[ieee 2012 20th iranian conference on electrical engineering (icee) - tehran, iran...

5
20th Iranian Conferance on Electrical Engineering,(ICEE2012),May 15-17,2012,Tehran,Iran Robust Audio Watermaringbased on HWDandSVD Saeed Karimimehr\ Shadrokh Samavi2, Hoda Rezaee Kaviani 3, Mojtaba Mahdavi4 Dept. Electrical and Computer Engineering Isfahan University of Technology Isfahan, Iran saeed. karimimehr@gmail. com l ,samavi96@cc. iut. ac. ir 2 , h. rezaeekaviani@ec. iut. ac. ir 3 , mahdavi@ec. iut. ac. ir 4 Abstract-To protect copyright of audio signals several watermarking algorithms have been proposed in recent years. Many of them are based on wavelet transform but these methods are not robust enough against signal processing attacks. This paper presents a new audio watermarking algorithm based on Hybrid wavelets and Directional Filter banks (HWD) and Singular Value Decomposition (SVD). The proposed method embeds the watermark in the directional subbands of audio matrix. To do multiple embedding, framing is used and each frame is split to two parts. The first one is used for the synchronization code and the other for watermark embedding. Synchronization code is embedded in time domain to achieve more efficiency and watermark is embedded in SVD-blocks of different directions using HWD. Experimental results show that proposed method has increased robustness and imperceptibility. It also has an acceptable data payload. Kwords-component; audio watermarking; hybrid wavelets and directional filterbanks; SVD I. INTRODUCTION Due to growth of Inteet and computer networks, digital multimedia contents can easily be exchanged among people. This ease of distribution and accuracy of these methods to duplicate a multimedia in an inexpensive way caused tough challenges to copyright protection and intellectual property. A response to this problem is digital watermarking [1] which includes three main categories: image, audio and video watermarking. Although audio and image watermarking are similar in some aspects but there are more complications in audio watermarking. For example the Human Auditory System (HAS) is much more sensitive to changes than the Human Visual System (HVS). The other challenge is that, the ratio of the highest to the lowest audible equency is approximately 1,000 (range of 20Hz-20 kHz) where this ratio for light waves we can see is a factor of 2 [2]. Opposite to its large dynamic range, HAS contains a fairly small differential range, i.e. loud sounds generally tend to mask out weaker sounds [3]. According to IFPI (International Federation of the Phonographic Industry), an audio watermarking must have some minimum properties: (1) A watermarked audio signal should maintain more than 20 dB SNR. (2) Watermarked signals should not reveal any clues about the watermarks in them. Also, the security of the watermarking procedure must depend on secret keys, but not on the secrecy of the watermarking algorithm. (3) A watermarking scheme must have the ability to extract the watermark om a watermarked audio signal aſter applying various signal processing attacks. (4) The amount of data that can be embedded into the host audio signal without losing imperceptibility (Payload) should be more than 20 bps. There are mainly two types of attacks which may distort a watermarked audio: (1) Modiing the amplitude of audio signal which results in the lost of parts of hided information. These attacks include noise corruption, amplitude scaling, re- sampling, and MP3 compression. (2) Destroying synchronization of the watermark in time domain that is more effective than corrupting watermarked audio amplitude directly and includes attacks such as time scaling, shiſting and cropping. There are few methods which withstand against synchronization attacks. A lot of audio watermarking schemes based on the WT (Wavelet Transform) have been introduced [4] in recent years. To overcome some of the restrictions of the WT, in [5, 6] authors introduced the liſting scheme of wavelets for the first time. An algorithm based on LWT (Liſting Wavelet Transform) is proposed by [7], which has showed that watermark detection can be implemented quickly without presence of the original signal, but the method is not very robust. Another improved algorithm presented by [ 8] proposes a method of quantization that is more robust. One of the main problems that most of the methods had was their weakness against synchronization attacks. It means that for example once the position was lost by random cropping, the proper watermark cannot be detected easily. The method in [9] uses a synchronization signal in embedding procedure and in extraction phase, the detection begins aſter the synchronization signal is located. Although this method can resist some random cropping attacks, the watermark still cannot be extracted properly if the watermarked signal is cut. In [10] a liſting wavelet domain audio watermarking algorithm based on the statistical characteristics of sub-band coefficients is proposed. This method uses self synchronization but since it embeds the synchronization code in wavelet domain, the detection procedure is very time consuming. Altogether its robustness is not so good. Aſter representing directional transforms, it has been shown [11, 12] that they are more 97 8-1-4673-114 8-9112/$3l.00 ©2012 IEEE 1363

