a novel algorithm for speech based authentication of digital images using dwt

Upload: ijafrc

Post on 03-Jun-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    1/11

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 1, Issue 7, July !1"#

    I$$% &"' "'&

    " * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or

    A %ovel Alorithm For $peech /ased Authentication 0f

    iital Imaes 2sin 34.

    Atul Dwivedi1, Raghvendra Bhushan2

    National Institute Of Technology Raiur, National Institute Of Technology Raiur

    atul.!oin"g#ail.co#, raghvendra2$%&"g#ail.co#,

    A / $ 4 R A C 4

    $ecurity of important data has al-ays 5een animportant necessity of human 5ein# 4raditionally

    important used to 5e stored in form of papers# evelopment of diital computers and computin

    technoloies has ena5led data to 5e secured diitally# 6any alorithms have 5een developed for

    securin tet data# 6any secure data transmission applications has 5een developed#

    Authentication is used for securin content for authentication# Authentication can 5e done in

    special domain, spectral domain and in hy5rid domain# In this paper -e have proposed a novelalorithm to em5ed an audio sinal into an imae usin discrete -avelet transform and a

    framentin scheme# 4his alorithm provides a 5etter and faster encodin and decodin process

    as compared to traditional methods#

    Inde 4erms8 Authentication9 -avelet transform9 speech authentication9 diit place partitionin9

    :$%R, 6$;

    I# I%4R02C4I0%

    Digital co##unication and storage technology is i#roving very raidly. It has #ade conversion and

    reroduction of intellectual roerty very easy '1(. Authentication is the way to rotect this roerty.

    Authentication can )e used to authenticate the owners, license infor#ation, or other infor#ation related

    to the digital o)!ect carrying the water#ar*. +ater#ar* can )e used to chec* the irated coy of the data

    '2(. I#age Authentication is a very secure Authentication. The Authentication caacity of an i#age is

    calculated )y entroy of the i#age.

    - / log2/ 0 0 0 0 0 0 0 0 0 . 1

    +here / is histogra# counts. 3istogra# reresents fre4uency of articular i5el in an i#age. ntroycan )e used to chec* which i#age 6over i#age is #ost suita)le for hiding i#ortant infor#ation. It is

    erfor#ed on two i#age shown. In ca#era#an i#age entroy is 7.%% and in circuit i#age entroy is

    8.$&, therefore first i#age is )est suita)le for i#age Authentication.

    In Authentication, a controlled distortion introduced into an i#age with a roer algorith#. This

    algorith# is called encoding algorith# whereas for authentication of the i#age a decoding algorith# is

    used. I#age is large data)ase of i5els. In this data)ase, encoding algorith#s usually identify redundant

    data. This redundant data is relaced with the water#ar* data. 9everal algorith#s have )een roosed in

    this field in satial do#ain, fre4uency do#ain and in hy)rid do#ain. In satial do#ain encrytion is on

    i5el values, in sectral do#ain in transfor# coefficients and hy)rid do#ain, encrytion are )ased oncertain sche#es. In this aer, we shall first discuss different traditional #ethods for digital i#age

    Authentication then roosed sche#e of authentication. At last we have resented resulted o)tained

    after i#le#entation of roosed sche#e.

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    2/11

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 1, Issue 7, July !1"#

    I$$% &"' "'&

    * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or

    II# $:A4IA< 06AI% A24=;%4ICA4I0%

    In satial do#ain digital i#age Authentication is done )y #odifying the i5el values of the host i#age

    ':(. It was started with #odifying least significant )it lane of an i#age. To level authentication is done

    )y #odifying ;9B lane and 2nd lane near to the ;9B lane. This is done )y considering the fact that

    ;9B lane has very less significance in the i#age. A Rig1 reresents ;9B coding techni4ue. It can )e o)served fro# the i#age of

    ;9B and 2ndlane that they do not contain i#ortant infor#ation. I#ortant infor#ation is stored in

    7thand =thlane which are near to ?9B. It can )e concluded that ;9B and )it lanes near to ;9B can )e

    used for encoding. >ig 1i reresents all the )it lanes co#)ined. Then fig 1 * reresents all )it

    lanes co#)ined with ;9B lane relaced )y fig1 !.

    a ) c d

    e f g h

    i ! *

    Fiure 18 $eparation of 5it planes for

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    3/11

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 1, Issue 7, July !1"#

    I$$% &"' "'&

    > * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or

    -C#a5',( 00000000. 2

    +here,

    is selected coefficient and is noise sensitivity inde5,

    Di is the 4uantiation ste and the value of * is in )etween @ and 8. By this Authentication #a5i#u#

    acco##odated /9NR for rando# noise is 22.1 dB..

    In literature, it is said that in transfor# do#ain it is )etter than secial do#ain. These are found to )etter

    in ter#s of visi)ility and security of the water#ar*. In satial do#ain, D6T has )een )etter than the D>T

    in ter#s of security. 9o#e author has clai#ed that Authentication should )e done at low fre4uencies '2(

    '&(, so#e of the# say that Authentication should )e done at higher fre4uencies '@(, '7(. In fact in so#e of

    the literatures it has )een roved that ro)ust water#ar* can )e o)tained using adatively so#e sectral

    co#onents in so#e evolutionary #anner.

    IV# =@/RI A24=;%4ICA4I0%

    In transfor#ing to the fre4uency do#ain, ti#e infor#ation is lost. +hen loo*ing at a >ourier transfor# of

    a signal, it is i#ossi)le to tell when a articular event too* lace. Ti#ing infor#ation is very i#ortant

    in various i#ortant signal li*e )eginning of the signal, end of the signal, a)rut changes etc. In an effort

    to correct this ro)le#, Dannis ourier transfor# to analye a very s#all

    fraction of the signal at a ti#e, this techni4ue is called windowing techni4ue. This transfor# is called

    9T>T. The 9T>T reresents a sort of co#ro#ise )etween the ti#e and fre4uency)ased views of a

    signal.

