scispace - formally typeset
Proceedings ArticleDOI

Speech based watermarking for digital images

Reads0
Chats0
TLDR
This paper presents a novel scheme of watermarking of digital images for copyright protection and authentication by embedding owner's speech signal into the mid frequency band of wavelet transform of image which makes it robust to lossy compression.
Abstract
This paper presents a novel scheme of watermarking of digital images for copyright protection and authentication. In this paper we proposed a method of embedding owner's speech signal. Speech being a biometric data, the watermark signal in this method is expected to be more meaningful and has closer correlation with copyright holder. The main issue of concern here is the capacity because the speech data has large number of samples. Linear predictive coding is used to encode the audio data. Here, speech samples are imperceptibly inserted using spread spectrum technique into the mid frequency band of wavelet transform of image which makes it robust to lossy compression. Applications for such a speech-hiding scheme include copy protection, authentication and covert communication.

read more

Citations
More filters
Journal ArticleDOI

Dual watermarking technique with multiple biometric watermarks

TL;DR: A dual watermarking method with multiple biometric watermarks in which it embeds speech and face biometric traits of owner invisibly and lastly offline signature is overlaid translucently on image to prove copyright ownership.
Proceedings ArticleDOI

Speech as a biometric watermark for digital images using stationary wavelet transform

TL;DR: A method of embedding owner's speech signal being a biometric data, the watermark signal in this method is expected to be more meaningful and has closer correlation with copyright holder.

Audio watermarking in digital image using wavelet transform

Bharat Ratna, +1 more
TL;DR: This paper proposed a method of embedding owner's speech signal, being a biometric data, which is expected to be more meaningful and has closer correlation with copyright holder, in this method of digital watermarking of audio file.

Genetic algorithm based watermarking scheme for sound signals using closest approach

Pooja Wadhwa, +1 more
TL;DR: This work uses genetic algorithm to have optimized and closest match where to hide which block in speech signals and GA is fast and better way to optimized closet match approach as compare to any other method.
Journal Article

Audio watermarking in digital image using wavelet transform

TL;DR: A method of embedding owner's speech signal, being a biometric data, is proposed, which is expected to be more meaningful and has closer correlation with copyright holder.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

An introduction to biometric recognition

TL;DR: A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.
Book

Digital Processing of Speech Signals

TL;DR: This paper presents a meta-modelling framework for digital Speech Processing for Man-Machine Communication by Voice that automates the very labor-intensive and therefore time-heavy and expensive process of encoding and decoding speech.
Journal ArticleDOI

Multimedia watermarking techniques

TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Journal ArticleDOI

High capacity image steganographic model

TL;DR: An image steganographic model is proposed that is based on variable-size LSB insertion to maximise the embedding capacity while maintaining image fidelity and two methods are provided to deal with the security issue when using the proposed model.
Related Papers (5)