Title: | Hybrid domain watermarking technique for copyright protection of images using speech watermarks |
Authors: | Thanki, Rohit Kothari, Ashish |
Keywords: | Biometric Color image Curvelet transform Speech signal Security TIMIT database Watermarking |
Issue Date: | Apr-2019 |
Publisher: | Journal of Ambient Intelligence and Humanized Computing , Springer. |
Citation: | Thanki, R.M., Kothari, A.M. Hybrid domain watermarking technique for copyright protection of images using speech watermarks. J Ambient Intelligence Human Computing, 11, 1835–1857 (2020). https://doi.org/10.1007/s12652-019-01295-1 |
Abstract: | When digital images are shared over an open access network such as the internet, facebook, WhatsApp, and other social media, then the security of these images are required. The digital watermarking is one approach for the security of images (e.g. copyright protection, ownership authentication). In most of the watermarking approaches, secret information such as owner binary logos and texts are used for protection of images. These days, biometric watermarks such as human speech signals are preferred for protection of images. In this paper, a watermarking technique based on various signal processing transforms is proposed and implemented for the security of image using human speech signal. In this technique, the first discrete cosine transform (DCT) and then singular value decomposition (SVD) are applied on the watermark speech signal to get its hybrid coefficients which are inserted into hybrid coefficients of the cover image to get a watermarked image. These hybrid coefficients of cover image are first generated using discrete wavelet transform (DWT) and then fast discrete curvelet transform (FDCuT) is applied on it. The performance of techniques is tested for standard speech database such as TIMIT in terms of imperceptibility, robustness and payload capacity. The experimental results and comparison show that the proposed watermarking technique performs better than the existing watermarking techniques available in the literature. This technique may also be used for security of speech signal against spoof attack. |
URI: | http://10.9.150.37:8080/dspace//handle/atmiyauni/1003 |
ISSN: | 1868-5145 |
Appears in Collections: | 01. Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
768) 12966_Ashish Mahendrabhai Kothari.pdf | 7.98 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.