scholarly journals High Payload Qr-Based Data Hiding Using Secured Compressed Watermark in Polar Domain

2021 ◽  
Author(s):  
Indrarini Dyah Irawati ◽  
Gelar Budiman ◽  
Kholidiyah Masykuroh ◽  
Zein Hanni Pradana ◽  
Arfianto Fahmi

Audio Watermarking is a method to insert a copyright marker on audio. This method inserts a watermark in the information form and in a way that does not damage the audio. This technique is one of the ways to solve the problem of copyright infringement. The embedded watermark has to meet the condition of not damaging the audio and must have robustness, imperceptibility, and good capacity. The data hiding technique use the combined method of Lifting Wavelet Transform (LWT), Fast Fourier Transform (FFT), QR Decomposition and Reconstruction, and Cartesian-Polar Transformation (CPT) based on Quantization Index Modulation (QIM) with the secured and compressed watermark using Compressive Sampling (CS) technique. The proposed scheme is blind Audio Watermarking as it no needs for original audio in the detection process. The combination of methods overcomes multiple attacks with guaranteed quality watermarking and high capacity. Compared to the existing technique, the data hiding technique can withstand LPF attacks, Resampling, Linear speed change (LSC), and MP3 compression. This proposed technique is also secured due to the coded watermark by a particular random key using CS. Combining CS and Audio Watermarking techniques can perform well in capacity, imperceptibility, security, and attack resistance.

2019 ◽  
Vol 19 (1) ◽  
pp. 20
Author(s):  
Irma Safitri ◽  
Gelar Budiman ◽  
Arfidianti Kartika Meiza Putri

Abuse is not only done to copy or distribute data but also to the digital copyright labels. There is a way to protect data by inserting or hiding a piece of certain information, namely a watermarking technique. In this paper, we propose audio watermarking with Quantization Index Modulation (QIM) method as an embedding process combined with Compressive Sampling (CS), Discrete Sine Transform (DST) and QR decomposition. Binary image is used as a watermark inserted in host audio. DST is used for transformation process from time domain to frequency domain, while QR is used to decompose onedimension matrix into two-dimension matrix. Meanwhile, CS is used to obtain the compressed watermark file which is done before the embedding process. QIM method is used to embed the watermark file to the audio host file. Simulation results indicated that the proposed audio watermarking technique has good robustness against some attacks such as Low Pass Filter (LPF), resampling and linear speed change. In addition, it provides good performance in terms of imperceptibility with Signal to Noise Ratio (SNR) > 20 dB and capacity C = 689 bps.


Entropy ◽  
2020 ◽  
Vol 22 (2) ◽  
pp. 145
Author(s):  
Jung-Yao Yeh ◽  
Chih-Cheng Chen ◽  
Po-Liang Liu ◽  
Ying-Hsuan Huang

Data hiding is the art of embedding data into a cover image without any perceptual distortion of the cover image. Moreover, data hiding is a very crucial research topic in information security because it can be used for various applications. In this study, we proposed a high-capacity data-hiding scheme for absolute moment block truncation coding (AMBTC) decompressed images. We statistically analyzed the composition of the secret data string and developed a unique encoding and decoding dictionary search for adjusting pixel values. The dictionary was used in the embedding and extraction stages. The dictionary provides high data-hiding capacity because the secret data was compressed using dictionary-based coding. The experimental results of this study reveal that the proposed scheme is better than the existing schemes, with respect to the data-hiding capacity and visual quality.


Author(s):  
RENDY DWI RENDRAGRAHA ◽  
GELAR BUDIMAN ◽  
IRMA SAFITRI

ABSTRAKAudio watermarking adalah teknik memasukkan informasi ke dalam file audio dan untuk melindungi hak cipta data digital dari distribusi ilegal. Makalah ini memperkenalkan audio stereo watermarking berdasarkan Quantization Index Modulation (QIM) dengan teknik gabungan Discrete Cosine Transform (DCT) - QRCartesian Polar Transform (CPT). Host audio dibagi menjadi beberapa frame, selanjutnya setiap frame ditransformasi oleh DCT, kemudian output DCT diuraikan menjadi matriks orthogonal dan matriks segitiga menggunakan metode QR. Selanjutnya, CPT mengubah dua koefisien kartesian dari matriks segitiga (R) pada posisi (1,1) dan (2,2) menjadi koefisien polar. Setelah itu, penyisipan dilakukan pada koefisien polar oleh QIM. Hasil simulasi menunjukkan bahwa imperseptibilitas audio terwatermark berkualitas baik dengan Signal to Noise Ratio (SNR)> 20, Mean Opinion Score (MOS)> 4 dan tahan terhadap serangan seperti Low Pass Filter (LPF) dan Band Pass Filter (BPF) dengan cut off 25-6k, resampling, Linear Speed Change (LSC) dan MP3 Compression dengan rate diatas 64 kbps.Kata kunci: Audio Watermarking, CPT, DCT, QIM, QR ABSTRACTAudio watermarking is a technique for inserting information into an audio file and to protect the copyright of digital data from illegal distribution. This paper introduces a stereo audio watermarking based on Quantization Index Modulation (QIM) with combined technique Discrete Cosine Transform (DCT) – QR – Cartesian Polar Transform (CPT). Each frame of a host audio is transformed by DCT, then DCT output is decomposed using QR method. Next, CPT transform two cartesian coefficients from triangular matrix (R) in position (1,1) and (2,2) to polar coefficients. After that, embedding is executed on polar coefficients by QIM. The simulation result shows that the imperceptibility is good with Signal to Noise Ratio (SNR)>20, Mean Opinion Score (MOS)>4 and it is robust against attacks such as Low Pass Filter (LPF) and Band Pass Filter (BPF) with cut off 25-6k, Resampling, Linear Speed Change and MP3 Compression with rate 64 kbps and above. Keywords: Audio Watermarking, CPT, DCT, QIM, QR


