International Journal of Speech Technology

, Volume 20, Issue 4, pp 951–958 | Cite as

High payload multi-channel dual audio watermarking algorithm based on discrete wavelet transform and singular value decomposition

  • A. R. Elshazly
  • M. E. Nasr
  • M. M. Fouad
  • F. S. Abdel-Samie


Digital watermarking technology is concerned with solving the problem of copyright protection, data authentication, content identification, distribution, and duplication of the digital media due to the great developments in computers and Internet technology. Recently, protection of digital audio signals has attracted the attention of researchers. This paper proposes a new audio watermarking scheme based on discrete wavelet transform (DWT), singular value decomposition (SVD), and quantization index modulation (QIM) with a synchronization code embedded with two encrypted watermark images or logos inserted into a stereo audio signal. In this algorithm, the original audio signal is split into blocks, and each block is decomposed with a two-level DWT, and then the approximate low-frequency sub-band coefficients are decomposed by SVD transform to obtain a diagonal matrix. The prepared watermarking and synchronization code bit stream is embedded into the diagonal matrix using QIM. After that, we perform inverse singular value decomposition (ISVD) and inverse discrete wavelet transform (IDWT) to obtain the watermarked audio signal. The watermark can be blindly extracted without knowledge of the original audio signal. Experimental results show that the transparency and imperceptibility of the proposed algorithm is satisfied, and that robustness is strong against popular audio signal processing attacks. High watermarking payload is achieved through the proposed scheme.


Audio watermarking Digital rights management (DRM) Discrete wavelet transform (DWT) Singular value decomposition (SVD) Imperceptibility Robustness 


  1. Abd El-Samie, F. E. (2009). An efficient singular value decomposition algorithm for digital audio watermarking. International Journal of Speech Technology, 12(1), 27–45.CrossRefGoogle Scholar
  2. Al-Haj, A., & Mohammad, A. (2010). Digital audio watermarking based on the discrete wavelets transform and singular value decomposition. European Journal of Scientific Research, 39, 6–21.Google Scholar
  3. Al-Haj, A., Mohammad, A., & Bata, L. (2011). DWT-based audio watermarking. The International Arab Journal of Information Technology, 8, 326–333.Google Scholar
  4. Ali, A. H., & Ahmad, M. (2010). Digital audio watermarking based on the discrete wavelet transform and singular value decomposition. European Journal of Scientific Research, 39(1), 6–21.Google Scholar
  5. Al-Yaman, M. S., Al-Taee, M. A., & Alshammas, H. A. (2012). Audio-watermarking based ownership verification system using enhanced DWT-SVD technique. In Proceedings of the 9th international multi-conference on systems, signals and devices (SSD’12), Chemnitz, March 20–23.Google Scholar
  6. Al-Yaman, M. S., Al-Taee, M. A., Shahrour, A. T., & Al-Husseini, I. A. (2011). Biometric based audio ownership verification using discrete wavelet transform and SVD techniques. In Proceedings of the 8th international multi-conference on systems, signals and devices (SSD’11), Sousse, March 22–25.Google Scholar
  7. Bao, F., Samarati, P., & Zhou, J. (2012). Applied cryptography and network security. In 10th International conference, ACNS 2012, Singapore, June 26–29.Google Scholar
  8. Bhat, V. K., Sengupta, I., & Das, A. (2010). An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digital Signal Processing, 20(6), 1547–1558.CrossRefGoogle Scholar
  9. Chen, B., & Wornell, G.W. (2001). Quantization index modulation methods for digital watermarking and information embedding of multimedia. Journal of VLSI Signal Processing 27, 7–33.CrossRefzbMATHGoogle Scholar
  10. Chen, S. T., Wu, G. D., & Huang, H. N. (2010). Wavelet-domain audio watermarking scheme using optimization-based quantization. IET Signal Processing, 4(6), 720–727.CrossRefGoogle Scholar
  11. Cox, I. J., Miller, M. L., & Bloom, J. A. (2000). Watermarking applications and their properties. In International conference on information technology 2000, Las Vegas.Google Scholar
  12. Elshazly, A. R., Fouad, M. M., & Nasr, M. E. (2012). Secure and robust high quality DWT domain audio watermarking algorithm with binary image. In Computer engineering and systems (ICCES), 2012, seventh international conference on IEEE.Google Scholar
  13. Gonz´alez, F. P., & Hern´andez, J. R. (1999). A tutorial on digital watermarking. In Proceedings of IEEE 33rd annual 1999 international carnahan conference on security technology, Madrid, October 5–7.Google Scholar
  14. Hossain, M. A., Islam, M. S., & Ali, M. S. (2012). Performance analysis of baker code based on their correlation property in multiuser environment. International Journal of Information Sciences and Techniques (IJIST), 2, 1.Google Scholar
  15. Kaushik, S., & Singhal, A. (2012). Network security using cryptographic techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 2, 12.Google Scholar
  16. Khaldi, K., & Boudraa, A. O. (2013). “Audio watermarking via EMD. IEEE Transactions on Audio, Speech and Language Processing, 21(3), 675–680.CrossRefGoogle Scholar
  17. Kumar, P. K., & Shimamura, T. (2014). Audio watermarking in transform domain based on singular value decomposition and Cartesian-polar transformation. International Journal of Speech Technology, 17(2), 133–144.CrossRefGoogle Scholar
  18. Lalitha, N. V., Suresh, G., & Sailiaja, V. (2011). Improved audio watermarking using DWT-SVD. International Journal of Scientific & Engineering Research, 2, 6.Google Scholar
  19. Megha, K. D., Vaidya, N. P., & Patel, K. (2013). Digital watermarking: Data hiding techniques using DCT-DWT algorithm. International Journal of Advanced Research in Computer and Communication Engineering, 2, 6.Google Scholar
  20. Megías, D., Serra-Ruiz, J., & Fallahpour, M. (2010). Efficient self-synchronized blind audio watermarking system based on time domain and FFT amplitude modification. Signal Processing, 90(12), 3078–3092.CrossRefzbMATHGoogle Scholar
  21. Mitali, V., Kumar, & Sharma, A. (2014). A survey on various cryptography techniques. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 3, 4.Google Scholar
  22. Ozer, H., Sankur, B., & Memon, N. (2005). An SVD-based audio watermarking technique, In Proceedings of the 7th ACM workshop on multimedia and security, pp. 51–56.Google Scholar
  23. Saini, L. K., & Shrivastava, V. (2014). A survey of digital watermarking techniques and its applications. International Journal of Computer Science Trends and Technology (IJCST), 2, 3.Google Scholar
  24. Singh, P., & Chadha, R. S. (2013). A survey of digital watermarking techniques, applications and attacks. International Journal of Engineering and Innovative Technology (IJEIT), 2(9), 165–175.Google Scholar
  25. Singh, V. (2011). Digital watermarking: A tutorial. Journal of Selected Areas in Telecommunications (JSAT), 2, 10–21.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  • A. R. Elshazly
    • 1
  • M. E. Nasr
    • 2
  • M. M. Fouad
    • 1
  • F. S. Abdel-Samie
    • 3
  1. 1.Electronics and Electrical Communication DepartmentZagazig UniversityZagazigEgypt
  2. 2.Electronics and Electrical Communication DepartmentTanta UniversityTantaEgypt
  3. 3.Electronics and Electrical Communication DepartmentMenoufyia UniversityMenoufEgypt

Personalised recommendations