Upload: mojtaba

Post on 06-Oct-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: [IEEE 2012 20th Iranian Conference on Electrical Engineering (ICEE) - Tehran, Iran (2012.05.15-2012.05.17)] 20th Iranian Conference on Electrical Engineering (ICEE2012) - Robust audio

20th Iranian Conferance on Electrical Engineering, (ICEE2012), May 15-17,2012, Tehran, Iran

Robust Audio Watermarl<ingbased on HWDandSVD

Saeed Karimimehr\ Shadrokh Samavi2, Hoda Rezaee Kaviani 3, Mojtaba Mahdavi4 Dept. Electrical and Computer Engineering

Isfahan University of Technology Isfahan, Iran

saeed. karimimehr@gmail. coml ,samavi96@cc. iut. ac. ir2, h. rezaeekaviani@ec. iut. ac. ir3, mahdavi@ec. iut. ac. ir4

Abstract-To protect copyright of audio signals several watermarking algorithms have been proposed in recent years. Many of them are based on wavelet transform but these methods are not robust enough against signal processing attacks. This paper presents a new audio watermarking algorithm based on Hybrid wavelets and Directional Filter banks (HWD) and Singular Value Decomposition (SVD). The proposed method embeds the watermark in the directional subbands of audio matrix. To do multiple embedding, framing is used and each frame is split to two parts. The first one is used for the synchronization code and the other for watermark embedding. Synchronization code is embedded in time domain to achieve more efficiency and watermark is embedded in SVD-blocks of different directions using HWD. Experimental results show that proposed method has increased robustness and imperceptibility. It also has an acceptable data payload.

Keywords-component; audio watermarking; hybrid wavelets and directional filterbanks; SVD

I. INTRODUCTION

Due to growth of Internet and computer networks, digital multimedia contents can easily be exchanged among people. This ease of distribution and accuracy of these methods to duplicate a multimedia in an inexpensive way caused tough challenges to copyright protection and intellectual property. A response to this problem is digital watermarking [1] which includes three main categories: image, audio and video watermarking.

Although audio and image watermarking are similar in some aspects but there are more complications in audio watermarking. For example the Human Auditory System (HAS) is much more sensitive to changes than the Human Visual System (HVS). The other challenge is that, the ratio of the highest to the lowest audible frequency is approximately 1,000 (range of 20Hz-20 kHz) where this ratio for light waves we can see is a factor of 2 [2]. Opposite to its large dynamic range, HAS contains a fairly small differential range, i.e. loud sounds generally tend to mask out weaker sounds [3].

According to IFPI (International Federation of the Phonographic Industry), an audio watermarking must have some minimum properties: (1) A watermarked audio signal should maintain more than 20 dB SNR. (2) Watermarked signals should not reveal any clues about the watermarks in them. Also, the security of the watermarking procedure must depend on secret keys, but not on the secrecy of the

watermarking algorithm. (3) A watermarking scheme must have the ability to extract the watermark from a watermarked audio signal after applying various signal processing attacks. (4) The amount of data that can be embedded into the host audio signal without losing imperceptibility (Payload) should be more than 20 bps.

There are mainly two types of attacks which may distort a watermarked audio: (1) Modifying the amplitude of audio signal which results in the lost of parts of hided information. These attacks include noise corruption, amplitude scaling, re­sampling, and MP3 compression. (2) Destroying synchronization of the watermark in time domain that is more effective than corrupting watermarked audio amplitude directly and includes attacks such as time scaling, shifting and cropping. There are few methods which withstand against synchronization attacks.

