33 research outputs found

    Tatouage audio par EMD

    Get PDF
    In this paper a new adaptive audio watermarking algorithm based on Empirical Mode Decomposition (EMD) is introduced. The audio signal is divided into frames and each one is decomposed adaptively, by EMD, into intrinsic oscillatory components called Intrinsic Mode Functions (IMFs). The watermark and the synchronization codes are embedded into the extrema of the last IMF, a low frequency mode stable under different attacks and preserving audio perceptual quality of the host signal. The data embedding rate of the proposed algorithm is 46.9–50.3 b/s. Relying on exhaustive simulations, we show the robustness of the hidden watermark for additive noise, MP3 compression, re-quantization, filtering, cropping and resampling. The comparison analysis shows that our method has better performance than watermarking schemes reported recently

    Implementasi Digital Watermarking Pada File Audio Mp3 Menggunakan Metode FHSS (Frequency Hopping Spread Spectrum) Dan Fourier Transform

    Get PDF
    Abstrak --- Digital Watermarking merupakan gambaran besar alur bagaimana pengguna digital salah satunya perusahaan musik atau musisi itu sendiri mengelolah data musiknya yang berupa file master mp3 dengan bertujuan memberi watermark agar data tersebut tidak mudah diplagiasi maupun disalin lalu disebarluaskan melalui pasar digital yang ada. Ada beberapa metode yang mempermudah bagi para developer dalam mengembangkan software aplikasi yaitu salah satunya metode FHSS (Frequency Hopping Spread Spectrum). FHSS sendiri ini adalah metode yang digunakan untuk bagaimana nantinya watermark akan disematkan melalui domain frekuensi, dimana frekuensi pembawa (spektrum audio) yang sebelumnya telah disematkan kode biner watermark selama hopping frekuensi yang telah ditentukan. Sebelum mengimplementasikan metode FHSS, ada beberapa metode pendekatan yaitu Fourier Transforms atau dengan cara framming (mengolah sample framerate data sinyal)  untuk menghitung nilai koefisien dari sinyal gelombang pembawa yang ditelah disematkan kode bit dari watermark, kemudian bit hasilnya akan disebar menggunakan angka pseudo acak dan parameter ketinggian amplitude alpha sebesar 0.005, beta 1, gama 0.5 kedalam data sinyal audio yang sudah disegmentasi, lalu menghasilkan output file audio yang telah diberi watermark. Ada beberapa metode untuk mengetahui seberapa jauh kuat watermark yang disematkan yaitu dengan cara pengujian ketahanan suatu file dengan 1) pengujian Kompresi dimana memberikan hasil memiliki keakuratan informasi watermark dan sedikit mengubah ukuran file, 2) pengujian Resampling dengan nilai samplerate/2 dimana memberikan hasil keakuratan informasi watermark dan beberapa file memiliki ukuran berbeda, 3) pengujian Cropping pada detik 00.02.00 sampai 00.03.00 dimana memberikan hasil tidak akurat terhadap informasi watermark dan secara ukuran file, jelas sekali memiliki perbedaan yang jauh, 4) pengujian Penambahan Noise memberikan hasil memiliki keakuratan informasi watermark dan ukuran file tidak terlalu berubah   Kata Kunci --- Audio, Watermarking, FHSS, Domain Frekuens

    SecMon: End-to-End Quality and Security Monitoring System

    Get PDF
    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by limited number of implementations. As a result, the lack of mandatory and widely applicable QoS and security guaranties makes the contemporary VoIP systems vulnerable to attacks and network disturbances. In this paper we are facing these issues and propose the SecMon system, which simultaneously provides a lightweight security mechanism and improves quality parameters of the call. SecMon is intended specially for VoIP service over P2P networks and its main advantage is that it provides authentication, data integrity services, adaptive QoS and (D)DoS attack detection. Moreover, the SecMon approach represents a low-bandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above-mentioned features are accomplished mainly by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement's results. Furthermore, these metrics are aggregated in a reputation system that enables best route path selection in the P2P network. The reputation system helps also to mitigate (D)DoS attacks, maximize performance and increase transmission efficiency in the network.Comment: Paper was presented at 7th international conference IBIZA 2008: On Computer Science - Research And Applications, Poland, Kazimierz Dolny 31.01-2.02 2008; 14 pages, 5 figure

