ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

AUDIO WATER MARKING USING DISCRETE WAVELET TRANSFORM AND HAMMING WINDOWING TECHNIQUE

Journal: International Journal of Mechanical and Production Engineering Research and Development (IJMPERD ) (Vol.8, No. 3)

Publication Date:

Authors : ; ;

Page : 1097-1104

Keywords : Audio Watermarking; Copyright Protection; Discrete Wavelet Transform & Hamming Window;

Source : Download Find it from : Google Scholarexternal

Abstract

Wireless networks expanded its applications in our day to day life. The wireless networks are open medium and hence are vulnerable to various security attacks. Here, we discuss about one of the multimedia data i.e., audio data. In this modern world audio watermarking is very much important in voice communication for real time application like transferring confidential information between officials to maintain secrecy etc., The practical challenges for watermarking includes requirement analysis, fast, robustness, imperceptibility and robustness. The watermarking applications can be divided into hardware based watermarking systems and software based watermarking systems. The watermarking hardware chip can be integrated with TV setup box, mobile phone, digital camera. The software based watermarking systems are more popular, easy to implement and cheaper. The general applications of watermarking includes copyright protection, authentication, fingerprinting, annotation watermarking, source tracking, integrity protection, broadcast monitoring, enforcement of usage policy. In this paper, an audio watermarking algorithm based on DWT and hamming windowing technique can be used for protecting intellectual properties from unauthorized copying is proposed. This paper deals about embedding an image into audio. The algorithm uses the discrete wavelet transform(DWT), image decomposition techniques and hamming windowing techniques. It embeds the watermarking pixel's value inside the wavelet coefficient of host audio. The watermarked audio signal and the original audio signal resembled each other closely. Experimental results illustrated that the proposed approach is able to withstand the various security attacks.. KEYWORDS: Audio

Last modified: 2018-09-18 20:53:49