Performance Evaluation of Audio Watermarking Algorithms Using DWT and LFSR

  • Ramesh ShelkeEmail author
  • Milind Nemade
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 30)


Advancement in Internet technology has compelled encryption, copyright protection and authentication of audios, videos, images, and documents. Watermarking techniques have been widely employed in copyright protection and authentications of digital media. Digital image watermarking techniques are extensively explored and found suitable for copyright protection of images, whereas audio watermarking techniques are less studied and need extensive research due to superior hearing ability of the human beings. In this paper, we present audio watermarking technique using discrete wavelet transform (DWT) and linear feedback shift registers (LFSR). Watermark signal is obtained using LFSR technique before embedding into audio signal. Dispersion of maximum power spectral density property of LFSR is explored that makes it suitable as scramblers. LFSR does not require secret key for scrambling and descrambling of watermark signal. Sequences were embedded into the DWT coefficients of the audio signal. Experimental simulations were performed to evaluate the performance of the audio watermarking technique. Audio watermarking finds applications in the area of ownership protection, tamper detection and authentication of music, military communication, voice-activated machines, and robots.


Audio watermarking algorithm LFSR Signal processing attacks 


  1. 1.
    Shanshan Li, Tingting Liu, Kun Bao, Ruijuan Qiao (2014) The study on the validity and reliability of digital audio watermarking. Comput Secur 2:34–36Google Scholar
  2. 2.
    Kob S, Nishimura R, Suzuki Y (2005) Time-spread echo method for digital audio water-marking. IEEE Trans Multimedia 7(2):212–221CrossRefGoogle Scholar
  3. 3.
    Radha N, Venkatesulu M (2012) A chaotic block cipher for real-time multimedia. J Comput Sci 8(6):994–1000 CrossRefGoogle Scholar
  4. 4.
    Rahman MdM, Saha TK, Bhuiyan MdAA (2012) Implementation of RSA algorithm for speech data encryption and decryption. Int J Comput Sci Netw Sec 12(3):74–82Google Scholar
  5. 5.
    Kumar Singh, B, Tsegaye A, Singh J (2017) Probabilistic data encryption using elliptic curve cryptography and arnold transformation. In: IEEE international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), pp 644–651Google Scholar
  6. 6.
    Elshazly AR et al (2016) Synchronized double watermark audio watermarking scheme based on a transform domain for stereo signals. In: IEEE fourth international ja-pan-egypt conference on electronics, communications and computersGoogle Scholar
  7. 7.
    Balamurugan R, Kamalakannan V, Rahul Ganth D, Tamilselvan S (2014) Enhancing security in text messages using matrix based mapping and elgamal method in El-liptic curve cryptography. In: IEEE international conference on contemporary computing and informatics, pp 103–106Google Scholar
  8. 8.
    Xiang Y, Natgunanathan I, Peng D, Zhou W, Yu S (2012) A dual-channel time-spread echo method for audio watermarking. IEEE Trans Inf Forensics Sec 7(2):383–392CrossRefGoogle Scholar
  9. 9.
    Kang H, Yamaguchi K, Kurkoski B, Yamaguchi K, Kobayashi K (2008) Full-index-embedding patchwork algorithm for audio watermarking. IEICE Trans Inf Syst, E91–D(11):2731–2734CrossRefGoogle Scholar
  10. 10.
    Menezes AJ, van Oorschot PC, Vanstone SA (2001) Handbook of applied cryptography, 5th edn, CRC PressGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Faculty of EngineeringPacific Academy of Higher Education and Research UniversityUdaipurIndia
  2. 2.Department of Electronics EngineeringK. J. Somaiya Institute of Engineering and Information TechnologyMumbaiIndia

Personalised recommendations