Int. J. of Information and Computer Security   »   2011 Vol.4, No.3

 

 

Title: Low power implementation of audio watermarking using chirp spread spectrum technique

 

Author: P. Karthigaikumar, K. Baskaran, K. Jaraline Kirubavathy

 

Addresses:
Department of Electronics and Communication Engineering, Karunya University, Coimbatore – 641 114, Tamil Nadu, India.
Department of Computer Science and Engineering, Government College of Technology, Coimbatore – 641 013, India.
Department of Electronics and Communication Engineering, Karunya University, Coimbatore – 641 114, Tamil Nadu, India

 

Abstract: There are numerous implementations of software-based audio watermarking available, but the implementation of hardware-based audio watermarking helps to achieve real time performance by integrating an audio watermarking chip with an existing audio electronic device. For the secure communication of the secret messages and for the data protection, the watermarking should provide good imperceptibility, good robustness, high capacity (pay load) and high speed. Thus, this paper presents a new VLSI architecture to implement an audio watermarking using chirp spread spectrum technique. It uses a chirp signal as a secret key; the watermark message can be transmitted as a noise signal such that an intruder cannot retrieve the message which is transmitted, and the message can be retrieved at the receiver side only with the help of the secret key. This technique provides high security with a low power and less complexity and it is very difficult to detect and intercept, hence it is used for the application of military and wireless communication to provide a covert communication. To our knowledge, we are the first authors to propose the low power implementation of audio watermarking using spread spectrum technique.

 

Keywords: audio watermarking; low power; chirp spread spectrum; CSS; FPGA; ASIC; secure communications; security; secret messages; data protection; VLSI architecture; secret key; covert communication.

 

DOI: 10.1504/IJICS.2011.040180

 

Int. J. of Information and Computer Security, 2011 Vol.4, No.3, pp.199 - 214

 

Available online: 19 May 2011

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article