A Secret Communication Method Based on Watermarking Technique Using Genetic Algorithm

被引:2
作者
Huang, Der-Chen [1 ]
Hung, Kun-Ding [1 ]
Hou, Ting-Wei [1 ]
Chan, Yung-Kuan [2 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung, Taiwan
[2] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2015年 / 16卷 / 01期
关键词
Wavelet transformation; VoIP; Audio data hiding; Secret communication; SCHEME; IMAGES;
D O I
10.6138/JIT.2014.16.1.20130409
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a method of embedding a digital audio watermark into another host audio signal to achieve secret communication. It provides a secure way to avoid audio watermark is accessed by some illegal interceptors. This method first represents host audio in critical band representation by applying DWPT (discrete wavelet packet transformation) from spatial domain into frequency domain. The VQ (vector quantization) is adopted here to obtain a set of index and codebook for secret communication to compress the secret audio for hiding. Afterwards, the digital watermarking approach is proposed to embed the index into host audio. Many channels are available for data hiding. In order to obtain an approximate optimal performance, we adopt the genetic algorithm to select the best channel sets so that the audio is able to hide watermark optimally (quality and payload). Finally, we verify the robust of watermarking by using MP3 compression. The experimental results show that our method has high payload and the ability to against the loss of MP3 compression.
引用
收藏
页码:85 / 93
页数:9
相关论文
共 17 条
[1]  
Abid K, 2009, PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, P208, DOI 10.1109/ICBNMT.2009.5348480
[2]   Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy Environment [J].
Akhaee, Mohammad Ali ;
Sahraeian, S. Mohammad Ebrahim ;
Marvasti, Farokh .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2010, 19 (04) :967-980
[3]   An SVD audio watermarking approach using chaotic encrypted images [J].
Al-Nuaimy, Waleed ;
El-Bendary, Mohsen A. M. ;
Shafik, Amira ;
Shawki, Farid ;
Abou-El-azm, A. E. ;
El-Fishawy, N. A. ;
Elhalafawy, Said M. ;
Diab, Salaheldin M. ;
Sallam, Bassiouny M. ;
Abd El-Samie, Fathi E. ;
Kazemian, H. B. .
DIGITAL SIGNAL PROCESSING, 2011, 21 (06) :764-779
[4]  
Bhat M. A., 2011, IJCST, V2, P405
[5]   H.264 video watermarking with secret image sharing [J].
Chen, W. -M. ;
Lai, C. -J. ;
Wang, H. -C. ;
Chao, H. -C. ;
Lo, C. -H. .
IET IMAGE PROCESSING, 2011, 5 (04) :349-355
[6]   Auditory patterns [J].
Fletcher, H .
REVIEWS OF MODERN PHYSICS, 1940, 12 (01) :0047-0065
[7]   Associating visual textures with human perceptions using genetic algorithms [J].
Groissboeck, Werner ;
Lughofer, Edwin ;
Thumfart, Stefan .
INFORMATION SCIENCES, 2010, 180 (11) :2065-2084
[8]   Pathological infant cry analysis using wavelet packet transform and probabilistic neural network [J].
Hariharan, M. ;
Yaacob, Sazali ;
Awang, Saidatul Ardeenaawatie .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (12) :15377-15382
[9]  
Hsieh WC, 2010, J INTERNET TECHNOL, V11, P1057
[10]   Selection of the optimum promotion mix by integrating a fuzzy linguistic decision model with genetic algorithms [J].
Hsu, Tsuen-Ho ;
Tsai, Tsung-Nan ;
Chiang, Pei-Ling .
INFORMATION SCIENCES, 2009, 179 (1-2) :41-52