Reference Hub4
Watermarking Scheme with CS Encryption for Security and Piracy of Digital Audio Signals

Watermarking Scheme with CS Encryption for Security and Piracy of Digital Audio Signals

Rohit Thanki, Komal Borisagar
Copyright: © 2017 |Volume: 8 |Issue: 4 |Pages: 23
ISSN: 1947-8186|EISSN: 1947-8194|EISBN13: 9781522513803|DOI: 10.4018/IJISMD.2017100103
Cite Article Cite Article

MLA

Thanki, Rohit, and Komal Borisagar. "Watermarking Scheme with CS Encryption for Security and Piracy of Digital Audio Signals." IJISMD vol.8, no.4 2017: pp.38-60. http://doi.org/10.4018/IJISMD.2017100103

APA

Thanki, R. & Borisagar, K. (2017). Watermarking Scheme with CS Encryption for Security and Piracy of Digital Audio Signals. International Journal of Information System Modeling and Design (IJISMD), 8(4), 38-60. http://doi.org/10.4018/IJISMD.2017100103

Chicago

Thanki, Rohit, and Komal Borisagar. "Watermarking Scheme with CS Encryption for Security and Piracy of Digital Audio Signals," International Journal of Information System Modeling and Design (IJISMD) 8, no.4: 38-60. http://doi.org/10.4018/IJISMD.2017100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this article, a watermarking scheme using Curvelet Transform with a combination of compressive sensing (CS) theory is proposed for the protection of a digital audio signal. The curvelet coefficients of the host audio signal are modified according to compressive sensing (CS) measurements of the watermarked data. The CS measurements of watermark data is generated using CS theory processes and sparse coefficients (wavelet coefficients of DCT coefficients). The proposed scheme can be employed for both audio and speech watermarking. The gray scale watermark image is inserted into the host digital audio signal when the proposed scheme is used for audio watermarking. The speech signal is inserted into the host digital audio signal when the proposed scheme is employed for speech watermarking. The experimental results show that proposed scheme performs better than the existing watermarking schemes in terms of perceptual transparency.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.