    A robust audio watermarking scheme based on reduced singular value decomposition and distortion removal

    Get PDF
    This paper presents a blind audio watermarking algorithm based on the reduced singular value decomposition(RSVD). A new observation on one of the resulting unitary matrices is uncovered. The proposed scheme manipulates coefficients based on this observation in order to embed watermark bits. To preserve audio fidelity a threshold- based distortion control technique is applied and this is further supplemented by distortion suppression utilizing psychoacoustic principles. Test results on real music signals show that this watermarking scheme is in the range of imperceptibility for human hearing, is accurate and also robust against MP3 compression at various bit rates as well as other selected attacks. The data payload is comparatively high compared to existing audio watermarking schemes

    SecMon: end-to-end quality and security monitoring system

    Get PDF
    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communication for the Internet users. This also applies to the Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by a limited number of implementations. As a result, the lack of mandatory and widely applicable QoS and security guarantee makes the contemporary VoIP systems vulnerable to attacks and network disturbances. In this paper we are facing these issues and propose the SecMon system, which simultaneously provides a lightweight security mechanism and improves quality parameters of the call. SecMon is intended specially for VoIP service over P2P networks and its main advantage is that it provides authentication, data integrity services, adaptive QoS and (D)DoS attack detection. Moreover, the SecMon approach represents a lowbandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above-mentioned features are accomplished mainly by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement results. Furthermore, these metrics are aggregated in a reputation system that enables best route path selection in the P2P network. The reputation system helps also to mitigate (D)DoS attacks, maximize performance and increase transmission efficiency in the network

    The using of orthogonal basis for the steganographic coding of information in multimedia

    Get PDF
    This article discusses methods for steganographic encoding additional information using three different orthogonal bases. The bases are represented by the functions, which occupies a different bandwidth in the spectrum. There are comparison of the approach to the definition of DCT- coefficients with the approaches used in the methods of the spread spectrum and subband projections. The approaches of the coefficients of the implementation to ensure secrecy by adaptive determination of their value are considere

    New Digital Audio Watermarking Algorithms for Copyright Protection

    Get PDF
    This thesis investigates the development of digital audio watermarking in addressing issues such as copyright protection. Over the past two decades, many digital watermarking algorithms have been developed, each with its own advantages and disadvantages. The main aim of this thesis was to develop a new watermarking algorithm within an existing Fast Fourier Transform framework. This resulted in the development of a Complex Spectrum Phase Evolution based watermarking algorithm. In this new implementation, the embedding positions were generated dynamically thereby rendering it more difficult for an attacker to remove, and watermark information was embedded by manipulation of the spectral components in the time domain thereby reducing any audible distortion. Further improvements were attained when the embedding criteria was based on bin location comparison instead of magnitude, thereby rendering it more robust against those attacks that interfere with the spectral magnitudes. However, it was discovered that this new audio watermarking algorithm has some disadvantages such as a relatively low capacity and a non-consistent robustness for different audio files. Therefore, a further aim of this thesis was to improve the algorithm from a different perspective. Improvements were investigated using an Singular Value Decomposition framework wherein a novel observation was discovered. Furthermore, a psychoacoustic model was incorporated to suppress any audible distortion. This resulted in a watermarking algorithm which achieved a higher capacity and a more consistent robustness. The overall result was that two new digital audio watermarking algorithms were developed which were complementary in their performance thereby opening more opportunities for further research

    Research of sensitivity of some measures of quality assessment of hidden information in the audio content

    Get PDF
    The paper presents a comparison of some measures of difference between the original signal and the result of the introduction of additional information. The comparison was based on the analysis of the implementation of the results-based steganographic method of spectrum spreading. The paper presents the results of the comparison of some measures of difference based on the analysis of speech signals in their division into segments of equal lengt
    corecore