BlueStar: enabling efficient integration between bluetooth WPANs and IEEE 802.11 WLANs
Mobile Networks and Applications
A Digital Watermarking Algorithm and Implementation Based on Improved SVD
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03
Integrated Confusion-Diffusion Mechanisms for Chaos Based Image Encryption
CITWORKSHOPS '08 Proceedings of the 2008 IEEE 8th International Conference on Computer and Information Technology Workshops
A Robust Image Watermarking Scheme Based on the Relationship of SVD
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
A Novel Symmetric Image Encryption Approach Based on a New Invertible Two-Dimensional Map
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Video Compression and Encryption Based-On Multiple Chaotic System
ICICIC '08 Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control
Wireless Security and Cryptography: Specifications and Implementations
Wireless Security and Cryptography: Specifications and Implementations
UbiPAN: A Bluetooth Extended Personal Area Network
CISIS '10 Proceedings of the 2010 International Conference on Complex, Intelligent and Software Intensive Systems
A temporal domain audio watermarking technique
IEEE Transactions on Signal Processing
A New Adaptive Digital Audio Watermarking Based on Support Vector Regression
IEEE Transactions on Audio, Speech, and Language Processing
An SVD-based watermarking scheme for protecting rightful ownership
IEEE Transactions on Multimedia
DCT-based image watermarking using subsampling
IEEE Transactions on Multimedia
Localized audio watermarking technique robust against time-scale modification
IEEE Transactions on Multimedia
A Robust Audio Watermark Representation Based on Linear Chirps
IEEE Transactions on Multimedia
Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks
IEEE Transactions on Multimedia
Multipurpose image watermarking algorithm based on multistage vector quantization
IEEE Transactions on Image Processing
Invariant image watermark using Zernike moments
IEEE Transactions on Circuits and Systems for Video Technology
Audio watermarking techniques using sinusoidal patterns based on pseudorandom sequences
IEEE Transactions on Circuits and Systems for Video Technology
Robust and secure watermarking scheme for breath sound
Journal of Systems and Software
A novel speech content authentication algorithm based on Bessel-Fourier moments
Digital Signal Processing
Image cryptographic algorithm based on the Haar wavelet transform
Information Sciences: an International Journal
Hi-index | 0.00 |
This paper presents a new approach for audio watermarking using the Singular Value Decomposition (SVD) mathematical technique. The proposed approach can be used for data hiding in the audio signals transmitted over wireless networks and for multi-level security systems as will be stated in the applications section. This approach is based on embedding a chaotic encrypted watermark in the singular values of the audio signal after transforming it into a 2-D format. The selection of the chaotic encryption algorithm for watermark encryption is attributed to its permutation nature, which resists noise, filtering, and compression attacks. After watermark embedding, the audio signal is transformed again into a 1-D format. The transformation between the 1-D and 2-D formats is performed in the well-known lexicographic ordering method used in image processing. The proposed approach can be implemented on the audio signal as a whole or on a segment-by-segment basis. The segment-by-segment implementation allows embedding the same watermark several times in the audio signal, which enhances the detectability of the watermark in the presence of severe attacks. Experimental results show that the proposed audio watermarking approach maintains the high quality of the audio signal and that the watermark extraction and decryption are possible even in the presence of attacks.