Top Banner
IJSTE - International Journal of Science Technology & Engineering | Volume 2 | Issue 10 | April 2016  ISSN (online): 2349-784X All rights reserved by www.ijste.org  198 Steganography using Lossless Reversible Data Hiding on Encrypted Image  Muthurajan. K. T Nirmalkumar.S  Department of Information Te chnology Department of Information Technol ogy Christian College of Engineering & Technology Oddanchatram Christian College of Engineering & Technology Oddanchatram Veerapandi.M Yesudoss.J  Department of Information Te chnology Department of Information Tec hnology Christian College of Engineering & Technology Oddanchatram Christian College of Engineering & Technology Oddanchatram Arul Anand.R  Department of Information Tec hnology Christian College of Engineering & Technology, Oddanchatram Abstract Steganography is the art of hiding data in a seemingly innocuous cover medium. For example    any sensitive data can be hidden inside a digital image. Steganography provides better security than cryptography because cryptography hides the contents of the message but not the existence of the message. So no one apart from the authorized sender and receiver will be aware of the existence of the secret data. Steganographic messages are often first encrypted by some traditional means and then a cover image is modified in some way to contain the encrypted message. The detection of steganographically encoded packages is called steganalysis. In this paper, we propose three efficient Steganography techniques that are used for hiding secret messages. They are LSB based Steganography, Steganography using the last two significant bits and Steganography using diagonal pixels of the image. Symmetric and asymmetric key cryptography has been used to encrypt the message. Here we use two fish symmetric technique for encryption  process. Keywords: Data embedding, Reversible, Steganography, Texture Synthesis, Cryptography  I. INTRODUCTION  In this technique has been used mean square error (MSE) Its h help to Reversible data hiding (RDH) has the capability to erase the distortion introduced by embedding step after cover restora tion. It is an important property that can be applied to many scen arios, such as medical imagery, military imagery and law for entices Least significant bit (LSB) technique has been proposed HLSB technique where the secret information is embedded in the LSB of the cover frame. Hash function is used to select the position of insertion error required in original image. The proposed technique is compared with existing LSB based secret message and the results are found to be encouraging. The proposed technique is compared with existing LSB based secret message and the results are found to be encouraging. Level of information increased and LSB maintain the separate key. We can easily clear the secret image, so we can get in original image. II. NEED In upcoming days people send and receive process are more securely by the steganography for data transferring .Through this technology user can easily send an d receive inf ormation in more secur e manner so that easy w ay sending a nd receiving t he information. In future it useful for the people for security purpose . The data embedding only affects the LSB, a decryption with the encryption key can result in an image similar to the original version. When using both of the encryption and data-hiding keys, the embedded additional data can be successfully extracted and the original image can be perfectly recovered by exploiting the spatial correlation in natural image. III.  EXISTING SYSTEM In the existing system reversible data hiding technique the image is encrypted by using the without encryption key and the da ta to hide is embedded in to the image by using the data hiding. At the receiver side he first need to extract the imag e using the encrypted image in order to extract the data and after that he’ll use data extraction process to extract the embedded data. It is a ser ial process and is not a separable process. The extraction and decryption steps are independent, which are more natural and applicable.
7

Steganography Using Lossless Reversible Data Hiding on Encrypted Image

Jul 05, 2018

Download

Documents

IJSTE
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography Using Lossless Reversible Data Hiding on Encrypted Image

8/16/2019 Steganography Using Lossless Reversible Data Hiding on Encrypted Image

http://slidepdf.com/reader/full/steganography-using-lossless-reversible-data-hiding-on-encrypted-image 1/7

IJSTE - International Journal of Science Technology & Engineering | Volume 2 | Issue 10 | April 2016  

