• DocumentCode
    3702017
  • Title

    Secure transmission of data using audio watermarking with protection on synchronization attack

  • Author

    R. V. Sobha;M. Sucharitha

  • Author_Institution
    Department of Electronics and Communication, Noorul Islam Centre for Higher Education, Noorul Islam University, India
  • fYear
    2015
  • fDate
    4/1/2015 12:00:00 AM
  • Firstpage
    592
  • Lastpage
    597
  • Abstract
    The technique used to hide copyright information (watermark) into the digital audio signal is termed as audio watermarking. Audio watermarking is an excellent approach to provide a solution to mitigate challenges that occur from easy copying and distribution of audio files that are being downloaded or uploaded through the web. The audio watermarking algorithms proposed earlier were implemented by image or binary logo or a unique pattern as watermark. To tackle the difficulty of online musical piracy, unethical attempt to alter purposefully copyrighted audio data and unauthorized distribution and tampering of audio files an efficient audio watermarking method is suggested here. In this method the copyright information (watermark) which is an audio signal of shorter length is imperceptibly added into the original audio signal with greater duration. Here two audio watermarking methods using DCT (Discrete Cosine Transform) and then with DWT-SVD (Discrete Wavelet Transform - singular value decomposition) methods are proposed with audio signal encrypted with secure hash algorithm as watermark. A comparative study on performance evaluation of both DCT and DWT-SVD methods are made in terms of PSNR (Peak-Signal to Noise Ratio) and MSE (Mean Square Error). The results show that transparency is best for each methods and DWT-SVD method is more efficient against signal attacks. The elementary notion of this document is to provide a beneficial and satisfactory method for secure audio file transmission by providing copyright protection.
  • Keywords
    "Watermarking","Discrete wavelet transforms","Discrete cosine transforms","Robustness","Cryptography","Matrix decomposition"
  • Publisher
    ieee
  • Conference_Titel
    Communication Technologies (GCCT), 2015 Global Conference on
  • Type

    conf

  • DOI
    10.1109/GCCT.2015.7342731
  • Filename
    7342731