Enhanced Watermark Detection Model Based Echo Hiding Technique

نویسندگان

  • MOHAMED TARHDA
  • LAAMARI HLOU
چکیده

Initially, Internet was a tool in the world of research and science. Information was exchanged between universities and institutions and contributed to deepen our knowledge. Today, the explosion of popularity of the World Wide Web has accelerated the development of the Internet as an information and communication resource for consumers and businesses. It has become a great way to communicate exchange, work, meet, learn and even trade. However, Piracy has also grown and causes much more harm to the intellectual property owners, who found themselves losing the revenue that would have been gained if they had the legitimate product been purchased. To fight piracy and contribute to intellectual properties protection digital watermarking researchers develop many techniques to hide special signals into original digital content in such a way that it would be used as a proof to support ownership claims. These techniques are related to text, image, video and audio contents. In this paper, we completed a non-blind audio watermarking design based on echo hiding technique. To achieve this, the audio signal of a music recording, an audio book or a commercial is slightly modified by introducing echoes with appropriate delays. In detection process, we used polynomial-based scheme as an alternative to cepstrum-based one that is commonly used in literature [1]. In our method, the quality of watermarked audio tracks is enhanced as the echo is much more attenuated in comparison to the classical echo hiding approaches. The bit rate of the embedded information is increased as both attenuations and delays could be used for embedding watermarks. Simulations show good detection results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Audio watermarking in sub-band signals using multiple echo kernels

Very recently, we proposed an echo hiding technique in subband signals, which decomposes the low frequency sub-band signal repetitively using wavelet transform, and then inserts one of two different echoes in specific sub-band signal according to the watermark bit to be embedded. Since this technique takes into account the frequency characteristics of audio signal, it has better performances, i...

متن کامل

Programmable Logic Implementation of Echo Hiding for Audio Watermarking

Currently, distribution, and marketing copy music files are very common activities due to free internet connection that facilitates this. To solve this problem, digital watermarking is proposed. In this paper we propose an accurate and content based algorithm for embedding and detecting watermarks within audio signals. The algorithm is based on a new implementation of echo hiding technique for ...

متن کامل

Hiding correlation-based watermark templates using secret modulation

A possible solution to the difficult problem of geometrical distortion of watermarked images in a blind watermarking scenario is to use a template grid in the autocorrelation function. However, the important drawback of this method is that the watermark itself can be estimated and subtracted, or the peaks in the Fourier magnitude spectrum can be removed. A recently proposed solution is to modul...

متن کامل

Capacity-security analysis of data hiding technologies

In this paper we consider the problem of joint capacitysecurity analysis of data hiding technologies from the communications point of view. First, we formulate data hiding as an optimal encoding problem for different operational regimes, that include both robust digital watermarking and steganography. This provides the corresponding estimation of the hidden data statistics, as well as of the ra...

متن کامل

Keyless Public Watermarking for Intellectual Property Authentication

A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard problems. It provides desirable proof of authorship without rendering the intellectual properties useless. However, it makes the watermark detection, which is as important as watermarking, a NP-hard problem. We propose a keyles...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014