Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT)

  • Uttam Kr. Mondal
  • Jyotsna Kumar Mandal
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)


In this paper, an algorithm has been proposed to provide security to digital songs through wavelet transform with the help of a secure image embedded with coefficients of it without changing audible quality. Sampling the hidden image with the help of amplitude coding for generating lower magnitude values is the first phase of proposed technique followed by fabrication of authenticating code by embedding into lower magnitude values with selected coefficients of song signal generated via wavelet transform [symmetrization mode]. The embedded hidden secure image as well as authenticating code is used to detect and identify the original song from similar available songs. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (“.wav”) stereo sound file.


Average absolute difference (AD) maximum difference (MD) mean square error (MSE) normalized average absolute difference (NAD) normalized mean square error (NMSE) sampling image wavelet transform 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Mondal, U.K., Mandal, J.K.: A Practical Approach of Embedding Secret Key to Authenticate Tagore Songs(ESKATS). In: Wireless Information Networks & Business Information System Proceedings (WINBIS 2010), vol. 6(1), pp. 67–74. Rural Nepal Technical Academy (Pvt.) Ltd., Nepal (2010) ISSN 2091-0266Google Scholar
  2. 2.
    Mondal, U.K., Mandal, J.K.: A Novel Technique to Protect Piracy of Quality Songs through Amplitude Manipulation (PPAM). In: International Symposium on Electronic System Design (ISED 2010), pp. 246–250 (2010) ISBN 978-0-7695-4294-2Google Scholar
  3. 3.
    Xiaoxiao, D., Mark, F., Bocko, Z.I.: Data Hiding Via Phase Manipulation of Audio Signals. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2004), vol. 5, pp. 377–380 (2004) ISBN 0-7803-8484-9Google Scholar
  4. 4.
    Erten, G., Salam, F.: Voice Output Extraction by Signal Separation. In: ISCAS 1998, vol. 3, pp. 5–8 (1998) ISBN 07803-4455-3Google Scholar
  5. 5.
    Pohl, C., Van Genderen, J.L.: Multisensor image fusion in remote sensing concepts, methods and applications. International Journal of Remote Sensing 19(5), 823–854 (1998)CrossRefGoogle Scholar
  6. 6.
    Arnold, M.: Audio watermarking: Features, applications and algorithms. In: IEEE International Conference on Multimedia and Expo., New York, NY, vol. 2, pp. 1013–1016 (2000)Google Scholar
  7. 7.
    Ioannidou, S., Karathanassi, V., Sarris, A.: The optimum wavelet-based fusion method for urban area mapping. In: WSEAS International Conference on Environment, Ecosystems and Development (2005)Google Scholar
  8. 8.
    Mondal, U.K., Mandal, J.K.: Generation and Fabrication of Authenticated Song Signal through Preserving Balance Ratio of Song’s Components (BRSAS). In: International Conference on Communication and Industrial Application (ICCIA 2011), Kolkata, India, December 26-28 (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Dept. of CSE & ITCollege of Engg. & Management, KolaghatMidnapurIndia
  2. 2.Dept. of CSEUniversity of KalyaniNadiaIndia

Personalised recommendations