ISSN (online): 2349-784X

All rights reserved by www.ijste.org  198 

Steganography using Lossless Reversible Data

Hiding on Encrypted Image 

Muthurajan. K. T Nirmalkumar.S

 Department of Information Technology Department of Information Technology 

Christian College of Engineering & Technology

Oddanchatram

Christian College of Engineering & Technology

Oddanchatram

Veerapandi.M Yesudoss.J

 Department of Information Technology Department of Information Technology

Christian College of Engineering & Technology

Oddanchatram

Christian College of Engineering & Technology

Oddanchatram

Arul Anand.R

 Department of Information Technology

Christian College of Engineering & Technology, Oddanchatram

Abstract 

Steganography is the art of hiding data in a seemingly innocuous cover medium. For example  –  any sensitive data can be hiddeninside a digital image. Steganography provides better security than cryptography because cryptography hides the contents of themessage but not the existence of the message. So no one apart from the authorized sender and receiver will be aware of the existenceof the secret data. Steganographic messages are often first encrypted by some traditional means and then a cover image is modifiedin some way to contain the encrypted message. The detection of steganographically encoded packages is called steganalysis. Inthis paper, we propose three efficient Steganography techniques that are used for hiding secret messages. They are LSB basedSteganography, Steganography using the last two significant bits and Steganography using diagonal pixels of the image. Symmetricand asymmetric key cryptography has been used to encrypt the message. Here we use two fish symmetric technique for encryption process.Keywords: Data embedding, Reversible, Steganography, Texture Synthesis, Cryptography ________________________________________________________________________________________________________

I.  INTRODUCTION 

In this technique has been used mean square error (MSE) Its h help to Reversible data hiding (RDH) has the capability to erase thedistortion introduced by embedding step after cover restoration. It is an important property that can be applied to many scenarios,such as medical imagery, military imagery and law for entices Least significant bit (LSB) technique has been proposed HLSBtechnique where the secret information is embedded in the LSB of the cover frame. Hash function is used to select the position ofinsertion error required in original image. The proposed technique is compared with existing LSB based secret message and theresults are found to be encouraging. The proposed technique is compared with existing LSB based secret message and the resultsare found to be encouraging. Level of information increased and LSB maintain the separate key. We can easily clear the secretimage, so we can get in original image.

II.  NEED 

In upcoming days people send and receive process are more securely by the steganography for data transferring .Through this

technology user can easily send and receive information in more secure manner so that easy way sending and receiving theinformation. In future it useful for the people for security purpose . The data embedding only affects the LSB, a decryption withthe encryption key can result in an image similar to the original version. When using both of the encryption and data-hiding keys,the embedded additional data can be successfully extracted and the original image can be perfectly recovered by exploiting thespatial correlation in natural image.

III. EXISTING SYSTEM 

In the existing system reversible data hiding technique the image is encrypted by using the without encryption key and the da ta tohide is embedded in to the image by using the data hiding. At the receiver side he first need to extract the image using the encryptedimage in order to extract the data and after that he’ll use data extraction process to extract the embedded data. It is a ser ial processand is not a separable process. The extraction and decryption steps are independent, which are more natural and applicable.

Page 2: Steganography Using Lossless Reversible Data Hiding on Encrypted Image

8/16/2019 Steganography Using Lossless Reversible Data Hiding on Encrypted Image

http://slidepdf.com/reader/full/steganography-using-lossless-reversible-data-hiding-on-encrypted-image 2/7

Steganography using Lossless Reversible Data Hiding on Encrypted Image (IJSTE/ Volume 2 / Issue 10 / 041)

All rights reserved by www.ijste.org  199 

 Encryption Process

Fig. 1:

 Index Table Generation Process

Fig. 2:

 Decryption Process

Fig. 3:

IV.  PROPOSED SYSTEM 

The proposed scheme is made up of image encryption, data embedding and data extraction/image-recovery phases. The receiverencrypts the original uncompressed image using an encryption key to produce an encrypted image. Since the data embedding only

affects the LSB, a decryption with the encryption key can result in an image similar to the original version. When using both ofthe encryption and data-hiding keys, the embedded additional data can be successfully extracted and the original image can be perfectly recovered by exploiting the spatial correlation in natural image.

Page 3: Steganography Using Lossless Reversible Data Hiding on Encrypted Image

8/16/2019 Steganography Using Lossless Reversible Data Hiding on Encrypted Image

http://slidepdf.com/reader/full/steganography-using-lossless-reversible-data-hiding-on-encrypted-image 3/7

Steganography using Lossless Reversible Data Hiding on Encrypted Image (IJSTE/ Volume 2 / Issue 10 / 041)

All rights reserved by www.ijste.org  200 

 Encryption Process

Fig. 4:

 Image Encryption

In this module, to construct the encrypted image, the first stage can be divided into three steps:

  Image Partition

  Self-Reversible EmbeddingAt the beginning, image partition step divides original image into two parts and then, the LSBs of are reversibly embedded into

with a standard RDH algorithm so that LSBs of can be used for accommodating messages at last, encrypt the rearranged image togenerate its final version. 

 Image Partition

The operator here for reserving room before encryption is a standard RDH technique, so the goal of image partition.

Self-Reversible Embedding

The goal of self-reversible embedding is to embed the LSB-planes of into by employing traditional RDH algorithms. We simplifythe method in to demonstrate the process of self-embedding.

V. 

DATA HIDING ENCRYPTION IMAGE 

In this module, a content owner encrypts the original image using a two fish algorithm with an encryption key .After producingthe encrypted image, the content owner hands over it to a data hider (e.g., a database manager) and the data hider can embed someauxiliary data into the encrypted image by lossless vacating some room according to a data hiding key .Then a receiver, maybe thecontent owner himself or an authorized third party can extract the embedded data with the data hiding key and further recover theoriginal image from the encrypted version according to the encryption key.

VI. 

TWOFISH ENCRYPTION PROCESS 

Maybe one of the algorithm’s most interesting features, which enables different implementations to improve the relative

 performance of the algorithm, is that it allows several levels of performance tradeoffs on encryption speed key setup hardware gatecount, memory use. It was selected as the best algorithm in this final, it is nevertheless one of the most advanced and securesymmetric block ciphers in use today, and can be always considered as a very good alternative to AES. Accept any key length upto 256 bits

Two fish Algorithm

Computer security expert Bruce Schneier is the mastermind behind Blowfish and its successor Two fish. Keys used in thisalgorithm may be up to 256 bits in length and as a symmetric technique, only one key is needed.Two fish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish,Two fish is freely available to anyone who wants to use it. As a result, you’ll find it bundled in encryption programs such as PhotoEncrypt, GPG (GNU Privacy Guard), and the popular open source software True Crypt.

Page 4: Steganography Using Lossless Reversible Data Hiding on Encrypted Image

8/16/2019 Steganography Using Lossless Reversible Data Hiding on Encrypted Image

http://slidepdf.com/reader/full/steganography-using-lossless-reversible-data-hiding-on-encrypted-image 4/7

Steganography using Lossless Reversible Data Hiding on Encrypted Image (IJSTE/ Volume 2 / Issue 10 / 041)

All rights reserved by www.ijste.org  201 

Twofish Process

Fig. 5:

VII. LSB EMBEDDING PROCESS 

The message is embedded into the LSB position of each pixel. Suppose our original pixel has bits: (r7 r6 r5 r4 r3 r2 r1 r0, g7 g6g5 g4 g3 g2 g1 g0, b7 b6 b5 b4 b3 b2 b1 b0) In addition, our encrypted character (bytes) has some bits: (c7 c6 c5 c4 c3 c2 c1 c0).Then we can place the character bits in the least significant of selected pixel, next character bits in the next lowest pixel, and soon. (r7 r6 r5 r4 r3 r2 r1 c2, g7 g6 g5 g4 g3 g2 g1 c1, b7 b6 b5 b4 b3 b2 b1 c0). If we take an example of pixel (225,107,100)represented in binary form (11100001, 01101011, 01100100) into which to embed message character “a” having bit

01100001(ASCII value 97), then we can obtain New pixel as (224, 106,101) represented in binary form (11100000, 01101010,01100101).

Fig. 6:

VIII. 

DATA EMBEDDING 

In the data embedding phase, some parameters are embedded into a small number of encrypted pixels, and the LSB of the otherencrypted pixels are compressed to create a space for accommodating the additional data and the original data at the positionsoccupied by the parameters. The embedding rate, a ratio between the data amount of net payload and the total number of cover pixels, is

Page 5: Steganography Using Lossless Reversible Data Hiding on Encrypted Image

8/16/2019 Steganography Using Lossless Reversible Data Hiding on Encrypted Image

http://slidepdf.com/reader/full/steganography-using-lossless-reversible-data-hiding-on-encrypted-image 5/7

Steganography using Lossless Reversible Data Hiding on Encrypted Image (IJSTE/ Volume 2 / Issue 10 / 041)

All rights reserved by www.ijste.org  202 

 Decryption Process

Fig. 7:

IX.  DATA EXTRACTION AND IMAGE RECOVERY 

In this module, Extracting Data from Encrypted Images to manage and update personal information of images which are encryptedfor protecting clients’ privacy, an inferior database manager may only get access to the data hiding key and have to manipulatedata in encrypted domain. When the database manager gets the data hiding key, he can decrypt and extract the additional data bydirectly reading the decrypted version. When requesting for updating information of encrypted images, the database manager, then,updates information through LSB replacement and encrypts updated information according to the data hiding key all over again.As the whole process is entirely operated on encrypted domain, it avoids the leakage of original content.

X. 

DATA EXTRACTION AND IMAGE RESTORATION 

In this module, after generating the marked decrypted image, the content owner can further extract the data and recover originalimage.

XI. 

DERIVING PSNR VALUE AND MSE VALUE IN THE IMAGE  

 Peak Signal-To-Noise Ratio (PSNR)

The term peak signal-to-noise ratio (PSNR) is an expression for the ratio between the maximum possible value (power) of a signaland the power of distorting noise that affects the quality of its representation. Because many signals have a very wide dynamicrange, (ratio between the largest and smallest possible values of a changeable quantity) the PSNR is usually expressed in terms of

the logarithmic decibel scale.

 PSNR and MSE Calculation

MSE = (1/(m*n))*sum(sum((f-g).^2))PSNR =20*log (max (max(f)))/((MSE)^0.5)

XII. 

CONCLUSION 

A reversible steganographic algorithm using texture synthesis. Given an original source texture, our scheme can produce a largestegosynthetic texture concealing secret messages. We believe our proposed scheme offers substantial benefits and provides anopportunity to extend steganographic applications. Another possible study would be to combine other steganography approaches

Page 6: Steganography Using Lossless Reversible Data Hiding on Encrypted Image

8/16/2019 Steganography Using Lossless Reversible Data Hiding on Encrypted Image

http://slidepdf.com/reader/full/steganography-using-lossless-reversible-data-hiding-on-encrypted-image 6/7

Steganography using Lossless Reversible Data Hiding on Encrypted Image (IJSTE/ Volume 2 / Issue 10 / 041)

All rights reserved by www.ijste.org  203 

to increase the embedding capacities. If the receiver has only the data-hiding key, he can extract the additional data though he doesnot know the image content. If he has only the encryption key, he can decrypt the received data to obtain an image similar to theoriginal one, but cannot extract the embedded additional data .If he receiver has both the data-hiding key and the encryption key,he can extract the additional data and recover the original image without any error .Increases the security level of hiddeninformation. We can easily clear the secret image, so we can get in original image.

REFERENCES 

[1]  Fridrich, M. Goljan, Lossless data embedding for all image formats, in: SPIE Proceedings of Photonics West, Electronic Imaging, Security andWatermarking of Multimedia Contents,

[2] 

M. Celik, G. Sharma, A. Tekalp, E. Saber, Lossless generalized-LSB data embedding, IEEE Transactions on Image Processing.[3]  D.M. Thodi, J.J. Rodriguez, Expansion embedding techniques for reversible watermarking, IEEE Transactions on Image Processing[4]  Z. Ni, Y. Shi, N. Ansari, S. Wei, Reversible data hiding, IEEE Transactions on Circuits and Systems for Video Technology[5]  Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Imagequality assessment: From error visibility to structural similarity,” IEEE Trans. Image

Process., vol. 13, no. 4, pp. 600 – 612, Apr. 2004[6]  Y. Guo, G. Zhao, Z. Zhou, and M. Pietikäinen, “Video texture synthesis with multi-frame LBP-TOP and diffeomorphic growth model,” IEEE Trans. Image

Process., vol. 22, no. 10, pp. 3879 – 3891, Oct. 2013.[7]

 

L.-Y. Wei and M. Levoy, “Fast texture synthesis using tree-structured vector quantization,” in Proc. 27th Annu. Conf. Comput. Graph. Interact. Techn., 2000, pp. 479 – 488.