Author(s):  
IRMA SAFITRI ◽  
NUR IBRAHIM ◽  
HERLAMBANG YOGASWARA

ABSTRAKPenelitian ini mengembangkan teknik Compressive Sensing (CS) untuk audio watermarking dengan metode Lifting Wavelet Transform (LWT) dan Quantization Index Modulation (QIM). LWT adalah salah satu teknik mendekomposisi sinyal menjadi 2 sub-band, yaitu sub-band low dan high. QIM adalah suatu metode yang efisien secara komputasi atau perhitungan watermarking dengan menggunakan informasi tambahan. Audio watermarking dilakukan menggunakan file audio dengan format *.wav berdurasi 10 detik dan menggunakan 4 genre musik, yaitu pop, classic, rock, dan metal. Watermark yang disisipkan berupa citra hitam putih dengan format *.bmp yang masing-masing berukuran 32x32 dan 64x64 pixel. Pengujian dilakukan dengan mengukur nilai SNR, ODG, BER, dan PSNR. Audio yang telah disisipkan watermark, diuji ketahanannya dengan diberikan 7 macam serangan berupa LPF, BPF, HPF, MP3 compression, noise, dan echo. Penelitian ini memiliki hasil optimal dengan nilai SNR 85,32 dB, ODG -8,34x10-11, BER 0, dan PSNR ∞.Kata kunci: Audio watermarking, QIM, LWT, Compressive Sensing. ABSTRACTThis research developed Compressive Sensing (CS) technique for audio watermarking using Wavelet Transform (LWT) and Quantization Index Modulation (QIM) methods. LWT is one technique to decompose the signal into 2 sub-bands, namely sub-band low and high. QIM is a computationally efficient method or watermarking calculation using additional information. Audio watermarking was done using audio files with *.wav format duration of 10 seconds and used 4 genres of music, namely pop, classic, rock, and metal. Watermark was inserted in the form of black and white image with *.bmp format each measuring 32x32 and 64x64 pixels. The test was done by measuring the value of SNR, ODG, BER, and PSNR. Audio that had been inserted watermark was tested its durability with given 7 kinds of attacks such as LPF, BPF, HPF, MP3 Compression, Noise, and Echo. This research had optimal result with SNR value of 85.32 dB, ODG value of -8.34x10-11, BER value of 0, and PSNR value of ∞.Keywords: Audio watermarking, QIM, LWT, Compressive Sensing.


2018 ◽  
Vol 30 (10) ◽  
pp. 1954
Author(s):  
Xiangguang Xiong ◽  
Yongfeng Cao ◽  
Weihua Ou ◽  
Bin Liu ◽  
Li Wei ◽  
...  

2021 ◽  
pp. 1-11
Author(s):  
Kusan Biswas

In this paper, we propose a frequency domain data hiding method for the JPEG compressed images. The proposed method embeds data in the DCT coefficients of the selected 8 × 8 blocks. According to the theories of Human Visual Systems  (HVS), human vision is less sensitive to perturbation of pixel values in the uneven areas of the image. In this paper we propose a Singular Value Decomposition based image roughness measure (SVD-IRM) using which we select the coarse 8 × 8 blocks as data embedding destinations. Moreover, to make the embedded data more robust against re-compression attack and error due to transmission over noisy channels, we employ Turbo error correcting codes. The actual data embedding is done using a proposed variant of matrix encoding that is capable of embedding three bits by modifying only one bit in block of seven carrier features. We have carried out experiments to validate the performance and it is found that the proposed method achieves better payload capacity and visual quality and is more robust than some of the recent state-of-the-art methods proposed in the literature.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Xi-Yan Li ◽  
Xia-Bing Zhou ◽  
Qing-Lei Zhou ◽  
Shi-Jing Han ◽  
Zheng Liu

With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret information in the encrypted image. With the information hiding key, a receiver can extract the embedded data from the hidden image; with the encryption key, the receiver reconstructs the original image. In this paper, we can embed data in the form of random bits or scanned documents. The proposed method takes full advantage of the spatial correlation in the original images to vacate the room for embedding information before image encryption. By jointly using Sudoku and Arnold chaos encryption, the encrypted images retain the vacated room. Before the data hiding phase, the secret information is preprocessed by a halftone, quadtree, and S-BOX transformation. The experimental results prove that the proposed method not only realizes high-capacity reversible data hiding in encrypted images but also reconstructs the original image completely.


Sign in / Sign up

Export Citation Format

Share Document