A lot of audio watermarking schemes based on the WT (Wavelet Transform) have been introduced [4] in recent years. To overcome some of the restrictions of the WT, in [5, 6] authors introduced the lifting scheme of wavelets for the first time. An algorithm based on LWT (Lifting Wavelet Transform) is proposed by [7], which has showed that watermark detection can be implemented quickly without presence of the original signal, but the method is not very robust. Another improved algorithm presented by [ 8] proposes a method of quantization that is more robust. One of the main problems that most of the methods had was their weakness against synchronization attacks. It means that for example once the position was lost by random cropping, the proper watermark cannot be detected easily. The method in [9] uses a synchronization signal in embedding procedure and in extraction phase, the detection begins after the synchronization signal is located. Although this method can resist some random cropping attacks, the watermark still cannot be extracted properly if the watermarked signal is cut. In [10] a lifting wavelet domain audio watermarking algorithm based on the statistical characteristics of sub-band coefficients is proposed. This method uses self synchronization but since it embeds the synchronization code in wavelet domain, the detection procedure is very time consuming. Altogether its robustness is not so good. After representing directional transforms, it has been shown [11, 12] that they are more

97 8-1-4673-114 8-9112/$3l.00 ©2012 IEEE 1363

Page 2: [IEEE 2012 20th Iranian Conference on Electrical Engineering (ICEE) - Tehran, Iran (2012.05.15-2012.05.17)] 20th Iranian Conference on Electrical Engineering (ICEE2012) - Robust audio

efficient than wavelet in representing a two dimensional signal. It means that they capture significant information about an object of interest using a small description.

[n this paper a self synchronization method is presented which embeds a synchronization code in each frame of the original audio signal. The watermark is a binary logo which is embedded in SVD-blocks of different directional subbands of HWD transform. HWD transform is a new family of non­redundant multiresolution directional transforms presented by Eslami et al. [12]. In proposed method watermark is encrypted using Arnold map before embedding to prevent unauthorized detection. We call our method as Robust HWD based Algorithm (RoHA). Experimental results are compared with [10] and show high performance of proposed algorithm.

The rest of the paper is organized as follows: Section II explains the proposed audio watermarking approach. Section III gives the experimental results and evaluations and Section [V gives some concluding remarks.

II. PROPOSED METHOD

[n this section we intend to present the details of proposed algorithm but first we need some explanation of the chaotic encryption algorithm. Then Hybrid Wavelets and Directional Filter banks are briefly introduced. We also offer a short discussion on singular value decomposition. Then the embedding and extraction procedures are explained

A. Chaotic Encryption Algorithm

Chaotic maps are used to encrypt watermarks. In the literature of watermarking, chaotic maps prevent unauthorized detection.

Here we use the Arnold transform, since the Arnold transform is periodic, the number of scrambling can be considered as the key to enhance the security. The Arnold transform for an N by N matrix is shown below.

G) = G �)C)(mOdN) (1)

where (x, y) is the pixel of the watermarking image and (x', y') is the pixel of the watermarking image after scrambling.

B. Hybrid Wavelets and Directional Filterbanks

[n [[2] Eslami proposed a family of non redundant transforms using Hybrid Wavelets and Directional Filter banks. They extended the directionality of the wavelet transform by employing the DFBs to the high pass channels of the wavelet transform. Therefore, they used the name hybrid wavelets and directional filter banks (HWD) transform family. Since, in the WT, we already have horizontal and vertical sub bands, different paradigms could be considered to apply DFBs to the finest subbands of wavelets. They proposed two types of HWD transforms. Here we use HWD-F.

-X[n]

To the I--@---- next level

V1--€l

81 H2-

[I �­

Ig oc-

DFB Figure 1. Schematic plot of the HWD-F transform using I = 3

directional levels.

To achieve HWD-F we apply full-tree DFBs with /. levels j to all three highpass subbands of wavelets at levelsl � j � 1m. We denote the subbands by

VDCi) HD(i)and DD(i) J ' ] ]

(i E I�j) = {ill � i � Zlj}) (2)

(3)

A schematic diagram of the HWD-F transform is illustrated in Fig. l. Using the noble identities [13], we can move the DFB filters before down sampling by in the WT.

It is notable that we can use any number of directions in DFB stage and both stages, WT and HWD, are non-redundant. Consequently, the HWD transforms provide a family of non­redundant and flexible basis elements.

C. Singular value Decomposition

The singular value decomposition of a matrix is a factorization of the matrix into a product of three matrices. Given an m x n matrix A, where m ::::: n, the SVD of A is defined as A = USV'. Where U is a m x n column orthogonal matrix whose columns are referred to as left singular vectors: S = diag «(J1' (J2, ... , (In) is a n x n matrix whose diagonal elements are nonnegative singular values arranged in descending order: V is an n x n orthogonal matrix whose columns are referred to as right singular vectors. [f rank (A) = T, then S satisfies:

(J1 ::::: (J2 ::::: . . • ::::: (Jr ::::: (Jr+1 = (In = 0 (4)

According to [14] the singular values (SVs) of a matrix have very good stability, that is, when a small perturbation is added to a matrix, its SVs do not change significantly and SVs represent intrinsic algebraic properties of a matrix.

D. Embedding Process of RoHA

[n our method first we use framing in order to increase robustness against synchronization attacks. Each frame consists of two parts as depicted in Fig. 2.

Segment i

------------------�------------------r -.......

Synchronization Code Watermark Wei)

Figure 2. Construction of each frame

1364

Page 3: [IEEE 2012 20th Iranian Conference on Electrical Engineering (ICEE) - Tehran, Iran (2012.05.15-2012.05.17)] 20th Iranian Conference on Electrical Engineering (ICEE2012) - Robust audio

Watermark logo

Encryption

E1 E j

Embedding

(Block SVD)

W(i)

Tj

Figure 3. Watermark embedding flowchart for each frame

After framing we do the same action with all the frames as shown in the block diagram of Fig. 3. Note that the length of each segment depends on the data payload that we would like to embed. The larger the frame is, the more data can be embedded.

For synchronization code embedding we used the same method used in [15] which is in the time domain. Hence, searching for the synchronization code is performed faster than transform domain methods.

The description of blocks in Fig. 3 for embedding the watermark is as follows:

(1) Watermark logo: is a p x q binary image.

(2) Watermark encryption: In order to prevent unauthorized detection we used encryption as explained in section 2.1. The outcome of the encryption block (Ei) is broken into i = 3 X 2" row vectors. In this equation, 3 stands for number of wavelet subbands that are vertical, horizontal and diagonal in HWO and 2" is the number of directions used in DFB stage of HWD.

(3) Wavelet filter: To best merge the watermark and the signal it is better to embed the watermark in the most significant part of the signal. Here we used two levels

of OWT to reach to the lowest subband where there is concentration of most energy.

(4) Matrix formation: After finding the lowest frequency, the achieved one dimensional vector is reshaped to a two dimensional matrix (matrix formation).

(5) Hybrid Wavelets and Directional Filter bank: Here the output of wavelet is passed from the HWD block, According to section 2.2. Then for each sub band (H2, V2, 02), 2k submatrices are driven, each one shows one direction in corresponding subband. It means that there are i = 3 X 2" matrices (T;) in output of block #5.

(6) Embedding: In the embedding process each Ei vector is embedded in its corresponding Ti matrix. To do so, each bit of Ei vector is embedded in each block of corresponding matrix Ti as following steps:

Step]: Partition the Ti matrix into 20 matrix blocks Dj ,j =

1,2,00', M x M, each of size u x u, where M x M is the number of bits in the corresponding vector Ei. The row and column numbers of 20 blocks are selected by the user to achieve proper imperceptibility as well as robustness and the SVO of each block is computed.

Step2: Let ;V = (/l{, /l�, 00., /l�) be the vector of SVs of block Dj. The norm of this vector is computed as follows:

u

Zj = II/l j II = L (/l�)2 (5)

q=l

Step3: Compute the mean (mD') and standard deviation (eJD.) } }

for each block. Step4: The weight of each block is given by:

S j = Smean X mDj + Sstd x eJDj (6)

In equation (6) parameters of Smean and Sstd are user defined parameters. Step5: Amongst all S j values, the maximum and the minimum

are chosen and called SM and Sm respectively. Step6: To increase robustness and decrease distortion, we propose adaptive decision method for quantization steps, which is better than using constant steps. The quantization step I1j for block Dj is calculated adaptively using equation

(7): S· -S I1j=l1m+(I1M -l1m) } m

, j = 1,2, oo. ,M X M (7) SM -Sm In this equation 11m and 11M are user-defined minimum and maximum quantization step values, respectively.

Step7: Then the integer C = l�JiS computed, where I1jis the

quantization step for Zj' Corresponding to the block Dj.

Step8: Each bit W(i,j) of the watermark sub segment IS embedded as follows: If (W(i,j) = 1 and C(mod2) = 1), then C = C + 1 If (W(i,j) = 0 and C(mod2) = 1), then C = C + 1

, /1. Step9: Calculate the value Zj = I1j x C + --1 and the value of

SVs as follows:

1365

Page 4: [IEEE 2012 20th Iranian Conference on Electrical Engineering (ICEE) - Tehran, Iran (2012.05.15-2012.05.17)] 20th Iranian Conference on Electrical Engineering (ICEE2012) - Robust audio

,

j j j _ j j j Zj (Yl'Y2'''''YU) - (A1,A2, .. ·,AU) x- ( 8) Zj

SteplO: The watermarked blocks are obtained by applying the

inverse SVD using the modified SVs. Then the matrices �' are reconstructed from all the modified blocks.

E. RoHA Extraction Process

Generally, we should avoid false synchronization during selecting synchronization code. Several reasons contribute to false synchronization: 1) the style of the synchronization code, 2) the length of synchronization code, 3) the probability of "0" and "1" in synchronization code. Amongst all of them, the length of the synchronization code is especially important. The longer it is, the more robust it is. Most of the times, synchronization code is embedded in spatial domain in order to have fast access. But embedding in spatial domain often causes much distortion to cover. The same as embedding process, synchronization code extraction is driven from [15] which is a simple and direct method. A correlation measure is used to compare both bit sequences.

The watermark can be extracted without using the original audio signal as follows:

Stepl: Locate the beginning position of the watermark in the audio frame using synchronization code searching technique as explained in [15]. The output is a vector with a pre­specified length given as a secret key.

Step2: Apply two levels of DWT to reach to the LL subband. Then reshape the LL subband into a matrix.

Step3: Apply HWD with 2k direction (k is the number of directions in embedding phase). Now find watermark bits from 3 X 2k matrices as follows:

Partition each matrix into 2D matrix blocks of size u x u.

For each block compute the value Zj = Ilyj II where the vector

y j = (y{, yl, ... , yD is formed by the SVs of the block. Find

the integer C = l�J. If C(mod2) = 0, then the embedded bit

is 1, otherwise it is a (Value of /::,.j is provided by the embedder

as a secret key). Then put the bits in sequence to achieve the watermark vector and reshape the achieved vector.

III. EXPERIMENTAL RESULTS

To evaluate our scheme, we carried out performance and robustness tests and compared the watermark detection results with that of reference [10]. All of the audio signals in the test were music clips recorded at 16 bits per sample and 44.1 kHz. We used a 32 x 24 binary image as our watermark logo. For all audio signals a 16-bit Barker code 1111100 110 10 1110 for synchronization is used. We fixed the length of each embedded watermark segment at 262,320 samples. In HWD block we used 8 directions to embed. Our block sizes for SVD were 8 by 8. The other parameters were nsyn = l 1(this parameter is used in synchronization step [16]), Smean = 0.80, Sstd = 0.05, /::"m= 0.48 and /::"M= 0.50. All of the parameters

were found to achieve the best trade-off between robustness and imperceptibility.

For the robustness test we have done two groups of attacks: attacks that modify the amplitude of the signal and attacks that de-synchronize the watermarked signal. 1) First group:

(1) Lowpass filtering 1 , 2: application of a 9th-order Chebyshev filter with a cut-off frequency of 11.025,8 kHz; (2) Noise adding: addition of zero-mean white noise which variance is 0.0 1 ; (3) Re-quantization: re-quantization from 16-bit to 8-bit and then back to 16-bit; (4) Re-sampling: down-sampling to 22.05 kHz followed by up-sampling back to 44.1 kHz; (5) MP3 Compression: compression of the audio signal with a compression rate of 22: 1, then decompression of the signal.

2) Second group: (1) Ten percent of the audio signal is cropped at one of three selected positions randomly (front, middle and back); (2) Jittering: cropping of one sample out of every 100, 500, 1000, 2000 samples; (3) Random cropping 1: selection of 5 positions randomly and removal of 100 samples at each position; (4) Random cropping 2: selection of 10 positions randomly and removal of 100 samples at each position; (5) Random cropping 3: selection of 10 positions randomly and removal of 500 samples at each position; (6) Random cropping 4: selection of 10 positions randomly and removal of 1000 samples at each position.

Table I is a reference that shows the relation between the Bit Error Rate (BER) and visibility of binary watermark logo. Bit Error Rate (BER) is used to evaluate the watermark detection accuracy after signal processing operations. The BER of the watermarked signal retrieval is defined as follows:

BER(W W) = L�lLf=l W(i,j)Et)W(i,j)

, M x N (9)

In equation (9) Wand 'IN are the original and the extracted watermarks respectively, M and N are watermark width and length and Et) is the exclusive OR (XOR) operator.

To evaluate the similarity between the original extracted watermarks Normalized cross-Correlation computed using equation

and the (NC) is

(10):

(10)

All the parameters used in equation (10) are the same as those defined in equation (9).

TABLE II shows the results after applying several attacks on watermarked signal in comparison to [10]. As it is shown, the proposed RoHA method is more robust than the scheme in [10].

1366

Page 5: [IEEE 2012 20th Iranian Conference on Electrical Engineering (ICEE) - Tehran, Iran (2012.05.15-2012.05.17)] 20th Iranian Conference on Electrical Engineering (ICEE2012) - Robust audio

The quantization step for embedding, the barker code for synchronization and the encryption of the watermark before embedding are the main security parameters in our method. As we embedded the synchronization code in time domain, detection process in our method is faster than scheme of [10] because this scheme embeds the synchronization code in wavelet domain which is time consuming to extract.

TABLE I:

BER(%)

Binary watermark

image

BER(%)

Binary watermark

image

The relation between the BER and visibility of binary watermark image

0 5

Ie .�·c EE

zon· 2012 15 20

�IC . . I�· .E£� .zou: ZGtZ

to

�C EE:·

2012 25

• . .

. ..

rI' •

TABLE II: Extracted Watermark for Proposed scheme

Scheme Proposed Scheme Proposed Attack type ltOJ NC NC ltOJ BER BER(%)

(%) No attack 0 0

Lowpass filter:l 1 0 0 Lowpass filter:2 0.986 0 1.43

Noise addition 0 0

Re-quantization 0 0

Re-sampling 0 0

MP3 0.98 1 0.922 1.95 7.8 compression

Add 10% (front) 0 0

Add 10% 0 0 (middle)

Cropping 10% 0 0 (front)

Cropping 10% 0 0 (middle)

