Overview of watermarking and cryptography to combine both for real time speech communication

 Abstract—Both encryption and digital watermarking techniques need to be incorporated in a speech communication to address different aspects of speech content management. While encryption transforms original multimedia object into another form, digital watermarking leaves the original object intact and recognizable. The objective of research is to develop FPGA base real time, reliable and secure watermarking systems, which can be achieved through hardware implementations. Data-size is one of the major concerns of cryptographic systems. This development also includes speech compression to overcome the effect of data rate increase due to addition of watermarking and decryption key. Based on this research we can also say about the effect of compression on data quality. Protocol in MATLAB and FPGA will be developed which will perform various tasks at same time like, accept speech data, compression, watermarking, and encryption. Another protocol for receiver will receives that signal data, decrypts signal, remove watermark and apply interpolation to retrieve original speech data. For this implementation first we require to study various algorithms for watermarking, encryption and data compression which will best suitable for our application. This review paper gives information about various techniques for speech watermarking and data encryption.

[1]  Wojciech Mazurczyk,et al.  Multilevel Steganography: Improving Hidden Communication in Networks , 2011, J. Univers. Comput. Sci..

[2]  Bret Dunbar,et al.  A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .

[3]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[4]  R. Umarani,et al.  UR5:A Novel Symmetrical Encryption Algorithm With Fast Flexible and High Security Based On Key Updation , 2012 .

[5]  Frank Boland,et al.  Watermarking digital images for copyright protection , 1995 .

[6]  M. L. Valarmathi,et al.  A Study on Watermarking Schemes for Image Authentication , 2010 .

[7]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[8]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[9]  R. Umarani,et al.  UMARAM: A novel fast encryption algorithm for data security in local area network , 2010, 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES.

[10]  Mohey M. Hadhoud,et al.  Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..

[11]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[12]  John Langford,et al.  Provably Secure Steganography , 2002, IEEE Transactions on Computers.

[13]  Chang-Tsun Li,et al.  One-dimensional neighborhood forming strategy for fragile watermarking , 2003, J. Electronic Imaging.

[14]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[15]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[16]  Bruce Schneier,et al.  Practical cryptography , 2003 .

[17]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[18]  Ralph Howard,et al.  Data encryption standard , 1987 .

[19]  Eric Cole,et al.  Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .

[20]  R. Akila,et al.  A Comparative Analysis of Image Steganography , 2010 .

[21]  Jaime Raigoza,et al.  Evaluating Performance of Symmetric Encryption Algorithms , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).

[22]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[23]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[24]  Bernd Girod,et al.  Digital watermarking of raw and compressed video , 1996, Other Conferences.

[25]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[26]  Nicolas Pugeault,et al.  Advances in Visual Computing , 2007, Lecture Notes in Computer Science.

[27]  Pierre Duhamel,et al.  An asymmetric watermarking method , 2003, IEEE Trans. Signal Process..