a novel algorithm for speech based authentication of digital images using dwt
TRANSCRIPT
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
1/11
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 1, Issue 7, July !1"#
I$$% &"' "'&
" * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or
A %ovel Alorithm For $peech /ased Authentication 0f
iital Imaes 2sin 34.
Atul Dwivedi1, Raghvendra Bhushan2
National Institute Of Technology Raiur, National Institute Of Technology Raiur
atul.!oin"g#ail.co#, raghvendra2$%&"g#ail.co#,
A / $ 4 R A C 4
$ecurity of important data has al-ays 5een animportant necessity of human 5ein# 4raditionally
important used to 5e stored in form of papers# evelopment of diital computers and computin
technoloies has ena5led data to 5e secured diitally# 6any alorithms have 5een developed for
securin tet data# 6any secure data transmission applications has 5een developed#
Authentication is used for securin content for authentication# Authentication can 5e done in
special domain, spectral domain and in hy5rid domain# In this paper -e have proposed a novelalorithm to em5ed an audio sinal into an imae usin discrete -avelet transform and a
framentin scheme# 4his alorithm provides a 5etter and faster encodin and decodin process
as compared to traditional methods#
Inde 4erms8 Authentication9 -avelet transform9 speech authentication9 diit place partitionin9
:$%R, 6$;
I# I%4R02C4I0%
Digital co##unication and storage technology is i#roving very raidly. It has #ade conversion and
reroduction of intellectual roerty very easy '1(. Authentication is the way to rotect this roerty.
Authentication can )e used to authenticate the owners, license infor#ation, or other infor#ation related
to the digital o)!ect carrying the water#ar*. +ater#ar* can )e used to chec* the irated coy of the data
'2(. I#age Authentication is a very secure Authentication. The Authentication caacity of an i#age is
calculated )y entroy of the i#age.
- / log2/ 0 0 0 0 0 0 0 0 0 . 1
+here / is histogra# counts. 3istogra# reresents fre4uency of articular i5el in an i#age. ntroycan )e used to chec* which i#age 6over i#age is #ost suita)le for hiding i#ortant infor#ation. It is
erfor#ed on two i#age shown. In ca#era#an i#age entroy is 7.%% and in circuit i#age entroy is
8.$&, therefore first i#age is )est suita)le for i#age Authentication.
In Authentication, a controlled distortion introduced into an i#age with a roer algorith#. This
algorith# is called encoding algorith# whereas for authentication of the i#age a decoding algorith# is
used. I#age is large data)ase of i5els. In this data)ase, encoding algorith#s usually identify redundant
data. This redundant data is relaced with the water#ar* data. 9everal algorith#s have )een roosed in
this field in satial do#ain, fre4uency do#ain and in hy)rid do#ain. In satial do#ain encrytion is on
i5el values, in sectral do#ain in transfor# coefficients and hy)rid do#ain, encrytion are )ased oncertain sche#es. In this aer, we shall first discuss different traditional #ethods for digital i#age
Authentication then roosed sche#e of authentication. At last we have resented resulted o)tained
after i#le#entation of roosed sche#e.
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
2/11
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 1, Issue 7, July !1"#
I$$% &"' "'&
* + !1", IJAFRC All Rihts Reserved ---#i.afrc#or
II# $:A4IA< 06AI% A24=;%4ICA4I0%
In satial do#ain digital i#age Authentication is done )y #odifying the i5el values of the host i#age
':(. It was started with #odifying least significant )it lane of an i#age. To level authentication is done
)y #odifying ;9B lane and 2nd lane near to the ;9B lane. This is done )y considering the fact that
;9B lane has very less significance in the i#age. A Rig1 reresents ;9B coding techni4ue. It can )e o)served fro# the i#age of
;9B and 2ndlane that they do not contain i#ortant infor#ation. I#ortant infor#ation is stored in
7thand =thlane which are near to ?9B. It can )e concluded that ;9B and )it lanes near to ;9B can )e
used for encoding. >ig 1i reresents all the )it lanes co#)ined. Then fig 1 * reresents all )it
lanes co#)ined with ;9B lane relaced )y fig1 !.
a ) c d
e f g h
i ! *
Fiure 18 $eparation of 5it planes for
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
3/11
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 1, Issue 7, July !1"#
I$$% &"' "'&
> * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or
-C#a5',( 00000000. 2
+here,
is selected coefficient and is noise sensitivity inde5,
Di is the 4uantiation ste and the value of * is in )etween @ and 8. By this Authentication #a5i#u#
acco##odated /9NR for rando# noise is 22.1 dB..
In literature, it is said that in transfor# do#ain it is )etter than secial do#ain. These are found to )etter
in ter#s of visi)ility and security of the water#ar*. In satial do#ain, D6T has )een )etter than the D>T
in ter#s of security. 9o#e author has clai#ed that Authentication should )e done at low fre4uencies '2(
'&(, so#e of the# say that Authentication should )e done at higher fre4uencies '@(, '7(. In fact in so#e of
the literatures it has )een roved that ro)ust water#ar* can )e o)tained using adatively so#e sectral
co#onents in so#e evolutionary #anner.
IV# =@/RI A24=;%4ICA4I0%
In transfor#ing to the fre4uency do#ain, ti#e infor#ation is lost. +hen loo*ing at a >ourier transfor# of
a signal, it is i#ossi)le to tell when a articular event too* lace. Ti#ing infor#ation is very i#ortant
in various i#ortant signal li*e )eginning of the signal, end of the signal, a)rut changes etc. In an effort
to correct this ro)le#, Dannis ourier transfor# to analye a very s#all
fraction of the signal at a ti#e, this techni4ue is called windowing techni4ue. This transfor# is called
9T>T. The 9T>T reresents a sort of co#ro#ise )etween the ti#e and fre4uency)ased views of a
signal.
