Skip to main content

A Fourier Transform Based Authentication of Audio Signals through Alternation of Coefficients of Harmonics (FTAT)

  • Conference paper
Advances in Parallel Distributed Computing (PDCTA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 203))

  • 1569 Accesses

Abstract

With commercial growth of digital processing of audio signals like song, voice, speech etc the intention to make piracy of originality of the same is increasing day by day. It is a real problem of intellectual property right (IPR) for providing security over audio signal without changing its quality. In this paper, an approach has been made to provide security of digital song with embedding some authenticating secret code through coefficient alternation of harmonics over some specific region of the song without affecting its audible quality. Decomposing constituent frequency components of signal using Fourier transform followed by alternating coefficients of specific harmonics generates a secret code and this unique code is utilized to detect the originality of the song. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Mondal, U.K., Mandal, J.K.: A Practical Approach of Embedding Secret Key to Authenticate Tagore Songs(ESKATS). In: Proceedings of Wireless Information Networks & Business Information System (WINBIS 2010), vol. 6(1), pp. 67–74. Organized by Rural Nepal Technical Academy (Pvt.) Ltd., Nepal (2010) ISSN 2091-0266

    Google Scholar 

  2. Mondal, U.K., Mandal, J.K.: A Novel Technique to Protect Piracy of Quality Songs through Amplitude Manipulation (PPAM). In: International Symposium on Electronic System Design (ISED 2010), pp. 246–250 (2010) ISBN 978-0-7695-4294-2

    Google Scholar 

  3. Dong, X., Bocko, M.F., Ignjatovic, Z.: Data Hiding Via Phase Manipulation of Audio Signals. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2004), vol. 5, pp. 377–380 (2004) ISBN 0-7803-8484-9

    Google Scholar 

  4. Erten, G., Salam, F.: Voice Output Extraction by Signal Separation. In: ISCAS 1998, vol. 3, pp. 5–8 (1998) ISBN 07803-4455-3

    Google Scholar 

  5. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000) ISBN 978-1-58053-035-4

    Google Scholar 

  6. Arnold, M.: Audio watermarking: Features, applications and algorithms. In: IEEE International Conference on Multimedia and Expo, New York, vol. 2, pp. 1013–1016 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mondal, U.K., Mandal, J.K. (2011). A Fourier Transform Based Authentication of Audio Signals through Alternation of Coefficients of Harmonics (FTAT). In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Advances in Parallel Distributed Computing. PDCTA 2011. Communications in Computer and Information Science, vol 203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24037-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24037-9_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24036-2

  • Online ISBN: 978-3-642-24037-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics