![]() The watermark information is then embedded with high-frequency sub-band coefficients by involving the quantization process. The singular value decomposition (SVD) technique is used to further decompose high-frequency sub-band coefficients into singular values. Initial parameters such as Q, r, and J are used to decompose the cover signal into individual frequency sub-bands with the tunable Q-factor wavelet transform (TQWT). The article presents a novel ECG steganography scheme based on the tunable Q-factor wavelet transformation (TQWT) and also singular value decomposition (SVD) techniques that ensure better safety and confidentiality of patient information. Simulation results show that our approach not only makes sure robustness against common attacks, but it also further improves systemic security and robustness against malicious attack. The test results show that the approach maintains high audio quality, and yields a high recovery rate after attacks by commonly used audio data manipulations such as noise addition, amplitude modification, low-pass filtering, re-quantization, re-sampling, cropping, cutting, and compression. To evaluate the performance of the presented audio watermarking method, objective quality tests, including bit error rate (BER), normalized cross correlation (NCC), peak-signal to noise ratio (PSNR) are conducted for the watermark and Signal-to-Noise Ratio (SNR) for audio signals. The watermark can be blindly extracted without knowledge of the original signal. The algorithm has a good security because only the authorized can detect the copyright information embedded to the host audio signal. The reason for embedding the watermark in the lower frequency components is that these components' energy is high enough to embed the watermark in such a way that the watermark is inaudible therefore, it should not alter the audible content and should not be easy to remove. This approach is based on the embedding of an encrypted watermark in the lower frequency components using a two wavelet function with adaptation to the frame size. A binary image is used as a watermark, and is encrypted with a chaotic encryption with a secret key. ![]() To enhance security and robustness of digital audio watermarking algorithms, this paper presents an algorithm based on mean-quantization in Discrete Wavelet Transform (DWT) domain.
0 Comments
Leave a Reply. |