68 research outputs found

    An SVD-based audio watermarking technique

    Full text link

    Audio watermarking using transformation techniques

    Get PDF
    Watermarking is a technique, which is used in protecting digital information like images, videos and audio as it provides copyrights and ownership. Audio watermarking is more challenging than image watermarking due to the dynamic supremacy of hearing capacity over the visual field. This thesis attempts to solve the quantization based audio watermarking technique based on both the Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). The underlying system involves the statistical characteristics of the signal. This study considers different wavelet filters and quantization techniques. A comparison is performed on diverge algorithms and audio signals to help examine the performance of the proposed method. The embedded watermark is a binary image and different encryption techniques such as Arnold Transform and Linear Feedback Shift Register (LFSR) are considered. The watermark is distributed uniformly in the areas of low frequencies i.e., high energy, which increases the robustness of the watermark. Further, spreading of watermark throughout the audio signal makes the technique robust against desynchronized attacks. Experimental results show that the signals generated by the proposed algorithm are inaudible and robust against signal processing techniques such as quantization, compression and resampling. We use Matlab (version 2009b) to implement the algorithms discussed in this thesis. Audio transformation techniques for compression in Linux (Ubuntu 9.10) are applied on the signal to simulate the attacks such as re-sampling, re-quantization, and mp3 compression; whereas, Matlab program for de-synchronized attacks like jittering and cropping. We envision that the proposed algorithm may work as a tool for securing intellectual properties of the musicians and audio distribution companies because of its high robustness and imperceptibility

    Contextual biometric watermarking of fingerprint images

    Get PDF
    This research presents contextual digital watermarking techniques using face and demographic text data as multiple watermarks for protecting the evidentiary integrity of fingerprint image. The proposed techniques embed the watermarks into selected regions of fingerprint image in MDCT and DWT domains. A general image watermarking algorithm is developed to investigate the application of MDCT in the elimination of blocking artifacts. The application of MDCT has improved the performance of the watermarking technique compared to DCT. Experimental results show that modifications to fingerprint image are visually imperceptible and maintain the minutiae detail. The integrity of the fingerprint image is verified through high matching score obtained from the AFIS system. There is also a high degree of correlation between the embedded and extracted watermarks. The degree of similarity is computed using pixel-based metrics and human visual system metrics. It is useful for personal identification and establishing digital chain of custody. The results also show that the proposed watermarking technique is resilient to common image modifications that occur during electronic fingerprint transmission

    Self-Authentication of Audio Signals by Chirp Coding

    Get PDF
    This paper discusses a new approach to ‘watermarking’ digital signals using linear frequency modulated or ‘chirp’ coding. The principles underlying this approach are based on the use of a matched filter to provide a reconstruction of a chirped code that is uniquely robust in the case of signals with very low signal-to-noise ratios. Chirp coding for authenticating data is generic in the sense that it can be used for a range of data types and applications (the authentication of speech and audio signals, for example). The theoretical and computational aspects of the matched filter and the properties of a chirp are revisited to provide the essential background to the method. Signal code generating schemes are then addressed and details of the coding and decoding techniques considered. Finally, the paper briefly describes an example application which is available on-line for readers who are interested in using the approach for audio data authentication working with either WAV or MP3 files

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Digital video watermarking techniques for secure multimedia creation and delivery.

    Get PDF
    Chan Pik-Wah.Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.Includes bibliographical references (leaves 111-130).Abstracts in English and Chinese.Abstract --- p.iAcknowledgement --- p.ivChapter 1 --- Introduction --- p.1Chapter 1.1 --- Background --- p.1Chapter 1.2 --- Research Objective --- p.3Chapter 1.3 --- Contributions --- p.4Chapter 1.4 --- The Structure of this Thesis --- p.6Chapter 2 --- Literature Review --- p.7Chapter 2.1 --- Security in Multimedia Communications --- p.8Chapter 2.2 --- Cryptography --- p.11Chapter 2.3 --- Digital Watermarking --- p.14Chapter 2.4 --- Essential Ingredients for Video Watermarking --- p.16Chapter 2.4.1 --- Fidelity --- p.16Chapter 2.4.2 --- Robustness --- p.17Chapter 2.4.3 --- Use of Keys --- p.19Chapter 2.4.4 --- Blind Detection --- p.20Chapter 2.4.5 --- Capacity and Speed --- p.20Chapter 2.4.6 --- Statistical Imperceptibility --- p.21Chapter 2.4.7 --- Low Error Probability --- p.21Chapter 2.4.8 --- Real-time Detector Complexity --- p.21Chapter 2.5 --- Review on Video Watermarking Techniques --- p.22Chapter 2.5.1 --- Video Watermarking --- p.25Chapter 2.5.2 --- Spatial Domain Watermarks --- p.26Chapter 2.5.3 --- Frequency Domain Watermarks --- p.30Chapter 2.5.4 --- Watermarks Based on MPEG Coding Struc- tures --- p.35Chapter 2.6 --- Comparison between Different Watermarking Schemes --- p.38Chapter 3 --- Novel Watermarking Schemes --- p.42Chapter 3.1 --- A Scene-based Video Watermarking Scheme --- p.42Chapter 3.1.1 --- Watermark Preprocess --- p.44Chapter 3.1.2 --- Video Preprocess --- p.46Chapter 3.1.3 --- Watermark Embedding --- p.48Chapter 3.1.4 --- Watermark Detection --- p.50Chapter 3.2 --- Theoretical Analysis --- p.52Chapter 3.2.1 --- Performance --- p.52Chapter 3.2.2 --- Capacity --- p.56Chapter 3.3 --- A Hybrid Watermarking Scheme --- p.60Chapter 3.3.1 --- Visual-audio Hybrid Watermarking --- p.61Chapter 3.3.2 --- Hybrid Approach with Different Water- marking Schemes --- p.69Chapter 3.4 --- A Genetic Algorithm-based Video Watermarking Scheme --- p.73Chapter 3.4.1 --- Watermarking Scheme --- p.75Chapter 3.4.2 --- Problem Modelling --- p.76Chapter 3.4.3 --- Chromosome Encoding --- p.79Chapter 3.4.4 --- Genetic Operators --- p.80Chapter 4 --- Experimental Results --- p.85Chapter 4.1 --- Test on Robustness --- p.85Chapter 4.1.1 --- Experiment with Frame Dropping --- p.87Chapter 4.1.2 --- Experiment with Frame Averaging and Sta- tistical Analysis --- p.89Chapter 4.1.3 --- Experiment with Lossy Compression --- p.90Chapter 4.1.4 --- Test of Robustness with StirMark 4.0 --- p.92Chapter 4.1.5 --- Overall Comparison --- p.98Chapter 4.2 --- Test on Fidelity --- p.100Chapter 4.2.1 --- Parameter(s) Setting --- p.101Chapter 4.2.2 --- Evaluate with PSNR --- p.101Chapter 4.2.3 --- Evaluate with MAD --- p.102Chapter 4.3 --- Other Features of the Scheme --- p.105Chapter 4.4 --- Conclusion --- p.106Chapter 5 --- Conclusion --- p.108Bibliography --- p.11

