14 research outputs found

    A HIGH SPEED VLSI ARCHITECTURE FOR DIGITAL SPEECH WATERMARKING WITH COMPRESSION

    Get PDF
    The need to provide a copy right protection on digital watermarking to multimedia data like speech, image or video is rapidly increasing with an intensification in the application in these areas. Digital watermarking has received a lot of attention in the past few years. A hardware system based solely on DSP processors are fast but may require more area, cost or power if the target application requires a large amount of parallel processing. An FPGA co-processor can provide as many as 550 parallel multiply and accumulate operations on a single device, but FPGAs excel at processing large amounts of data in parallel, as they are not optimized as processors for tasks such as periodic coefficient updates, decision- making control tasks. Combination of both the FPGA and DSP processor delivers an attractive solution for a wide range of applications. A hardware implementation of digital speech watermarking combined with speech compression, encryption on heterogeneous platform is made in this paper. It is observed that the proposed architecture is able to attain high speed while utilizing optimal resources in terms of area

    Multiple Content Adaptive Intelligent Watermarking Schemes for the Protection of Blocks of a Document Image

    Get PDF
    Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content blocks. The adjacent blocks of same type are merged together into a single block. Each block is watermarked in Phase-3. The type and amount of watermarking applied is decided intelligently and adaptively based on the classification of the blocks which results in improving embedding capacity and reducing time complexity incurred during watermarking. Experiments are conducted exhaustively on all the images in the corpus. The experimental evaluations exhibit better classification of segments based on information content in the block. The proposed technique also outperforms the existing watermarking schemes on document images in terms of robustness, accuracy of tamper detection and recovery

    Validation and Data Repairing of Document Image using Steganography Method

    Get PDF
    This paper attempts to propose a novel technique of blind authentication based on the method of secret in addition to data repair capability for grayscale document images through the use of the Portable Network Graphics (PNG) image. For every block of a grayscale document image, an authentication signal is generated, which, along with the block content in binary, is transformed into numerous shares using the Shamir secret sharing scheme. The parameters involved are carefully selected so that as many shares as possible can be generated and embedded into an alpha channel plane. After this, the alpha channel plane is combined with the original grayscale image to yield a PNG image. During this process, the computed share values are recorded as a range of alpha channel values near their maximum value of 255 to return a transparent stego-image with a disguised effect. In the image authentication process, marking of an image block is done as tampered, if the authentication signal computed from the current block content does not match the one extracted from the shares embedded in the alpha channel plane. Each tampered block is then subjected to data repairing by a reverse Shamir scheme after collecting two shares from unmarked blocks. Procedures to protect the safety of the data that lies concealed in the alpha channel have been proposed. Decent experimental results demonstrate the efficiency of the proposed method

    SVD Audio Watermarking: A Tool to Enhance the Security of Image Transmission over ZigBee Networks, Journal of Telecommunications and Information Technology, 2011, nr 4

    Get PDF
    The security is important issue in wireless networks. This paper discusses audio watermarking as a tool to improve the security of image communication over the IEEE 802.15.4 ZigBee network. The adopted watermarking method implements the Singular-Value Decomposition (SVD) mathematical technique. This method is based on embedding a chaotic encrypted image in the Singular Values (SVs) of the audio signal after transforming it into a 2-D format. The objective of chaotic encryption is to enhance the level of security and resist different attacks. Experimental results show that the SVD audio watermarking method maintains the high quality of the audio signals and that the watermark extraction and decryption are possible even in the presence of attacks over the ZigBee network

    Pertanika Journal of Science & Technology

    Get PDF
    corecore