    +avelet analysis reresents the ne5t logical steE a windowing techni4ue with varia)lesied regions.

    +avelet analysis allows the use of long ti#e intervals where we want #ore recise low fre4uency

    infor#ation, and shorter regions where we want high fre4uency infor#ation '=(. >or #any signals, the

    lowfre4uency content is the #ost i#ortant art. It is what gives the signal its identity. The high

    fre4uency content, on the other hand, is not very i#ortant. 6onsider a hu#an voice If you re#ove the

    highfre4uency co#onents, the voice sounds different, )ut you can still tell whatFs )eing said. 3owever,

    if you re#ove enough of the lowfre4uency co#onents, you hear gi))erish. In our authentication syste#

    we have ta*en these advantages into account for e#)edding seech into facial i#ages using digit lace

    artitioning.>ig. 2 reresents difference )etween satial do#ain aroaches and sectral do#ain

    aroaches, It can )e easily seen that wavelet analysis also have scaling infor#ation that is i#ortant for

    identifying i#ortant art of a signal or i#age.

    Fiure 8 ifference 5et-een different spectral and hy5rid analysis techniues

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    4/11

    Internati

    7 * + !1", IJAFRC All Rihts Re

    +avelet transfor# has )een ro

    authentication syste#s.

    V# :R0:0$; $C=;6;

    In general a seudo rando# se4uei#rove#ent a recognied signat

    encoded they are vulnera)le to a

    ersonFs na#e as encoding *ey

    authentication syste#.

    Fiure&8 :roc

    >ig. : reresents a flowchart of

    i#ages are to )e authenticated are

    algorith# resented in the co#ing

    In the arallel rocess an i#age of

    of water#ar* is done using e4uatio

    Authentication involves e4uation

    authenticated i#age I+ is given )

    3ere Ii and +i can )e low fre4uenc

    VI# $:;;C= 4;6:

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    5/11

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 1, Issue 7, July !1"#

    I$$% &"' "'&

    ' * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or

    Two nu#)ers of the a#ong the searated digits of array ele#ent are used to for# a nu#)er which is

    allotted to one of the three #atrices say B corresondingly the other two nu#)er searated fro# the

    array ele#ents digits are used to for# another nu#)er which is allotted to the corresonding ele#ent

    of the other #atri5 say

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    6/11

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 1, Issue 7, July !1"#

    I$$% &"' "'&

    * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or

    Fiure "8 Flo- iaram for ;ncryption Fiure 8 Flo- iaram for ecryption

    >igure & deicts the co#lete rocess of encrytion. Any ele#ent Li is )ro*en down to its digit laces

    an then those digits are used to for# three nu#)ers for red, green and )lue fra#es which are #erged

    together to for# a Rigure @ deicts the rocess of decrytion of sound fro# the encryted i#age. In this the i#age is again

    searated into its R,

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    7/11

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 1, Issue 7, July !1"#

    I$$% &"' "'&

    >! * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or

    Fiure > 8 0riinal $ound Fiure 78 Imae 4emplate Benerated From $ound

    Fiure '8 Imae /efore ;ncryption Fiure 8 Imae After ;ncryption

    Fiure 1!8 ecoded 4emplate Fiure 118 $ound ecoded From 4emplate

    A)ove figures, show the all the i#ages generated at various stes of rocess fro# te#late generation,

    encrytion to decrytion and o)taining the original sound.

    >or analying this sche#e we have ta*en facial i#ages of 1% different ersons as shown in ta)le1 and

    alied this algorith# to these i#ages. 9eech signals of every erson has )een recorded as shown in

    ta)le1.

    $#%0 0riinal imaes Correspondin voices 4emplates ;ncrypted imaes

    1

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    8/11

    Internati

    >1 * + !1", IJAFRC All Rihts Re

    &

    "

    >

    7

    '

    onal Journal of Advance Foundation and Resea

    Volume 1, Issue 7, Jul

    erved

    ch in Computer (IJAFRC)

    y !1"#

    I$$% &"' "'&

    ---#i.afrc#or

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    9/11

    Internati

    > * + !1", IJAFRC All Rihts Re

    1!

    4a5le 18 Represents oriinal ima

    imae in

    Authenticated i#ages with te#l

    i#age has )een generated as show

    The e5eri#ents were carried o

    evaluation factors li*e /9NR and

    eer,

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    10/11

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 1, Issue 7, July !1"#

    I$$% &"' "'&

    >& * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or

    Fiure 1&8 6ean $uare ;rror Analysis 0f 1! Imaes 4a?en For ;perimentation

    VIII# C0%C, Qutter ?, ?ulti#edia water#ar*ing Techni4ue,S I roceeding on 9ignal/rocessing,S vol.=7, No.7, .1%7$11%7, uly 1$$$

    ':( R. . Bartolini, P. 6aellini, A. /iva, and >. Rigacci, A ?.A./. identification criterion for

    D6T)ased water#ar*ing,S in /roc. uro. 9ignal /rocessing 6onf. V9I/6O F$=, Rhodes,

  • 8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.

    11/11

    International Journal of Advance Foundation and Research in Computer (IJAFRC)

    Volume 1, Issue 7, July !1"#

    I$$% &"' "'&

    >" * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or

    '8( R.. Bartolini, P. 6aellini, A. /iva, and >. Rigacci, A ?.A./. identification criterion for

    D6T)ased water#ar*ing,S in /roc. uro. 9ignal /rocessing 6onf. V9I/6O F$=, Rhodes,