博士論文
Available in National Diet Library
Find on the publisher's website
国立国会図書館デジタルコレクション
Digital data available
Check on the publisher's website
DOI[10.24561/00010338]to the data of the same series
Studies on Digital Audio Watermarking Using Matrix Decomposition
- Persistent ID (NDL)
- info:ndljp/pid/9506312
- Material type
- 博士論文
- Author
- Pranab, Kumar Dhar
- Publisher
- -
- Publication date
- 2014
- Material Format
- Digital
- Capacity, size, etc.
- -
- Name of awarding university/degree
- 埼玉大学,博士(学術)
Notes on use at the National Diet Library
本資料は、掲載誌(URI)等のリンク先にある学位授与機関のWebサイトやCiNii Dissertationsから、本文を自由に閲覧できる場合があります。
Notes on use
Note (General):
- type:textIn recent years, due to the rapid development of internet and multimedia technology, transmission and distribution of multimedia data have be...
Search by Bookstore
Read this material in an accessible format.
Holdings of Libraries in Japan
This page shows libraries in Japan other than the National Diet Library that hold the material.
Please contact your local library for information on how to use materials or whether it is possible to request materials from the holding libraries.
Search by Bookstore
Read in Disability Resources
Bibliographic Record
You can check the details of this material, its authority (keywords that refer to materials on the same subject, author's name, etc.), etc.
Digital
- Material Type
- 博士論文
- Author/Editor
- Pranab, Kumar Dhar
- Author Heading
- Publication Date
- 2014
- Publication Date (W3CDTF)
- 2014
- Alternative Title
- 行列分解を用いたディジタルオーディオ電子透かしに関する研究
- Periodical title
- 博士論文(埼玉大学大学院理工学研究科(博士後期課程))
- Degree grantor/type
- 埼玉大学
- Date Granted
- 2014-09-19
- Date Granted (W3CDTF)
- 2014-09-19
- Dissertation Number
- 甲第963号
- Degree Type
- 博士(学術)
- Conferring No. (Dissertation)
- 甲第963号
- Text Language Code
- eng
- Target Audience
- 一般
- Note (General)
- type:textIn recent years, due to the rapid development of internet and multimedia technology, transmission and distribution of multimedia data have become an extremely simple task. This has become a serious threat for multimedia content owners. Thus, there is significant interest for copyright protection of multimedia data. Digital watermarking has drawn extensive attention for copyright protection of multimedia data. It is a process of embedding watermark into the multimedia data to show authenticity and ownership. This technique has several applications such as copyright protection, data authentication, fingerprinting, data indexing, broadcast monitoring, and so on.This dissertation introduces audio watermarking methods for copyright protection. An audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. In this method, initially the original audio is segmented into non-overlapping frames. DWT is applied to each frame and detail coefficients are arranged into a one-dimensional matrix formation. DCT is performed on this matrix and the obtained DCT coefficients are reshaped. SVD is applied to the DCT coefficients and watermark information is then embedded into the highest singular value by quantization. Watermark information is extracted by comparing the largest singular value of the DCT coefficients obtained from DWT sub bands of each original and attacked watermarked audio frame. This method is robust against various attacks and provides good imperceptible watermarked sounds.An audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar transform (CPT) is presented. In this method, initially the original audio is segmented into nonoverlapping frames. FFT is applied to each frame and low frequency FFT coefficients are selected. SVD is applied to the selected FFT coefficients of each frame represented in a matrix form. The highest two singular values of each frame are selected. The selected singular values are assumed as the components of polar coordinate system and are transformed into the components of Cartesian coordinate system. Watermark information is embedded into each of these Cartesian components using an embedding function. Watermark information is extracted by comparing the Cartesian components of the largest two singular values obtained from the low frequency FFT coefficients of each original and attacked watermarked audio frame. This method has high data payload and it provides good robustness against various attacks.A blind entropy based audio watermarking