    Digital watermarking methods for data security and authentication

    Get PDF
    Philosophiae Doctor - PhDCryptology is the study of systems that typically originate from a consideration of the ideal circumstances under which secure information exchange is to take place. It involves the study of cryptographic and other processes that might be introduced for breaking the output of such systems - cryptanalysis. This includes the introduction of formal mathematical methods for the design of a cryptosystem and for estimating its theoretical level of securit

    Fractal-based models for internet traffic and their application to secure data transmission

    Get PDF
    This thesis studies the application of fractal geometry to the application of covert communications systems. This involves the process of hiding information in background noise; the information being encrypted or otherwise. Models and methods are considered with regard to two communications systems: (i) wireless communications; (ii) internet communications. In practice, of course, communication through the Internet cannot be disassociated from wireless communications as Internet traffic is 'piped' through a network that can include wireless communications (e.g. satellite telecommunications). However, in terms of developing models and methods for covert communications in general, points (i) and (ii) above require different approaches and access to different technologies. With regard to (i) above, we develop two methods based on fractal modulation and multi-fractal modulation. With regard to (ii), we implement a practical method and associated software for covert transmission of file attachments based on an analysis of Internet traffic noise. In both cases, however, two fractal models are considered; the first is the standard Random Scaling Fractal model and the second is a generalisation of this model that incorporates a greater range of spectral properties than the first—a Generalised Random Scaling Fractal Model. [Continues.

    Comparative evaluation of video watermarking techniques in the uncompressed domain

    Get PDF
    Thesis (MScEng)--Stellenbosch University, 2012.ENGLISH ABSTRACT: Electronic watermarking is a method whereby information can be imperceptibly embedded into electronic media, while ideally being robust against common signal manipulations and intentional attacks to remove the embedded watermark. This study evaluates the characteristics of uncompressed video watermarking techniques in terms of visual characteristics, computational complexity and robustness against attacks and signal manipulations. The foundations of video watermarking are reviewed, followed by a survey of existing video watermarking techniques. Representative techniques from different watermarking categories are identified, implemented and evaluated. Existing image quality metrics are reviewed and extended to improve their performance when comparing these video watermarking techniques. A new metric for the evaluation of inter frame flicker in video sequences is then developed. A technique for possibly improving the robustness of the implemented discrete Fourier transform technique against rotation is then proposed. It is also shown that it is possible to reduce the computational complexity of watermarking techniques without affecting the quality of the original content, through a modified watermark embedding method. Possible future studies are then recommended with regards to further improving watermarking techniques against rotation.AFRIKAANSE OPSOMMING: ’n Elektroniese watermerk is ’n metode waardeur inligting onmerkbaar in elektroniese media vasgelê kan word, met die doel dat dit bestand is teen algemene manipulasies en doelbewuste pogings om die watermerk te verwyder. In hierdie navorsing word die eienskappe van onsaamgeperste video watermerktegnieke ondersoek in terme van visuele eienskappe, berekeningskompleksiteit en weerstandigheid teen aanslae en seinmanipulasies. Die onderbou van video watermerktegnieke word bestudeer, gevolg deur ’n oorsig van reedsbestaande watermerktegnieke. Verteenwoordigende tegnieke vanuit verskillende watermerkkategorieë word geïdentifiseer, geïmplementeer en geëvalueer. Bestaande metodes vir die evaluering van beeldkwaliteite word bestudeer en uitgebrei om die werkverrigting van die tegnieke te verbeter, spesifiek vir die vergelyking van watermerktegnieke. ’n Nuwe stelsel vir die evaluering van tussenraampie flikkering in video’s word ook ontwikkel. ’n Tegniek vir die moontlike verbetering van die geïmplementeerde diskrete Fourier transform tegniek word voorgestel om die tegniek se bestandheid teen rotasie te verbeter. Daar word ook aangetoon dat dit moontlik is om die berekeningskompleksiteit van watermerktegnieke te verminder, sonder om die kwaliteit van die oorspronklike inhoud te beïnvloed, deur die gebruik van ’n verbeterde watermerkvasleggingsmetode. Laastens word aanbevelings vir verdere navorsing aangaande die verbetering van watermerktegnieke teen rotasie gemaak
    • …
    corecore