978-1-4244-4547-9/09/$26.00 ©2009 IEEE TENCON 2009
Speech Based Watermarking for Digital Images
Vandana S.Inamdar
Department of Computer Engineering and IT
College of Engineering
Pune, India
vhj@comp.coep.org.in
Priti. P. Rege
Department of Electronics and Telecommunication
College of Engineering
Pune, India
ppr@extc.coep.org.in
Aarti Bang
Department of Electronics
Vishwakarma Institue of Information Technology
Pune , India
arti7bang@yahoo.co.in
Abstract—
This paper presents a novel scheme of
watermarking of digital images for copyright protection and
authentication. In this paper we proposed a method of
embedding owner’s speech signal. Speech being a biometric data,
the watermark signal in this method is expected to be more
meaningful and has closer correlation with copyright holder.
The main issue of concern here is the capacity because the speech
data has large number of samples. Linear predictive coding is
used to encode the audio data. Here, speech samples are
imperceptibly inserted using spread spectrum technique into the
mid frequency band of wavelet transform of image which makes
it robust to lossy compression. Applications for such a speech-
hiding scheme include copy protection, authentication and covert
communication.
Keywords-Watermarking; copy right Protection; Biometric
watermarking; Wavelet transform
I. INTRODUCTION
The rapid growth of digital media and communication
network has highlighted the need for Intellectual Property
Rights (IRP) protection technology for digital multimedia.
Watermarking of multimedia data has become a hotspot for
research in recent years. Watermarking can be used to identify
the owners, license information, or other information related
to the digital object carrying the watermark. Watermarks can
provide the mechanism for determining if a particular work
has been tampered with or copied illegally [1].
In Digital watermarking, a low-energy signal is imperceptibly
embedded in another signal. Watermarking systems can be
characterized by properties such as imperceptibility,
robustness and capacity. The importance of each property is
dependent on the requirement of the application and the role
the watermark will play. The process of embedding the
watermark requires modifying the original image and in
essence the watermarking process inserts a controlled amount
of distortion in the image. The recovery of this distortion
allows one to identify the owner of the image. Invisible or
transparent watermark makes use of the properties of the
human visual system to minimize the perceptual distortion in
the watermarked images.
II. RELATED
WORK
Early work on digital water marking focused on information
hiding in the spatial domain [2],[3]. In spatial domain
technique, the watermark casting is achieved by directly
modifying the pixel values of the host image. Lee, Chen.
proposed to insert watermark by changing least significant
bit of some pixels in an image[4]. Recent efforts are mostly
based on transform based techniques. The widely used
transformations are DCT, Walsh-Hadamard, DFT, and
wavelet transform. Bit replacement, data modulation and
Spread Spectrum modulation are being used widely[1]. In
particular, Cox [5] described a method where the watermark is
embedded in large discrete cosine transform coefficients using
ideas borrowed from spread spectrum in communication.
Although lot of efforts have been made in the field, yet most
of them embed a character string or logo as a copyright
information. There are some limitations to these watermarks:
1) Usually they are less meaningful and intuitive for easily
identifying. 2) Low correlative to copyright holder. The
information of the holder is not inherent and may change with
time. Using these as a watermark may lead to imitation,
tamper and repudiation. Traditional watermarking method
does not convincingly validate the claimed identification of
the person as the host might be fraudulently watermarked with
a particular string pattern or logo by impersonators [13].
Recently biometrics is adaptively merged into watermarking
technology to enhance the credibility of the conventional
watermarking methods [8], [14]. The motivation of the present
work arises from developing a watermarking algorithm which
Authorized licensed use limited to: NORTHWESTERN POLYTECHNIC UNIVERSITY. Downloaded on June 23,2010 at 05:32:45 UTC from IEEE Xplore. Restrictions apply.