- Book author
- Krunal N. Patel
This book discusses digital audio watermarking copyright assurance. The author first outlines the topic of watermarking data that can be used for copyright assurance that incorporates text messages, copyright audio, handwritten text, logo and cell phone numbers. The objective of this book is to propose a new algorithm that can embed and extract the watermarking information. The execution of the newly proposed algorithm is surveyed by testing data utilizing a group of various audio file types and against various attacks. The book also presents a new digital watermark algorithm that preserves the copyright property of the audio files. To do this, the author uses two techniques -- DWT and SVD -- with the combination of other techniques (DFT and DSSS) to enhance security and also provide high robustness and imperceptibility against various malicious attacks.
SpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 125 pages, the series covers a range of content from professional to academic. Typical topics might include:
- A timely report of state-of-the-art analytical techniques
- A bridge between new research results, as published in journal articles, and a
contextual literature review
- A snapshot of a hot or emerging topic
- An in-depth case study or clinical example
- A presentation of core concepts that students must understand in order to make
Briefs are characterized by fast, global electronic dissemination, standard pub- lishing contracts, standardized manuscript preparation and formatting guidelines, and expedited production schedules.
The goal of theSpringerBriefs in Speech Technology series is to serve as an important reference guide for speech developers, system designers, speech engineers and other professionals in academia, government and the private sector. To accom- plish this task, the series will showcase the latest findings in speech technology, ranging from a comparative analysis of contemporary methods of speech parame- terization to recent advances in commercial deployment of spoken dialog systems.
** Indexing: books in this series are indexed in Scopus **
Today, the use of digital data like image, audio, and video is tremendously increas- ing due to the advancement in technology and the Internet revolution. With these advancements, attaining one’s ownership and copyrights for this digital data is the biggest challenge. Digital watermarking is one of the technique to attain one’s ownership and copyrights securely. It is the technique in which the owner’s copy- right information can be embedded into the original media in the form of an image, audio, text, or video. There are two main factors we need to observe for digital audio watermarking to maintain the robustness as well as imperceptibility against piracy, malicious attacks, and various transformation operations. Though there are many challenges to achieve these results, there are two approaches presented for audio watermarking that are used to improve the robustness, and imperceptibility of the embedded information with security. To provide the security, DSSS Encryption and Decryption algorithm is used which is based on synchronized secret key concept along with DWT, DFT and SVD transformation methods. DWT (Discreet Wavelet Transformation) is used up to the fourth level to get the lowest frequency sub-band and after that DFT is applied to get the lowest frequency from the sub-band found by DWT in which the modifications are done, and then SVD (Singular Value Decom- position) is applied to it, so that the original audio file does not have any impact of the watermark bits to get the better robustness and imperceptibility.
Bakrol, India Krunal N. Patel
First and foremost, praises and thanks to the God, the Almighty, for His showers of blessings throughout my research work to complete the research successfully.
I forward my sincere thanks to Prof. Saurabh A. Shah and Prof. Dipti B. Shah for their valuable help during the work of this book. Their suggestions were always there whenever I needed them. As a research supervisor, they spared their valuable time for the in-depth discussion on this research work. Also, I would forward my hearty thanks to the Department of Computer Science and Engineering and the department head Dr. Chirag D. Patel for providing us the computer laboratory access during our needs.
I am extremely grateful to my parents for their love, prayers, caring, and sacrifices for educating and preparing me for my future. Also, I express my thanks to my sister and brother for their support and valuable prayers.
Hearty thanks to department administrators of C U SHAH University, for their kind cooperation and providing us with necessary software whenever we asked for it.
Finally, I would like to thank all the people who were helpful to me, whether directly or indirectly for the completion of this research work.
Patel Krunalkumar N.
<noindex><nofollow><iframe style="width:120px;height:240px;" marginwidth="0" marginheight="0" scrolling="no" frameborder="0" src="//ws-na.amazon-adsystem.com/widgets/q?ServiceVersion=20070822&OneJS=1&Operation=GetAdHtml&MarketPlace=US&source=ss&ref=as_ss_li_til&ad_type=product_link&tracking_id=soundmain-20&language=en_US&marketplace=amazon®ion=US&placement=B08LV8J6Q7&asins=B08LV8J6Q7&linkId=333af62a73f9cad81935310905c0dba2&show_border=true&link_opens_in_new_window=true"></iframe><iframe style="width:120px;height:240px;" marginwidth="0" marginheight="0" scrolling="no" frameborder="0" src="//ws-na.amazon-adsystem.com/widgets/q?ServiceVersion=20070822&OneJS=1&Operation=GetAdHtml&MarketPlace=US&source=ss&ref=as_ss_li_til&ad_type=product_link&tracking_id=soundmain-20&language=en_US&marketplace=amazon®ion=US&placement=3030539105&asins=3030539105&linkId=2619cc378ffa3439a28e4a0e1c4eb8f5&show_border=true&link_opens_in_new_window=true"></iframe></noindex></nofollow>