+avelet analysis reresents the ne5t logical steE a windowing techni4ue with varia)lesied regions.
+avelet analysis allows the use of long ti#e intervals where we want #ore recise low fre4uency
infor#ation, and shorter regions where we want high fre4uency infor#ation '=(. >or #any signals, the
lowfre4uency content is the #ost i#ortant art. It is what gives the signal its identity. The high
fre4uency content, on the other hand, is not very i#ortant. 6onsider a hu#an voice If you re#ove the
highfre4uency co#onents, the voice sounds different, )ut you can still tell whatFs )eing said. 3owever,
if you re#ove enough of the lowfre4uency co#onents, you hear gi))erish. In our authentication syste#
we have ta*en these advantages into account for e#)edding seech into facial i#ages using digit lace
artitioning.>ig. 2 reresents difference )etween satial do#ain aroaches and sectral do#ain
aroaches, It can )e easily seen that wavelet analysis also have scaling infor#ation that is i#ortant for
identifying i#ortant art of a signal or i#age.
Fiure 8 ifference 5et-een different spectral and hy5rid analysis techniues
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
4/11
Internati
7 * + !1", IJAFRC All Rihts Re
+avelet transfor# has )een ro
authentication syste#s.
V# :R0:0$; $C=;6;
In general a seudo rando# se4uei#rove#ent a recognied signat
encoded they are vulnera)le to a
ersonFs na#e as encoding *ey
authentication syste#.
Fiure&8 :roc
>ig. : reresents a flowchart of
i#ages are to )e authenticated are
algorith# resented in the co#ing
In the arallel rocess an i#age of
of water#ar* is done using e4uatio
Authentication involves e4uation
authenticated i#age I+ is given )
3ere Ii and +i can )e low fre4uenc
VI# $:;;C= 4;6:
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
5/11
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 1, Issue 7, July !1"#
I$$% &"' "'&
' * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or
Two nu#)ers of the a#ong the searated digits of array ele#ent are used to for# a nu#)er which is
allotted to one of the three #atrices say B corresondingly the other two nu#)er searated fro# the
array ele#ents digits are used to for# another nu#)er which is allotted to the corresonding ele#ent
of the other #atri5 say
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
6/11
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 1, Issue 7, July !1"#
I$$% &"' "'&
* + !1", IJAFRC All Rihts Reserved ---#i.afrc#or
Fiure "8 Flo- iaram for ;ncryption Fiure 8 Flo- iaram for ecryption
>igure & deicts the co#lete rocess of encrytion. Any ele#ent Li is )ro*en down to its digit laces
an then those digits are used to for# three nu#)ers for red, green and )lue fra#es which are #erged
together to for# a Rigure @ deicts the rocess of decrytion of sound fro# the encryted i#age. In this the i#age is again
searated into its R,
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
7/11
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 1, Issue 7, July !1"#
I$$% &"' "'&
>! * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or
Fiure > 8 0riinal $ound Fiure 78 Imae 4emplate Benerated From $ound
Fiure '8 Imae /efore ;ncryption Fiure 8 Imae After ;ncryption
Fiure 1!8 ecoded 4emplate Fiure 118 $ound ecoded From 4emplate
A)ove figures, show the all the i#ages generated at various stes of rocess fro# te#late generation,
encrytion to decrytion and o)taining the original sound.
>or analying this sche#e we have ta*en facial i#ages of 1% different ersons as shown in ta)le1 and
alied this algorith# to these i#ages. 9eech signals of every erson has )een recorded as shown in
ta)le1.
$#%0 0riinal imaes Correspondin voices 4emplates ;ncrypted imaes
1
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
8/11
Internati
>1 * + !1", IJAFRC All Rihts Re
&
"
>
7
'
onal Journal of Advance Foundation and Resea
Volume 1, Issue 7, Jul
erved
ch in Computer (IJAFRC)
y !1"#
I$$% &"' "'&
---#i.afrc#or
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
9/11
Internati
> * + !1", IJAFRC All Rihts Re
1!
4a5le 18 Represents oriinal ima
imae in
Authenticated i#ages with te#l
i#age has )een generated as show
The e5eri#ents were carried o
evaluation factors li*e /9NR and
eer,
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
10/11
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 1, Issue 7, July !1"#
I$$% &"' "'&
>& * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or
Fiure 1&8 6ean $uare ;rror Analysis 0f 1! Imaes 4a?en For ;perimentation
VIII# C0%C, Qutter ?, ?ulti#edia water#ar*ing Techni4ue,S I roceeding on 9ignal/rocessing,S vol.=7, No.7, .1%7$11%7, uly 1$$$
':( R. . Bartolini, P. 6aellini, A. /iva, and >. Rigacci, A ?.A./. identification criterion for
D6T)ased water#ar*ing,S in /roc. uro. 9ignal /rocessing 6onf. V9I/6O F$=, Rhodes,
-
8/12/2019 A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT.
11/11
International Journal of Advance Foundation and Research in Computer (IJAFRC)
Volume 1, Issue 7, July !1"#
I$$% &"' "'&
>" * + !1", IJAFRC All Rihts Reserved ---#i.afrc#or
'8( R.. Bartolini, P. 6aellini, A. /iva, and >. Rigacci, A ?.A./. identification criterion for
D6T)ased water#ar*ing,S in /roc. uro. 9ignal /rocessing 6onf. V9I/6O F$=, Rhodes,