[8]  A. A. Efros and T. K. Leung, “Texture synthesis by non- parametric sampling,” in Proc. 7th IEEE Int. Conf. Comput. Vis., Sep. 1999, pp. 1033 – 1038.[9]  C. Han, E. Risser, R. Ramamoorthi, and E. Grinspun, “Multiscale texture synthesis,” ACM Trans. Graph., vol. 27, no. 3, 2008, Art. ID 51.[10]  H. Otori and S. Kuriyama, “Data-embeddable texture synthesis,” in Proc. 8th Int. Symp. Smart Graph., Kyoto, Japan, 2007, pp. 146 – 157.[11]  H. Otori and S. Kuriyama, “Texture synthesis for mobile data communications,” IEEE Comput. Graph. Appl., vol. 29, no. 6, pp. 74 – 81, Nov./Dec. 2009.[12]

 

M. F. Cohen, J. Shade, S. Hiller, and O. Deussen, “Wang tiles for image and texture generation,” ACM Trans. Graph., vol. 22, no. 3, pp. 287 – 294, 2003.[13]  K. Xu et al., “Feature-aligned shape texturing,” ACM Trans. Graph., vol. 28, no. 5, 2009, Art. ID 108.

[14] 

L. Liang, C. Liu, Y.-Q. Xu, B. Guo, and H.-Y. Shum, “Real-time texture synthesis by patch- based sampling,” ACM Trans. Graph., vol. 20, no. 3, pp. 127 – 150, 2001.

[15]  A. A. Efros and W. T. Freeman, “Image quilting for texture synthesis and transfer,” in Proc. 28th Annu. Conf. Comput. Graph. Interact. Techn., 2001, pp.341 – 346.

[16]  Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354 – 362, Mar. 2006.[17]  X. Li, B. Li, B. Yang, and T. Zeng, “General framework to histogramshifting- based reversible data hiding,” IEEE Trans. Image Process., vol. 22, no. 6, pp.

2181 – 2191, Jun. 2013.[18]  J. L. Rodgers and W. A. Nicewander, “Thirteen ways to look at the correlation coefficient,” Amer. Statist., vol. 42, no. 1, pp. 59 – 66, 1988.[19]  Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: From error visibility to structural similarity,” IEEE Trans. Image

Process., vol. 13, no. 4, pp. 600 – 612, Apr. 2004.[20]  F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062 – 1078, Jul. 1999.[21]  Y.-M. Cheng and C.-M. Wang, “A high-capacity steganographic approach for 3D polygonal meshes,” Vis. Comput., vol. 22, nos. 9 – 11, pp. 845 – 855, 2006.[22]  X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826 – 832, Apr. 2012.[23]  R. B. Wolfgang and E. J. Delp, “A watermarking technique for digital imagery: Further studies,” in Proc. IEEE Int. Conf. Imaging, Systems, and Technology,

Las Vegas, NV, June 30 – July 3, 1997, pp. 279 – 287.[24]  F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, vol. 66, no. 3, pp. 283 – 301, May 1998.[25]  A. Herrigel, J. J. K. O’Ruanaidh, H. Petersen, S. Pereira, and T. Pun, “Secure copyright protection techniques for digital images,” in Information Hiding:

Second Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998, pp. 169 – 190.[26]  M. D. Swanson, B. Zu, and A. H. Tewfik, “Robust data [27]  hiding for images,” in Proc. IEEE 7th Digital Signal Processing Workshop (DSP 96), Loen, Norway, Sept. 1996, pp. 37 – 40.[28]

 

G. C. Langelaar, J. C. A. van der Lubbe, and R. L. Lagendijk “Robust labeling methods for copy protection of images,” in Storage and Retrieval for Imageand Video Database V, vol. 3022, I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE, pp. 298 – 309.

[29] [30]  J. Zhao and E. Koch, “Embedding robust labels into images for copyright protection,” in Int. Congr. Intellectual Property Rights for Specialised Information,

Knowledge and New Technologies, Vienna, Austria, Aug. 1995.[31]  G. Schott, Schola Steganographica: In Classes Octo Distributa (Whipple Collection). Cambridge, U.K.: Cambridge Univ., 1680.[32]  J. Reeds, “Solved: The ciphers in book III of Trithemius’ steganographia,” Cryptologia, vol. XXII, no. 4, pp. 291 – 317, Oct. 1998.[33]

 

