Proposed approach for improving Bluetooth networks security through SVD audio watermarking

Some of applications need multi-level security. The paper proposes a novel approach IEEE 802.15.1 Bluetooth network to provide better secure link for essential applications. It proposes a new approach for audio watermarking using the singular value decomposition (SVD) mathematical technique. This approach is based on embedding the encrypted image in the singular values of the audio signal after transforming it into a 2D format. After watermark embedding, the audio signal is transformed again into a 1-D format. The 1-D audio signal is segmented to Bluetooth packet payload length. That leads to the needs of fragmentation of the image to small segments. In the proposed technique the chaotic encryption is used for encrypt the image. It improves the quality of extracted images as proved experimentally, where it resists the noise and different attacks. The paper uses two type of Bluetooth packets (2DH1 and 2DM1), uncoded Enhanced Data Rate (EDR) and encoded EDR packets respectively. At the receiver the segments are recollected to construct watermark signal. The final step is extracting the image. Experiments of the simulation are carried over fading channel. Experimental results show that the proposed audio watermarking approach maintains the high quality of the audio signal and that the watermark extraction and decryption are possible.

[1]  Lahouari Ghouti,et al.  Digital image watermarking using balanced multiwavelets , 2006, IEEE Transactions on Signal Processing.

[2]  R. B. Ahmad,et al.  Bluetooth wireless network authentication using radio frequency communication protocol , 2009 .

[3]  Werner Oomen,et al.  A temporal domain audio watermarking technique , 2003, IEEE Trans. Signal Process..

[4]  Tieniu Tan,et al.  An SVD-based watermarking scheme for protecting rightful ownership , 2002, IEEE Trans. Multim..

[5]  Zafer Sahinoglu,et al.  Image Transmission over IEEE 802 . 15 . 4 and ZigBee Networks , 2005 .

[6]  Takao Onoye,et al.  Design and Implementation of Home Network Protocol for Appliance Control Based on IEEE 802.15.4 , 2007 .

[7]  Jiwu Huang,et al.  Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks , 2007, IEEE Transactions on Multimedia.

[8]  B. P. Lathi,et al.  Modern Digital and Analog Communication Systems , 1983 .

[9]  Sheng-He Sun,et al.  Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.

[10]  Heung-Kyu Lee,et al.  Invariant image watermark using Zernike moments , 2003, IEEE Trans. Circuits Syst. Video Technol..

[11]  W. C. Chu,et al.  DCT-based image watermarking using subsampling , 2003, IEEE Trans. Multim..

[12]  Edward J. Delp,et al.  Benchmarking of image watermarking algorithms for digital rights management , 2004, Proceedings of the IEEE.

[13]  Zheng Liu,et al.  Audio watermarking techniques using sinusoidal patterns based on pseudorandom sequences , 2003, IEEE Trans. Circuits Syst. Video Technol..