Advertisement

A Novel Non-repudiate Scheme with Voice FeatureMarking

  • A. R. Remya
  • M. H. Supriya
  • A. Sreekumar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 246)

Abstract

A digital watermark is the type of latent indicator secretly embedded in a noise-tolerant signal such as audio or image data. It is typically used to identify the ownership or copyright of material. “Watermarking” is the process of hiding digital information in a carrier signal in order to confirm the authenticity or integrity of the carrier signal as well as show the identity of its owners. Since a digital copy of data is the same as the original, digital watermarking is a passive protection tool. This technique simply marks the signal with the data neither it degrades nor it controls access to the data, thereby securing the communication. The proposed system introduces a novel non-repudiate scheme to ensure the ownership of every audio communication. This method embeds the prepared watermark in the transform domain of the audio signal using the fast Walsh transforms. Watermark used in this technique is unique for each member, and thus, it provides additional authenticity in every communication compared to state of the art.

Keywords

Digital watermarking Non-repudiation FeatureMarking Walsh transforms 

Notes

Acknowledgments

This work was funded by the Department of Science and Technology, Government of India, under the INSPIRE Fellowship (IF110085).

References

  1. 1.
    Katzenbeisser Stefan and APP Fabien. Information hiding techniques for steganography and digital watermarking. Artech House, London, UK (2000)Google Scholar
  2. 2.
    Kaliappan Gopalan. Audio steganography by cepstrum modification. In Acoustics, Speech, and Signal Processing, 2005. Proceedings.(ICASSP’05). IEEE International Conference on, volume 5, pages v–481. IEEE (2005)Google Scholar
  3. 3.
    Kaliappan Gopalan. Robust watermarking of music signals by cepstrum modification. In Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on, pages 4413–4416. IEEE (2005)Google Scholar
  4. 4.
    Christian Kraetzer and Jana Dittmann. Mel-cepstrum based steganalysis for voip- steganography. Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents IX, 6505:650505–1 (2007)Google Scholar
  5. 5.
    Ingo Mierswa and Katharina Morik. Automatic feature extraction for classifying audio data. Machine learning, 58(2-3):127–149 (2005)Google Scholar
  6. 6.
    Tom Coffey and Puneet Saidha. Non-repudiation with mandatory proof of receipt. ACM SIGCOMM Computer Communication Review, 26(1):6–17 (1996)Google Scholar
  7. 7.
    Steve Kremer, Olivier Markowitch, and Jianying Zhou. An intensive survey of fair non-repudiation protocols.Computer communications, 25(17):1606–1621 (2002)Google Scholar
  8. 8.
    Paraskevi Bassia, Ioannis Pitas, and Nikos Nikolaidis. Robust audio watermarking in the time domain. Multimedia, IEEE Transactions on, 3(2):232–241 (2001)Google Scholar
  9. 9.
    Mitchell D Swanson, Bin Zhu, Ahmed H Tewfik, and Laurence Boney. Robust audio watermarking using perceptual masking. Signal Processing, 66(3):337–355 (1998)Google Scholar
  10. 10.
    Sang-Kwang Lee and Yo-Sung Ho.Digital audio watermarking in the cepstrum domain. Consumer Electronics, IEEE Transactions on, 46(3):744–750 (2000)Google Scholar
  11. 11.
    Nedeljko Cvejic and Tapio Seppänen. Spread spectrum audio watermarking using frequency hopping and attack characterization. Signal processing, 84(1):207–213 (2004)Google Scholar
  12. 12.
    In-Kwon Yeo and Hyoung Joong Kim. Modified patchwork algorithm: A novel audio watermarking scheme. Speech and Audio Processing, IEEE Transactions on, 11(4):381–386 (2003)Google Scholar
  13. 13.
    Andreas Spanias, Ted Painter, and Venkatraman Atti. Audio signal processing and coding. Wiley-Interscience (2006)Google Scholar
  14. 14.
    Xu, Xiaojuan, Hong Peng, and Chengyuan He. “DWT-based audio watermarking using support vector regression and subsampling.” Applications of Fuzzy Sets Theory. Springer Berlin Heidelberg, 136–144 (2007)Google Scholar
  15. 15.
    Mali, Manisha D., and S. R. Khot. “Robustness Test Analysis of Histogram Based Audio Watermarking.” Wireless Networks and Computational Intelligence. Springer Berlin Heidelberg, 611–620 (2012)Google Scholar
  16. 16.
    Lin, Yiqing, and Waleed H. Abdulla. “Multiple scrambling and adaptive synchronization for audio watermarking.” Digital watermarking. Springer Berlin Heidelberg, 440–453 (2008)Google Scholar
  17. 17.
    Chong Wang, Xiaohong Ma, Xiangping Cong, Fuliang Yin, “An Audio Watermarking Scheme with Neural Network”, Advances in Neural Networks—ISNN 2005, Lecture Notes in Computer Science Volume 3497, pp 795–800 (2005)Google Scholar
  18. 18.
    MathWorks | Accelerating the pace of engineering and science http://www.mathworks.com/

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of Computer ApplicationsCochin University of Science and TechnologyKochiIndia
  2. 2.Department of ElectronicsCochin University of Science and TechnologyKochiIndia

Personalised recommendations