method in DCT domain using SVD and log-polar transform (LPT) is proposed. In this method, initially the original audio is segmented into non-overlapping frames and DCT is applied to each frame. Low frequency DCT coefficients are divided into subbands and entropy of each subband is calculated. The subband with highest entropy value of each frame is arranged into a square matrix and SVD is applied to each of these matrices. The selected highest singular value is assumed as the component of log-polar coordinate system and is transformed into the component of Cartesian coordinate system. Watermark information is embedded into each of these Cartesian components using a quantization function. A blind watermark detection process is developed to identify the embedded watermark data against various attacks.A blind lifting wavelet transform (LWT) based audio watermarking using fast Walsh-Hadamard transform (FWHT) and SVD is introduced. In this method, we use a Bernoulli map that contains the chaotic characteristics to encrypt the binary watermark in order to enhance the confidentiality of the embedded watermark. Then, the original audio is segmented into non-overlapping frames. LWT is applied to each frame and FWHT is performed on approximate coefficients of each frame. Then FWHT coefficients of each frame are reshaped into a square matrix. SVD is applied to each of these matrices. Watermark information is then embedded into the highest singular value of each of these matrices. This method does not need the original audio signal to extract the watermark.An audio watermarking method based on eigenvalue decomposition (EVD) is presented. In this method, the original audio is segmented into non-overlapping frames and the samples of each frame are arranged into a square matrix. EVD is applied to each of these matrices. Watermark information is embedded into the largest eigenvalue of each matrix by quantization. To our best knowledge, this is the first EVD-based audio watermarking method where watermark information is embedded directly to the eigenvalues. This method has a blind watermark detection process and it is highly robust against various attacks.The performance of the proposed watermarking methods is evaluated and finally, compared with the state-of-the-art methods. Simulation results indicate that the proposed audio watermarking methods outperform the state-of-the-art methods in terms of robustness, imperceptibility, and data payload. These results verify the effectiveness of the proposed methods as a suitable candidate for copyright protection of audio signal.Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Introduction 171.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171.2 Application Areas of Digital Watermarking . . . . . . . . . . . . . . 181.3 Properties of Digital Watermarking . . . . . . . . . . . . . . . . . . 201.4 Trade-off of Digital Watermarking . . . . . . . . . . . . . . . . . . . 221.5 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221.6 Dissertation Organization . . . . . . . . . . . . . . . . . . . . . . . 262 Background Information 272.1 Review of Audio Watermarking Methods . . . . . . . . . . . . . . . 272.1.1 Time Domain Methods . . . . . . . . . . . . . . . . . . . . . 272.1.2 Transform Domain Methods . . . . . . . . . . . . . . . . . . 282.1.3 Other Audio Watermarking Methods . . . . . . . . . . . . . 292.2 Signal Transformation . . . . . . . . . . . . . . . . . . . . . . . . . 302.3 Matrix Decomposition . . . . . . . . . . . . . . . . . . . . . . . . . 332.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 DWT-DCT-Based Audio Watermarking Using SVD 353.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353.2 A Brief Overview of SVD-Based Methods . . . . . . . . . . . . . . . 363.3 Proposed Watermarking Method . . . . . . . . . . . . . . . . . . . 373.3.1 Watermark Embedding Process . . . . . . . . . . . . . . . . 373.3.2 Watermark Detection Process . . . . . . . . . . . . . . . . . 393.4 Experimental Results and Discussion . . . . . . . . . . . . . . . . . 413.4.1 Imperceptibility Test . . . . . . . . . . . . . . . . . . . . . . 433.4.2 Robustness Test . . . . . . . . . . . . . . . . . . . . . . . . . 463.4.3 Error Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 493.4.4 Data Payload . . . . . . . . . . . . . . . . . . . . . . . . . . 