Abstract
In this paper, an algorithm has been proposed to provide security to digital songs through wavelet transform with the help of a secure image embedded with coefficients of it without changing audible quality. Sampling the hidden image with the help of amplitude coding for generating lower magnitude values is the first phase of proposed technique followed by fabrication of authenticating code by embedding into lower magnitude values with selected coefficients of song signal generated via wavelet transform [symmetrization mode]. The embedded hidden secure image as well as authenticating code is used to detect and identify the original song from similar available songs. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (“.wav”) stereo sound file.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mondal, U.K., Mandal, J.K.: A Practical Approach of Embedding Secret Key to Authenticate Tagore Songs(ESKATS). In: Wireless Information Networks & Business Information System Proceedings (WINBIS 2010), vol. 6(1), pp. 67–74. Rural Nepal Technical Academy (Pvt.) Ltd., Nepal (2010) ISSN 2091-0266
Mondal, U.K., Mandal, J.K.: A Novel Technique to Protect Piracy of Quality Songs through Amplitude Manipulation (PPAM). In: International Symposium on Electronic System Design (ISED 2010), pp. 246–250 (2010) ISBN 978-0-7695-4294-2
Xiaoxiao, D., Mark, F., Bocko, Z.I.: Data Hiding Via Phase Manipulation of Audio Signals. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2004), vol. 5, pp. 377–380 (2004) ISBN 0-7803-8484-9
Erten, G., Salam, F.: Voice Output Extraction by Signal Separation. In: ISCAS 1998, vol. 3, pp. 5–8 (1998) ISBN 07803-4455-3
Pohl, C., Van Genderen, J.L.: Multisensor image fusion in remote sensing concepts, methods and applications. International Journal of Remote Sensing 19(5), 823–854 (1998)
Arnold, M.: Audio watermarking: Features, applications and algorithms. In: IEEE International Conference on Multimedia and Expo., New York, NY, vol. 2, pp. 1013–1016 (2000)
Ioannidou, S., Karathanassi, V., Sarris, A.: The optimum wavelet-based fusion method for urban area mapping. In: WSEAS International Conference on Environment, Ecosystems and Development (2005)
Mondal, U.K., Mandal, J.K.: Generation and Fabrication of Authenticated Song Signal through Preserving Balance Ratio of Song’s Components (BRSAS). In: International Conference on Communication and Industrial Application (ICCIA 2011), Kolkata, India, December 26-28 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mondal, U.K., Mandal, J.K. (2012). Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT). In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-31513-8_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31512-1
Online ISBN: 978-3-642-31513-8
eBook Packages: EngineeringEngineering (R0)