Audio steganography using wavelet transforms for digital audio authentication

Date of Publication

2009

Document Type

Bachelor's Thesis

Degree Name

Bachelor of Science in Electronics and Communications Engineering

College

Gokongwei College of Engineering

Department/Unit

Electronics and Communications Engineering

Thesis Adviser

Jingel A. Tio

Defense Panel Chair

Leonard U. Ambata

Defense Panel Member

Rodrigo S. Jamisola, Jr.
Oswald L. Sapang

Abstract/Summary

In this paper, a system for detecting copied music files using digital audio steganography is presented. The system has two components: the ASTEG (Audio Steganography) Embedder and the ASTEG Player. The encrypted covert data is embedded into the coefficients of host audio (cover signal) in integer wavelet domain using the ASTEG Embedder, producing a new protected audio signal (stego file). Whenever the stego file is attempted to be accessed through the ASTEG Player, the covert data is retrieved and compared with the existing file properties. When changes are detected with the file property, which is the case when the file is altered or copied, the audio file is flagged as COPIED and will not be accessed by the ASTEG Player. The protected stego signal has a near-original music quality, as proven by the average MOS of -0.2875 (Slightly perceptible but not annoying) and the average SNR of 5.9564 dB for the eight common music genres, BER of 0 (Data was extracted without error) and MSE of 0.3213 (Very minimal error between the original file and stego file). This system is recommended to be incorporated in the music production system and music players in the market to prevent patronage of illegally copied music files.

Abstract Format

html

Language

English

Format

Print

Accession Number

TU14999

Shelf Location

Archives, The Learning Commons, 12F, Henry Sy Sr. Hall

Physical Description

xii, 209, [45] leaves : ill. (some col.) ; 28 cm.

Keywords

Music and the Internet; Computer crimes; Piracy (Copyright); Sound recordings--Pirated editions; Intellectual property; Wavelets (Mathematics); Digital watermarking; Computer security; Data protection

This document is currently not available here.

Share

COinS