z-logo
open-access-imgOpen Access
Development of Algorithm for Audio Watermarking Embedding and Decoding using Patchwork Method under Attacks
Author(s) -
Y. D. Chincholkar,
S. R. Ganorkar
Publication year - 2020
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.c9000.019320
Subject(s) - digital watermarking , discrete cosine transform , watermark , computer science , audio signal , robustness (evolution) , payload (computing) , decoding methods , sound quality , algorithm , frame (networking) , digital audio , audio signal processing , embedding , speech recognition , artificial intelligence , speech coding , computer security , image (mathematics) , telecommunications , biochemistry , chemistry , network packet , gene
To protect digital multimedia content from unauthorized reproduction, digital audio watermarking played crucial role. Audio watermarking for the patchwork method has a relatively good level of perception quality.The challengesbetween security, robustness, and imperceptibility is contemporary area of researchand remains relevant issues. This paper introduces discrete cosine transforms (DCT)-based audio watermarking process using the patchwork method for conventional and advanced signal processing attacks. In the first stage of the watermarking audio signal is divided into an equal number of segments and its sub-segments, and then its coefficients are computed. After eliminating high-frequency related coefficients, remaining coefficients are used to form frame pairs of equal length. Watermarks are embedded in a frame using specific criteria and secured data key.The adjustments are made in such a way that the identification ofWatermarked pairs of DCT frames is done in the decoding process by applying the selection criteria used during the embedding process. From watermarked frames, watermark data is extracted by using a secure data key. The proposed audio watermarking algorithm is implemented and tested under conventional and advance signal processing attacks for robustness, imperceptibility, security, and data payload.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here