SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 11
Abstract
The main goal of this paper is to embed a watermark in the speech signal, using the three techniques such as Discrete Cosine Transform (DCT) along with Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT).In this paper, various combinations were tried for embedding the watermark image into the audio signal such as DWT and SVD, DCT with SVD and DCT, DWT with SVD. Their performance was evaluated based on Signal to Noise Ratio (SNR) and Bit Error Rate (BER). From the results it can be seen that the combination of DCT with DWT and SVD method provides better result.
Authors and Affiliations
D. AMBIKA , V. RADHA
Land use and Land Cover Classification using RGB&L Based Supervised Classification Algorithm
After the Geometric correction and resampling the image should be classified. This paper introduced a new method for classifying the areas in a remotely sensed image under the category of supervised classification techni...
An Effective Test Suite Reduction Using Priority Cost Technique
Effective testing can develop quality software with higher productivity at a lower cost. As the software is modified and new test cases are added to the test suite, the size of the test suite grows and the cost of testin...
A Theoretical Analysis of Different Hacking Techniques in Wireless Networks
Over the course of past few decades to today's world, even though the usage of computers is increasing rapidly, the users hesitate to store their personal information in their computers because of the security issues of...
ENHANCING THE DATA SECURITY OF SIMPLE COLUMNAR TRANSPOSITION CIPHER BY CAESAR CIPHER AND RAIL FENCE CIPHER TECHNIQUE.
Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique ,Substitution technique. In recent year...
Secure Data Sharing using Decoy Technology
Cloud computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. Data sharing is an important functionality in clo...