Skip to main content

Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT)

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

  • 1940 Accesses

Abstract

In this paper, an algorithm has been proposed to provide security to digital songs through wavelet transform with the help of a secure image embedded with coefficients of it without changing audible quality. Sampling the hidden image with the help of amplitude coding for generating lower magnitude values is the first phase of proposed technique followed by fabrication of authenticating code by embedding into lower magnitude values with selected coefficients of song signal generated via wavelet transform [symmetrization mode]. The embedded hidden secure image as well as authenticating code is used to detect and identify the original song from similar available songs. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (“.wav”) stereo sound file.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mondal, U.K., Mandal, J.K.: A Practical Approach of Embedding Secret Key to Authenticate Tagore Songs(ESKATS). In: Wireless Information Networks & Business Information System Proceedings (WINBIS 2010), vol. 6(1), pp. 67–74. Rural Nepal Technical Academy (Pvt.) Ltd., Nepal (2010) ISSN 2091-0266

    Google Scholar 

  2. Mondal, U.K., Mandal, J.K.: A Novel Technique to Protect Piracy of Quality Songs through Amplitude Manipulation (PPAM). In: International Symposium on Electronic System Design (ISED 2010), pp. 246–250 (2010) ISBN 978-0-7695-4294-2

    Google Scholar 

  3. Xiaoxiao, D., Mark, F., Bocko, Z.I.: Data Hiding Via Phase Manipulation of Audio Signals. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2004), vol. 5, pp. 377–380 (2004) ISBN 0-7803-8484-9

    Google Scholar 

  4. Erten, G., Salam, F.: Voice Output Extraction by Signal Separation. In: ISCAS 1998, vol. 3, pp. 5–8 (1998) ISBN 07803-4455-3

    Google Scholar 

  5. Pohl, C., Van Genderen, J.L.: Multisensor image fusion in remote sensing concepts, methods and applications. International Journal of Remote Sensing 19(5), 823–854 (1998)

    Article  Google Scholar 

  6. Arnold, M.: Audio watermarking: Features, applications and algorithms. In: IEEE International Conference on Multimedia and Expo., New York, NY, vol. 2, pp. 1013–1016 (2000)

    Google Scholar 

  7. Ioannidou, S., Karathanassi, V., Sarris, A.: The optimum wavelet-based fusion method for urban area mapping. In: WSEAS International Conference on Environment, Ecosystems and Development (2005)

    Google Scholar 

  8. Mondal, U.K., Mandal, J.K.: Generation and Fabrication of Authenticated Song Signal through Preserving Balance Ratio of Song’s Components (BRSAS). In: International Conference on Communication and Industrial Application (ICCIA 2011), Kolkata, India, December 26-28 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Uttam Kr. Mondal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mondal, U.K., Mandal, J.K. (2012). Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT). In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics