PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

SVD Audio Watermarking: A Tool to Enhance the Security of Image Transmission over ZigBee Networks

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The security is important issue in wireless networks. This paper discusses audio watermarking as a tool to improve the security of image communication over the IEEE 802.15.4 ZigBee network. The adopted watermarking method implements the Singular-Value Decomposition (SVD) mathematical technique. This method is based on embedding a chaotic encrypted image in the Singular Values (SVs) of the audio signal after transforming it into a 2-D format. The objective of chaotic encryption is to enhance the level of security and resist different attacks. Experimental results show that the SVD audio watermarking method maintains the high quality of the audio signals and that the watermark extraction and decryption are possible even in the presence of attacks over the ZigBee network.
Rocznik
Tom
Strony
99--107
Opis fizyczny
Bibliogr.18 poz., rys.
Twórcy
autor
autor
Bibliografia
  • [1] G. Pekhteryev, Z. Sahinoglu, P. Orlik, and G. Bhatti, “Image transmission over IEEE 802.15.4 and ZigBee Networks”, in Proc. IEEE ISCAS, Kobe, Japan, May 2005.
  • [2] B. Macq, J. Dittmann, and E. J. Delp, “Benchmarking of image watermarking algorithms for digital rights management”, Proc. Of the IEEE, vol. 92, no. 6, pp. 971–984, 2004.
  • [3] Z. M. Lu, D. G. Xu, and S. H. Sun, “Multipurpose image water- marking algorithm based on multistage vector quantization”, IEEE Trans. Image Process., vol. 14, no. 6, pp. 822–831, 2005.
  • [4] H. S. Kim and H. K. Lee, “Invariant image watermark using zernike moments”, IEEE Trans. Circ. Syst. Video Technol., vol. 13, no. 8, pp. 766–775, 2003.
  • [5] W. C. Chu, “ DCT-based image watermarking using subsampling”, IEEE Trans. Multimedia, vol. 5, no. 1, pp. 34–38, 2003.
  • [6] L. Ghouti, A. Bouridane, M. K. Ibrahim, and Said Boussakta, “Digital image watermarking using balanced multiwavelets”, IEEE Trans. Signal Process., vol. 54, no. 4, pp. 1519–1536, 2006.
  • [7] S. Xiang and J. Huang, “Histogram-based audio watermarking against time-scale modification and cropping attacks”, IEEE Trans. Multimedia, vol. 9, no. 7, pp. 1357–1372, 2007.
  • [8] Z. Liu and A. Inoue, “Audio watermarking techniques using sinusoidal patterns based on pseudorandom sequences”, IEEE Trans. Circ. Systems Video Technol., vol. 13, no. 8, pp. 801–812, 2003.
  • [9] A. N. Lemma, J. Aprea, W. Oomen, and L. V. de Kerkhof, “A temporal domain audio watermarking technique”, IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1088–1097, 2003.
  • [10] M. A. M. El-Bendary, A. E. Abou-El-Azzm, N. A. El-Fishawy, M. El-Tokhy, F. Shawki, F. E. Abd-El-Samie, and H. B. Kazemian, “An efficient chaotic interleaver for image transmission over IEEE 802.15.4 Zigbee network”, J. Telelecom. Inform. Technol. JTIT, vol. 2, no. 1, pp. 67–73, 2011.
  • [11] Q. He, Q. Qi, Y. Zhao, W. Huang, anf Q. Huang, “The application of chaotic encryption in industrial control based on ZigBee wireless network”, in Proc. Int. Symp. Systems Control Aerosp. Astronaut. ISSCAA 2008, Shenzhen, China, 2008.
  • [12] M. Ise, Y. Ogasahara, K. Watanabe, M. Hatanaka, T. Onoye, H. Niwamoto, I. Keshi, and I. Shirakawa, “Design and implementation of home network protocol for appliance control based on IEEE 802.15.4”, International J. Comput. Sci. Netw. Secur., vol. 7 no. 7, July 2007.
  • [13] B. P. Lathi, Modern Digital and Analog Communication Systems. 2nd edition. Philadelphia: Holt, Rinehart and Winston, 1989.
  • [14] R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership”, IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121–128, March 2002.
  • [15] X. Sun, J. Liu, J. Sun, Q. Zhang and W. Ji, “ A robust image watermarking scheme based-on the relationship of SVD”, in Proc. Int. Conf. Intelligent Inf. Hiding and Multimedia Sig. Process., Harbin, China, 2008.
  • [16] X. Zhu, J. Zhao and H. Xu, “A digital watermarking algorithm and implementation based on improved SVD”, in Proc. 18th Int. Conf. Pattern Recognition ICPR’06, Hong Kong, China, 2006.
  • [17] W. C. Jakes, Microwave Mobile Communications. New York: Wiley, 1975.
  • [18] J. Aldrich, “Correlations genuine and spurious in Pearson and Yule”, Statist. Sci., vol. 10, no. 4, pp. 364–376, 1995.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0015-0024
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.