D. Kahn, The Codebreakers — The Story of Secret Writing. New York: Scribner, 1996.[34]  A. Kerckhoffs, “La cryptographie militaire,” J. Sciences Militaires,[35]  vol. 9, pp. 5 – 38, Jan. 1883.[36]  R. J. Anderson, “Liability and computer security: Nine principles,” in Computer Security —3rd Europ. Symp. Research in Computer Security (ESORICS’94)

(Lecture Notes in Computer Science), vol. 875, D. Gollmann, Ed. Berlin, Germany: Springer-Verlag, pp. 231 – 245.[37]  J. Baltruˇsaitis, “Anamorphoses ou thaumaturgus opticus,” in Les Perspectives D´eprav´ees. Paris, France: Flammarion, 1984, pp. 5 and 15 – 19.[38]

 

A. Seckel, “Your mind’s eye: Illusions & paradoxes of the visual system,” presented at National Science Week, Univ. Cambridge, Cambridge, U.K., Mar.

1998. [Online]. Available WWW: http://www.illusionworks.com/.[39]  Herodotus, The Histories. London, U.K.: J. M. Dent & Sons, M1992, ch. 5 and 7.[40]  B. Newman, Secrets of German Espionage. London, U.K.:Robert Hale, 1940.[41]  WitnesSoft and ScarLet security software. (1997, Apr.). Aliroo home page. [Online]. Available WWW: http://www.aliroo.com/.[42]  J. C. Murphy, D. Dubbel, and R. Benson, “Technology approaches to currency security,” in Optical Security and Counterfeit Deterrence Techniques II, vol.

3314, R. L. van Renesse, Ed.. San Jose, CA: IS&T and SPIE, 1998, pp. 21 – 28.[43]  G. W. W. Stevens, Microphotography — Photography and Photofabrication at Extreme Resolutions. London, U.K.: Chapman & Hall, 1968.[44]

 

D. Brewster, “Microscope,” in Encyclopædia Britannica or the Dictionary of Arts, Sciences, and General Literature, vol. XIV, 8th ed. Edinburgh, U.K.:Britannica, 1857, pp. 801 – 802.

[45]  G. Tissandier, Les Merveilles de la Photographie. Paris, France: Librairie Hachette & Cie, 1874, ch. 6, pp. 233 – 248.[46]  J. Hayhurst. (1970). The pigeon post into Paris 1870 – 1871. [Online]. Available WWW: http://www.windowlink.com/jdhayhurst/pigeon/pigeon.html.[47]  J. E. Hoover, “The enemy’s masterpiece of espionage,” The Reader’s Dig., vol. 48, pp. 49 – 53, May 1946.[48]  J. F. Delaigle, C. De Vleeschouwer, and B. Macq, “Watermarking algorithm based on a human visual model,” Signal Processing, vol. 66, no. 3, pp. 319 – 335,

May 1998.

Page 7: Steganography Using Lossless Reversible Data Hiding on Encrypted Image

8/16/2019 Steganography Using Lossless Reversible Data Hiding on Encrypted Image

http://slidepdf.com/reader/full/steganography-using-lossless-reversible-data-hiding-on-encrypted-image 7/7

Steganography using Lossless Reversible Data Hiding on Encrypted Image (IJSTE/ Volume 2 / Issue 10 / 041)

All rights reserved by www.ijste.org  204 

[49]  L. Boney, A. H. Tewfik, and K. N. Hamdy, “Digital watermarks for audio signals,” in Proc. 1996 IEEE Int. Conf. Multimedia Computing and Systems,Hiroshima, Japan, June 17 – 23, 1996, pp. 473 – 480.

[50]  F. Goffin, J.-F. Delaigle, C. D. Vleeschouwer, B. Macq, and J.-J. Quisquater, “A low cost perceptive digital picture watermarking thin and R. C. Jain, Eds.

San[51]  Jose, CA: IS&T and SPIE, 1997, pp. 264 – 277.[52]

 

 N. Jayant, J. Johnston, and R. Safranek, “Signal compression based on models of human perception,” Proc. IEEE, vol. 81, pp. 1385 – 1422, Oct. 1993.[53]

 

B. C. J. Moore, An Introduction to the Psychology of Hearing, 3rd ed. London, U.K.: Academic, 1989.[54]  Information Technology — Generic Coding of Moving Pictures and Associated Audio Information — Part 3: Audio., British Standard, BSI, implementation of

ISO/IEC 13818-3:1995, Oct. 1995.