IJCNIS Vol. 6, No. 2, 8 Jan. 2014
Cover page and Table of Contents: PDF (size: 492KB)
Full Text (PDF, 492KB), PP.1-8
Views: 0 Downloads: 0
Digital Watermarking, FeatureMark, Walsh Transforms, Non-repudiation
Guaranteeing the ownership or copyright of digital communication is of extreme importance in this digital era. Watermarking is the technique which confirms the authenticity or integrity of communication by hiding relevant information in specified areas of the original signal such that it might render it difficult to distinguish one from the other. Thus, the digital watermark can be defined as a type of indicator secretly embedded in a noise tolerant signal such as image, audio or video data.
The paper presents a voice signal authentication scheme by employing signal features towards the preparation of the watermark and by embedding it in the transform domain with the Walsh transforms. Watermark used in this technique is unique for each member participating in this communication system and makes it is very imperative in the context of signal authentication.
Remya A R,A Sreekumar,Supriya M H,Tibin Thomas, "An Improved Non-Repudiate Scheme-Feature Marking Voice Signal Communication", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.2, pp.1-8, 2014. DOI:10.5815/ijcnis.2014.02.01
[1]Stefan K, Fabien A P, Information hiding techniques for steganography and digital watermarking. Artech House, London, UK, 2000.
[2]Wang XY, Ma TX, Niu PP (2011) A pseudo-zernike moment based audio watermarking scheme robust against desynchronization attacks. Computers & Electrical Engineering 37(4):425–443.
[3]Wang XY, Niu PP, Yang HY (2009) A robust digital audio watermarking based on statistics characteristics. Pattern Recognition 42(11):3057–3064.
[4]Bhat V, Sengupta I, Das A (2011) An audio watermarking scheme using singular value decomposition and dither-modulation quantization. Multimedia Tools and Applications 52(2-3):369–383.
[5]Mierswa I, Morik K (2005) Automatic feature extraction for classifying audio data. Machine learning 58(2-3):127–149.
[6]JongwonSeok, Jinwoo Hong, and Jinwoong Kim, A Novel Audio Watermarking Algorithm for Copyright Protection of Digital Audio, ETRI Journal, Volume 24, Number 3, June 2002.
[7]Lin Y, Abdulla WH (2008) Multiple scrambling and adaptive synchronization for audio watermarking. In: Digital watermarking, Springer, pp 440–453.
[8]Bassia P, Pitas I, Nikolaidis N (2001) Robust audio watermarking in the time domain. Multimedia, IEEE Transactions on 3(2):232–241.
[9]Swanson MD, Zhu B, Tewfik AH, Boney L (1998) Robust audio watermarking using perceptual masking. Signal Processing 66(3):337–355.
[10]Lee SK, Ho YS (2000) Digital audio watermarking in the cepstrum domain. Consumer Electronics, IEEE Transactions on 46(3):744–750.
[11]Cvejic N, Seppänen T (2004) Spread spectrum audio watermarking using frequency hopping and attack characterization. Signal processing 84(1):207–213.
[12]Yeo IK, Kim HJ (2003) Modified patchwork algorithm: A novel audio watermarking scheme. Speech and Audio Processing, IEEE Transactions on 11(4):381–386.
[13]Xu X, Peng H, He C (2007) Dwt-based audio watermarking using support vector regression and subsampling. In: Applications of Fuzzy Sets Theory, Springer, pp 136–144.
[14]Mali MD, Khot S (2012) Robustness test analysis of histogram based audio watermarking. In: Wireless Networks and Computational Intelligence, Springer, pp 611–620.
[15]Lin Y, Abdulla WH (2008) Multiple scrambling and adaptive synchronization for audio watermarking. In: Digital watermarking, Springer, pp 440–453.
[16]Wang C, Ma X, Cong X, Yin F (2005) An audio watermarking scheme with neural network. In: Advances in Neural Networks–ISNN 2005, Springer, pp 795–800.
[17]Gopalan K, Audio steganography by cepstrum modification. In: Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP’05). IEEE International Conference on, IEEE, vol 5, pp v–481.
[18]Gopalan K, Robust watermarking of music signals by cepstrum modification. In: Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on, IEEE, pp 4413–4416.
[19]Kraetzer C, Dittmann J (2007) Mel-cepstrum based steganalysis for voip-steganography. Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX 6505:650,505–1.
[20]http://practicalcryptography.com/.
[21]http://en.wikipedia.org/wiki/.
[22]http://sovarr.c4dm.eecs.qmul.ac.uk/wiki/Spectral_Rolloff.
[23]http://www.paradisedata.com/collateral/articles/AN_035OptimisedSpectralRollOffApplicationNote.pdf/.
[24]http://www.mathworks.com/.
[25]Coffey T, Saidha P (1996) Non-repudiation with mandatory proof of receipt. ACM SIGCOMM Computer Communication Review 26(1):6–17.
[26]Kremer S, Markowitch O, Zhou J (2002) An intensive survey of fair non-repudiation protocols. Computer communications 25(17):1606–1621.
[27]He X, Scordilis MS (2008) Efficiently synchronized spreadspectrum audio watermarking with improved psychoacoustic model. Journal of Electrical and Computer Engineering 2008.
[28]http://paginas.fe.up.pt/~hmiranda/cm/Pseudo_Noise_Sequences.pdf/.
[29]http://www.math.wpi.edu/MPI2008/TSC/TSCeindlijk.pdf/.
[30]Tzafestas S (1983) Walsh transform theory and its application to systems analysis and control: an overview. Mathematics and Computers in Simulation 25(3):214–225.
[31]Abbasi, Shuja A and Alamoud, ARM and others, Design of Real Time Walsh Transform for Processing of Multiple Digital Signals, International Journal of Electrical and Computer Engineering (IJECE), Vol. 3, No. 2, April 2013, pp. 197-206.
[32]Goresky, Mark, and Andrew Klapper, Arithmetic Correlations and Walsh Transforms, IEEE Transactions On Information Theory, Vol. 58, No. 1, January 2012.