Abstract

In this paper, a robust and highly imperceptible audio watermarking technique is presented based on discrete cosine transform (DCT) and singular value decomposition (SVD). The low-frequency components of the audio signal have been selectively embedded with watermark image data making the watermarked audio highly imperceptible and robust. The imperceptibility of proposed methods is evaluated by computing signal-to-noise ratio and by conducting subjective listening tests. The robustness of proposed technique is evaluated by computing bit error rate and average information loss in retrieved watermark image subjected to MP3 compression, AWGN, re-sampling, re-quantization, amplitude scaling, low-pass filtering, and high-pass filtering attacks with high data payload of 6 kbps. The information-theoretic approach is used to model the proposed watermarking technique as discrete memoryless channel. The Shannon’s entropy concept is used to highlight the robustness of proposed technique by computing the information loss in retrieved watermarked image.

Highlights

  • The rapid developments in the field of digital audio technology have increased the ease to store, distribute and reproduce the audio files

  • 4 Conclusions In this paper, we proposed a novel audio watermarking technique based on discrete cosine transform (DCT) and singular value decomposition (SVD) transform

  • The watermark bits are embedded in DCT coefficients of selected frames by performing SVD operation

Read more

Summary

Introduction

The rapid developments in the field of digital audio technology have increased the ease to store, distribute and reproduce the audio files. This leads to an inherent security risk of illegal data usage and copyright violation. The digital audio watermarking technique provides a promising solution to protect such copyright violation [1]. The digital watermark is a check to illegal copying of data and identifies the copyright infringement [2]. The watermark data can be text or image (logo) and can be utilized for protection of copyright, authentication, and deterrent illegal copying of audio files [3].

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call