Efficient Watermarking of Audio Signals
Abstract
This paper presents a comparative study between the watermark encryption algorithms that are applied for audio signals. The chaotic Baker map and DES with its four modes are used as watermark encryption algorithms. Encrypted watermark is embedded in audio signal using both SVD and block based SVD methods. Experimental results show that the OFB mode is the least sensitive to attacks compared with the chaotic Baker map.
Keywords
Full Text:
PDFReferences
Chin-Chen Chang, Yih-Shin Hu and Chia-Chen Lin, "A Digital Watermarking Scheme Based on Singular Value Decomposition", Springer Berlin Heidelberg, 2007.
F. E. Abd El-samie, “An efficient singular value decomposition algorithm for digital audio watermarking, “ International Journal of Speech Technology, Vol. 12, No. 1, pp. 27–45, 2009, Springer.
W. Al-Nuaimy, M. A.M. El-Bendary, A. Shafik, F. Shawki, A.E. Abou-El-azm, N.A. El-Fishawy, S. M. Elhalafawy, S. M. Diab, B. M. Sallam, F. E. Abd El-Samie, and H.B. Kazemian, "An SVD Audio Watermarking Approach Using Chaotic Encrypted Images," Digital Signal Processing, Vol. 21, No. 6, pp. 764-779, 2011, Elsevier
J. Fridrich, “Image Encryption Based On Chaotic Maps" Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, vol.2, pp. 1105-1110, 1997.
J. Fridrich,” Symmetric Ciphers Based on Two-dimensional Chaotic Maps” Int.J. Bifurcation and Claos, vol.8, No.6,pp. 1259-1284, 1998.
Dr Jean-Yves Chouinard,"Design of Secure Computer SystemCSI4138/CEG4394 . Notes on the Data Encryption Standard (DES)", uottawa.ca, 2002.
K. Kondo, "Subjective Quality Measurement of Speech, Signals and Communication Technology", Springer-Verlag Berlin Heidelberg, 2012.
F. PUB. Data Encryption Standard (DES).National Bureau of Standards, US Department of Commerce, 1977.
http://en.kioskea.net/contents/134-introduction-to-encryption-with-des, (access date 29/7/213).
Ghanshyam Gaur1, R. S. Meena, "Secure Transmission of Biometric Scan Images Using Data Encryption Standards(DES) Algorithm", Scientific & Academic Publishing, 2012.
http://en.wikipedia.org/wiki/Block_cipher_mode_of_operation,(access date 29/7/2013).
Ibrahim Fathy El-Ashry, "Literature Survey on Image Security chapter 2 of M. Sc. Thesis Submitted for The Degree of M. Sc. of Communications Engineering", Faculty of Electronic Engineering, 2010.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.