A Robust Audio Watermarking Technique Operates in MDCT Domain based on Perceptual Measures
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
the review presents a digital audio watermarking technique operating in the frequency domain with two variants. This technique uses the Modified Discrete Cosine Transform (MDCT) to move to the frequency domain. To ensure more inaudibility, we exploited the proprieties of the psychoacoustic model 1 (PMH1) of MPEG1 encoder layer I in the first variant and those of psychoacoustic model 2 (PMH2) of MPEG1 encoder Layer III in the second alternative to search the places for insertion of the watermark. In both variants of the technique, the bits of the mark will be duplicated to increase the capacity of insertion then inserted into the least significant bit (LSB). For more reliability in the detection phase, we use an error correction code (Hamming) on the mark. Next, to analyze the performance of the proposed technique, we perform two comparative studies. In the first, we compare the proposed digital audio watermarking technique with her two variants and those achieved by Luigi Rosa and Rolf Brigola, ‘which we download the M-files of each’. The technique developed by Luigi Rosa operates in the frequency domain but using the Discrete Cosine Transform (DCT) as transformation and that proposed by Rolf Brigola uses the Fast Fourier Transform (FFT). We studied the robustness of each technique against different types of attacks such as compression / decompression MP3, stirmark audio attack and we evaluated the inaudibility by using an objective approach by calculating the SNR and the ODG notes given by PEAQ. The robustness of this technique is shown against different types of attacks. In the second, we prove the contribution of the proposed technique by comparing the payload data, imperceptibility and robustness against attack MP3 with others existing techniques in the literature.
Authors and Affiliations
Maha Bellaaj, Kais Ouni
Software Requirements Conflict Identification: Review and Recommendations
Successful development of software systems re-quires a set of complete, consistent and clear requirements. A wide range of different stakeholders with various needs and backgrounds participate in the requirements enginee...
A Survey of Energy Aware Cloud’s Resource Allocation Techniques for Virtual Machine Consolidation
As the demand for cloud computing environment is increasing, new techniques for making cloud computing more environment-friendly are being proposed with an aim to convert traditional cloud computing into green cloud comp...
Strength of Crypto-Semantic System of Tabular Data Protection
The strength of the crypto-semantic method (CSM) of text data protection based on the use of lexicographical systems in the form of applied linguistic corpora within the formally defined restrictions of selected spheres...
Estimation of the Visual Quality of Video Streaming Under Desynchronization Conditions
This paper presents a method for assessing desynchronized video with the aid of a software package specially developed for this purpose. A unique methodology of substituting values for lost frames was developed. It...
An Application of Intuitionistic Fuzzy in Routing Networks
Routing is an important functional aspect of networks to transport packets from source to destination. A router sets up optimized paths among the different nodes in the network. In this paper the authors proposed a new t...