A Robust Audio Watermarking Technique Operates in MDCT Domain based on Perceptual Measures
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
the review presents a digital audio watermarking technique operating in the frequency domain with two variants. This technique uses the Modified Discrete Cosine Transform (MDCT) to move to the frequency domain. To ensure more inaudibility, we exploited the proprieties of the psychoacoustic model 1 (PMH1) of MPEG1 encoder layer I in the first variant and those of psychoacoustic model 2 (PMH2) of MPEG1 encoder Layer III in the second alternative to search the places for insertion of the watermark. In both variants of the technique, the bits of the mark will be duplicated to increase the capacity of insertion then inserted into the least significant bit (LSB). For more reliability in the detection phase, we use an error correction code (Hamming) on the mark. Next, to analyze the performance of the proposed technique, we perform two comparative studies. In the first, we compare the proposed digital audio watermarking technique with her two variants and those achieved by Luigi Rosa and Rolf Brigola, ‘which we download the M-files of each’. The technique developed by Luigi Rosa operates in the frequency domain but using the Discrete Cosine Transform (DCT) as transformation and that proposed by Rolf Brigola uses the Fast Fourier Transform (FFT). We studied the robustness of each technique against different types of attacks such as compression / decompression MP3, stirmark audio attack and we evaluated the inaudibility by using an objective approach by calculating the SNR and the ODG notes given by PEAQ. The robustness of this technique is shown against different types of attacks. In the second, we prove the contribution of the proposed technique by comparing the payload data, imperceptibility and robustness against attack MP3 with others existing techniques in the literature.
Authors and Affiliations
Maha Bellaaj, Kais Ouni
An Analysis of Cloud Computing Adoption Framework for Iraqi e-Government
This paper presents an analysis of the factors which could have possible affect over the adoption of cloud computing via the Iraqi e-government. A conceptual framework model for cloud computing within Iraqi e-government...
SAS: Implementation of scaled association rules on spatial multidimensional quantitative dataset
Mining spatial association rules is one of the most important branches in the field of Spatial Data Mining (SDM). Because of the complexity of spatial data, a traditional method in extracting spatial association rules is...
Scalable Hybrid Speech Codec for Voice over Internet Protocol Applications
With the advent of various web-based applications and the fourth generation (4G) access technology, there has been an exponential growth in the demand of multimedia service delivery along with speech signals in a voice o...
A Comparative Study of Databases with Different Methods of Internal Data Management
The purpose of this paper is to present a comparative study between a non-relational MongoDB database and a relational Microsoft SQL Server database in the case of an unstructured representation of data, in XML or JSON f...
The P System Design Method based on the P Module
Membrane computing is a kind of biocomputing model. At present, the main research areas of membrane computing are computational models and P system design. With the expansion of the P system scale, how to rapidly constru...