Jittering: I 0.802 19.79 0 Jittering:2 0.923 7.8 1 0 Jittering:3 0.965 3.5 1 0 Jittering:4 0.975 2.60 0

Random cropping: 1 0.997 0.26 0 Random

cropping:2 0.957 4.29 0 Random

cropping:3 0.905 9.50 0 Random

cropping:4 0.90 1 0.992 10.28 0.78

IV. CONCLUSION

In this paper we proposed a new robust digital audio watermarking algorithm which uses framing in order to embed a watermark multiple times to achieve more robustness. To do embedding each frame is split into two parts, synchronization code part and watermark part. Each bit of synchronization code is embedded in a sequence of samples in time domain. The watermark is embedded by quantizing the SVs of blocks in directional matrices resulted from HWD transform. To increase robustness, before applying HWD we pass the second part of each frame from two level DWT transform to obtain the LL subband. The proposed method is blind and doesn't need original digital audio in the extraction phase and the watermark can be extracted using some security codes. Experimental results show the efficiency of proposed method in comparison to a lifting wavelet based method.

REFERENCES

[I] A. Gurijala, J. R. Deller Jr, "Advances in Audio and Speech Signal Processing: Technologies and Applications," edited by H. Perez-Meana 2007, IGI Global

[2] Sh. Esmaili, "Content Based Audio Watermarking and Retrieval using Time-Frequency analysis," M.Eng thesis, Ryerson university, Toronto, 2002 .

[3] N. Cvejic, "Algorithms for audio watermarking and steganogeraohy," Ph.D. dissertation, university of Oulu Finland, 2004.

[4] Y. Qiang, Y. Wang, "A Survey of Wavelet-domain Based Digital Image Watermarking Algorithm," Computer Engineering and Applications, 40, 1 1,46--50,2004.

[5] W. Sweldens, "The lifting scheme: a construction of second generation wavelets," SIAM Journal Mathematical Analysis, 29, 2, 5 1 1-546, 1997.

[6] I. Daubechies, W. Sweldens, "Factoring wavelet transforms into lifting's steps," Journal of Fourier Analysis and Applications, 4, 3, 245-267, 1998.

[7] X. Y. Wang, H. Y. Yang, Y. R. CUI, H. Hong, "Content-based adaptive digital audio watermarking algorithm in wavelet domain," Mini-Micro Systems, 26, 8, 1354-1357,2005.

[8] X. Y. Wang, H. Y. Yang, H. Hong, "A new adaptive digital audio watermarking algorithm," Mini- Micro Systems, 27, 7, 1353-1357, 2006.

[9] 1. Y. Qu, "Audio digital watermarking based on the lifting scheme wavelet transform," Computer & Digital Engineering, 34, 4, 9 1-94, 2006.

[ 10] Z. Tao, H. M. Zhao, 1. Wu, 1. H. Gu, Y. S. Xu, D. Wu, "A Lifting Wavelet Domain Audio Watermarking Algorithm Based on the Statistical Characteristics of Sub-Band Coeflicients," Archives of Acoustics 4, 48 1-491, 2010.

[II] M. N. Do, M. Vetterli, "The Contourlet transform: An efficient directional multiresolution image representation," IEEE Trans. on Image Processing, 14(12):209 1-2106, Dec. 2005.

[ 12] R. Eslami H. Radha, "A New Family of Nonredundant Transforms Using Hybrid Wavelets and Directional Filter Banks," IEEE Tran. on Image Processing, v. 16, no. 4, Apr 2007

[ 13] P. P. Vaidyanathan, "Multirate Systems and Filter Banks," Englewood ClifTs, NJ: Prentice-Hall, 1993.

[ 14] R. Liu and T. Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Trans. Multimedia, vol. 4, pp. 121- 128, Aug. 2002.

[ 15] D. Megias, J. Serra-Ruiz, M. Fallahpour, "efficient self-synchronized blind audio watermarking system based on time domain and FFT amplitude modification," International Journal of Signal Processing 3078-3092, May 2010.

1367