513.4.5 Algorithm Comparison and Discussion . . . . . . . . . . . . 523.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524 FFT-Based Audio Watermarking Using SVD and CPT 544.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544.2 Proposed Watermarking Method . . . . . . . . . . . . . . . . . . . 554.2.1 Watermark Preprocessing . . . . . . . . . . . . . . . . . . . 554.2.2 Watermark Embedding Process . . . . . . . . . . . . . . . . 564.2.3 Watermark Detection Process . . . . . . . . . . . . . . . . . 594.3 Experimental Results and Discussion . . . . . . . . . . . . . . . . . 614.3.1 Imperceptibility Test . . . . . . . . . . . . . . . . . . . . . . 624.3.2 Robustness Test . . . . . . . . . . . . . . . . . . . . . . . . . 654.3.3 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664.3.4 Error Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 664.3.5 Algorithm Comparison and Discussion . . . . . . . . . . . . 674.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685 Entropy-Based Audio Watermarking Using SVD and LPT 695.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695.2 Proposed Watermarking Method . . . . . . . . . . . . . . . . . . . 705.2.1 Watermark Preprocessing . . . . . . . . . . . . . . . . . . . 705.2.2 Watermark Embedding Process . . . . . . . . . . . . . . . . 715.2.3 Watermark Detection Process . . . . . . . . . . . . . . . . . 745.3 Simulation Results and Discussion . . . . . . . . . . . . . . . . . . . 755.3.1 Imperceptibility Test . . . . . . . . . . . . . . . . . . . . . . 765.3.2 Robustness Test . . . . . . . . . . . . . . . . . . . . . . . . . 785.4 Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 795.4.1 Error Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 795.4.2 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . 805.4.3 Algorithm Comparison and Discussion . . . . . . . . . . . . 815.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 826 LWT-Based Audio Watermarking Using FWHT and SVD 836.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836.2 Proposed Watermarking Method . . . . . . . . . . . . . . . . . . . 846.2.1 Watermark Preprocessing . . . . . . . . . . . . . . . . . . . 846.2.2 Watermark Embedding Process . . . . . . . . . . . . . . . . 856.2.3 Watermark Detection Process . . . . . . . . . . . . . . . . . 876.3 Simulation Results and Discussion . . . . . . . . . . . . . . . . . . . 886.3.1 Imperceptibility Test . . . . . . . . . . . . . . . . . . . . . . 896.3.2 Robustness Test . . . . . . . . . . . . . . . . . . . . . . . . . 916.4 Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 936.4.1 Error Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 936.4.2 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . 946.4.3 Algorithm Comparison and Discussion . . . . . . . . . . . . 946.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 957 Audio Watermarking Based on EVD 967.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967.2 Proposed Watermarking Method . . . . . . . . . . . . . . . . . . . 977.2.1 Watermark Embedding Process . . . . . . . . . . . . . . . . 977.2.2 Watermark Detection Process . . . . . . . . . . . . . . . . . 997.3 Experimental Results and Discussion . . . . . . . . . . . . . . . . . 1007.3.1 Imperceptibility Test . . . . . . . . . . . . . . . . . . . . . . 1007.3.2 Robustness Test . . . . . . . . . . . . . . . . . . . . . . . . . 1027.4 Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 1037.4.1 Error Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 1037.4.2 Algorithm Comparison and Discussion . . . . . . . . . . . . 1047.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1058 Conclusions 1068.1 Summary of the Work . . . . . . . . . . . . . . . . . . . . . . . . . 1068.2 Future Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107指導教員 : 島村徹也
- DOI
- 10.24561/00010338
- Persistent ID (NDL)
- info:ndljp/pid/9506312
- Collection
- Collection (Materials For Handicapped People:1)
- Collection (particular)
- 国立国会図書館デジタルコレクション > デジタル化資料 > 博士論文
- Acquisition Basis
- 博士論文(自動収集)
- Date Accepted (W3CDTF)
- 2015-10-01T11:16:23+09:00
- Date Created (W3CDTF)
- 2015-08-10
- Format (IMT)
- application/pdf
- Access Restrictions
- 国立国会図書館内限定公開
- Service for the Digitized Contents Transmission Service
- 図書館・個人送信対象外
- Availability of remote photoduplication service
- 可
- Periodical Title (URI)
- Data Provider (Database)
- 国立国会図書館 : 国立国会図書館デジタルコレクション