Projectwale,Opp. DMCE,Airoli,sector 2
projectwale@gmail.com

A DIGITAL WATERMARKING ALGORITHM USING COMBINATION OF LEAST SIGNIFICANT BIT (LSB) IN AUDIO WATERMARKING

A DIGITAL WATERMARKING ALGORITHM USING COMBINATION OF LEAST SIGNIFICANT BIT (LSB) IN AUDIO WATERMARKING

A DIGITAL WATERMARKING ALGORITHM USING COMBINATION OF LEAST SIGNIFICANT BIT LSB IN AUDIO WATERMARKING

ABSTRACT:-

            Internet is growing day by day, There are Numerous type of data constantly uploaded on the Internet such data is Audio and Video Type Data, The Creators working very Hard so the Customers Enjoy their content via Internet The Digital Multimedia such as Audios, Videos and Images are can be easily Retransmitted, Reproduced and Publish on Internet , Protection from unauthorized use as well as Distribution is really needed There is concept of steganography which means two or more parties may communicate using invisible or subliminal communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. Information hiding are techniques are used to solve such issues or Problems Information Hiding is the Process where we Embed a Message or Information (vary according to domains ) into that Digital media , That Embedded Information is too small to seen and quality is maintained of that Digital Media Information hiding is unlike cryptography Digital watermarking techniques have been developed to protect the copyright of digital media Digital watermarking is used in medical applications.

 

OBJECTIVES OF THE PROJECT:

The objectives of the systems are:

  1.     Learn Audio Steganography
  2.     Understand Least Significant Bit Encoding
  3.     Understand the Phase Encoding
  4.     Information extraction without any loss.
  5.     Digital watermarking is presently a drastically focused technique aimed towards imparting a dependable manner to defend audio or certify copyrights safety
  6.     Audio watermarking method has been adapted to the frequency domain and does not require the original in order to detect the watermark in contrast to other approaches Conversion to Web Application.

 

 

EXISTING SYSTEM:

In the Existing system where, a self-integrating watermark scheme for digital images. In their proposed algorithm, they used the cover image as a watermark. Generates the watermark by transforming the host image into a halftone image. Then the watermark is swapped and embedded in the LSB host image. The watermark is retrieved from the LSB of the suspect’s image and inversely swapped. a fragile wavelet-based watermark scheme for secure image authentication. In their proposed scheme, they generated the embedded watermark using Discrete Wavelet Transform (DWT), then processed the security watermark by scrambling the embedded encryption into the least significant bit (LSB) of the image. host. audio data has been secured using the watermarked signal, Huge storage capacity is used to store the message as it is. 

 

MODULES:

  • User Registration: User have to register to become a part of this system.
  • User Login: User have to login itself to do some other activities.
  • Add audio watermark: User has to select audio file and some text to hide that text in audio clip using lsb technic.
  • View audio watermark: User has to select the embedded audio file and after processing he will get the watermark text.
  • Add video watermark: User has to select video file and some text to hide that text in video clip using lsb technic.
  • View video watermark: User has to select the embedded video file and after processing he will get the watermark text.

 

 

CONCLUSION

 

We have shown a In the proposed steganographic system, 16bitWAV and 8bitWAVaudio file are supported and the secret message can be hidden in the audio file with less storage capacity. The existing system requires the large storage capacity as the message is stored as it is ,so the proposed method requires less storage capacity as it requires less storage space instead of 8 bit code. when At the extractor the watermark is extracted from the mix signal to enable an end-user who has no access to the original sources to separate these signals from their mixture. The watermarking techniques were evaluated in terms of quality, security and robustness. The security is guaranteed by the huge number of watermarks.

 

HARDWARE AND SOFTWARE REQUIREMENTS

HARDWARE:

  • Processor: Intel Core i3 or more.
  • RAM: 4GB or more.
  • Hard disk: 250 GB or more.

 

SOFTWARE:

  • Operating System : Windows 10, 7, 8.
  • Python
  • Anaconda
  • Spyder, Jupyter notebook
  • MYSQL

Leave a Reply

Your email address will not be published. Required fields are marked *

Open chat
 

 

We have updated our pricing all developed project. All developed project will cost 3000 INR. Offer valid till 30 Jan 2024.