Against Time-Scale Modification”, VOL.8, NO. 1, FEBRUARY 2006.
  13. Ai, H., Liu, Q. and Jiang, X. (2013) Synchronization Audio Watermarking Algorithm Based on DCT and DWT. Proceedings of IEEE Conference Anthology, Shanghai, 1-8 January 2013, 1-4.
  14. Can, Y.S. and Alagoz, F. (2013) Robust Frequency Hopping and Direct Sequence Spread Spectrum Audio Watermarking Technique on Wavelet Domain. Proceedings of 2013 International Conference on Electronics, Computer and Computation (ICECCO), Ankara, 7-9 November 2013, 382-385.
  15. Dhar, P.K. and Shimamura, T. (2013) Entropy-Based Audio Watermarking Using Singular Value Decomposition and Log-Polar Transformation. Proceedings of 2013 IEEE 56th International Midwest Symposium on Circuits and Systems (MWSCAS), Columbus, 4-7 August 2013, 1224-1227.
  16. Shahriar, M.R., Cho, S. and Chong, U. (2012) Time-Domain Audio Watermarking Using Multiple Marking Spaces. Proceedings of 2012 International Conference on Informatics, Electronics & Vision (ICIEV), Dhaka, 18-19 May 2012, 974-979.
  17. Cvejic, N. and Seppänen, T. (2008) Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks. IGI Global Snippet, Hershey.
  18. Lei, B.Y., Soon, I.Y. and Tan, E.-L. (2013) Robust SVD-Based Audio Watermarking Scheme with Differential Evolution Optimization. IEEE Transactions on Audio, Speech, and Language Processing, 21, 2368-2378.
  19. Cox, I.J., Kilian, J., Leighton, T. and Shamoon, T. (1997) Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing, 6, 1673-1687
  20. M. Steinebach, F. Petitcolas, F. Raynal, J. Dittmann, C. Fontaine, S. Seibel, et al., “Stirmark benchmark: Audio watermarking attacks,” Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 49-54, 2001, Las Vegas, Nevada.
  21. T. K. Tewari, V. Saxena, J. P. Gupta, “Audio Watermarking: Current State of Art and Future Objectives”, International Journal of Digital Content Technology and its Applications, vol. 5, no.7, pp. 306- 314, July 2011
  22. T. K. Tewari, V. Saxena, J. P. Gupta, “A Novel Approach to Generate Watermarks Using Auditory Features for Audio Watermarking”, Journal of Theoretical and Applied Information Technology, vol. 32, no. 2, pp. 155- 162, Jan 2012
  23. Michael Arnold, Audio watermarking: features, applications, and algorithms. In IEEE International Conference on Multimedia and Expo (II). Citeseer,2000.
  24. Manjushree A. Shete1, Prof.V.S.Kolkure, “A Review on Digital Watermarking, its features, need and various techniques” International Journal for Research in Applied Science & Engineering Technology (IJRASET), ISSN: 2321-9653, Volume 4 Issue X, October 2016
  25. K. Hofbauer, and H. Hering, “Noise Robust Speech Watermarking with Bit Synchronisation for the Aeronautical Radio,” LNCS 4567, Springger-Verlag Berlin Heidelberg, pp. 252-266, 2007.
  26. Al-Haj, A., Mohammad, A. and Bata, L. (2011) DWT-Based Audio Watermarking. The International Arab Journal of Information Technology, 8, 326-333.
  27. Al-Yaman, M.S., Al-Taee, M.A., Shahrour, A.T. and Al-Husseini, I.A. (2011) Biometric Based Audio Ownership Verification Using Discrete Wavelet Transform and SVD Techniques. Proceedings of the 8th International Multi- Conference on Systems, Signals and Devices (SSD’11), Sousse, 22-25 March 2011, 1-5.
  28. Khalid A. Darabkh, Imperceptible and Robust DWT-SVD-Based Digital Audio Watermarking Algorithm, Journal of Software Engineering and Applications, 2014, 7, 859-871.
  29. A. B. Watson, “Image Compression Using the Discrete Cosine Transform,” Mathematical Journal, vol. 4(1), pp. 81-88, 1994.
  30. S. Katzenbeisser, and F.A.P. Petitcolas, Information hiding techniques for steganography and digital watermarking, Artech House Publishers, 2000.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Krunalkumar N. Patel, " Different Types of Attacks and Performance Evaluation Factors in Digital Audio Watermarking , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 2, pp.754-762, March-April-2019. Available at doi : https://doi.org/10.32628/IJSRSET1962141