Krishan Mohan Soni
Guru Gobind Singh Indraprastha University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Krishan Mohan Soni.
international conference on signal processing | 2013
Arashdeep Kaur; Malay Kishore Dutta; Krishan Mohan Soni; Nidhi Taneja
Time Scale Modification, Mp3 Compression and random cropping are challenging problems in watermarking of audio signals. To overcome these signal processing attacks, an imperceptible, blind and secure audio watermarking algorithm is presented in this paper. The proposed algorithm calculates the watermark embedding regions (WER) based on the audio localized content analysis and then embeds watermark data in these selected regions. The selection of region of embedding is done by finding regions which are relatively invariant to synchronization attacks. This makes the embedded watermark robust to time stretching or compressing attacks. Multiresolution decomposition of the signal using wavelet domain is used in this paper for watermarking. Experimental results validate that the algorithm is robust to Time Scale Modification, Mp3 Compression and other audio signal processing attacks and maintains perceptual transparency to an accepted level with SNR above 30dB.
international conference on telecommunications | 2013
Malay Kishore Dutta; Anushikha Singh; Radim Burget; Hicham Atassi; Ankur Choudhary; Krishan Mohan Soni
This paper proposes a proficient digital watermark generation technique from biometric data which will be unique and can be logically owned to prove ownership. The biometric pattern of iris is used to generate the digital watermark that has a clear stamp of ownership. The generated watermark has been studied for uniqueness and identification and has been used to watermark audio signals. Dither modulation quantization is applied on the singular values of Singular Value Decomposition domain for embedding the watermark. Experimental results indicates that the watermark can survive the signal processing attacks such as Gaussian noise corruption, re-sampling, re-quantization, cropping, and compression and maintain the perceptual properties of the host signal and hence satisfies the design requirements of digital watermarking. The extracted biometric based watermark was uniquely identified under signal processing attacks.
international conference on contemporary computing | 2014
Arashdeep Kaur; Malay Kishore Dutta; Krishan Mohan Soni; Nidhi Taneja
This paper presents a blind audio watermarking algorithm in wavelet domain. The proposed algorithm has high embedding capacity with very good robustness against mp3 compression and other signal processing attacks. Discrete wavelet transform is applied on non-overlapping frames and third level detailed coefficients are decomposed using QR decomposition represented in a matrix form. The R matrix of QR decomposition is then used to embed the watermarking bit using the embedding function in each frame. Experimental results indicate that the proposed audio watermarking algorithm is highly robust against mp3 compression with 0% BER at high payload of 320 bps.
international conference on telecommunications | 2013
Malay Kishore Dutta; Anushikha Singh; Krishan Mohan Soni; Radim Burget; Kamil Riha
The conventional digital watermarking schemes uses an arbitrary digital pattern as the watermark which has limitations in proving ownership of the watermark. This paper proposes a proficient digital watermark generation technique from biometric data which will be unique and can be logically owned to prove ownership. The issue of ownership watermark is addressed in this paper. The biometric pattern of fingerprint is used to generate the digital watermark that has a stamp of ownership. The generated watermark has been studied for uniqueness and identification and has been used to watermark digital images. Discrete cosine transformation is used for embedding the watermark in the image. Experimental results indicate that the watermark can survive the signal processing attacks and maintain the perceptual properties of the host signal. The extracted biometric based watermark was uniquely identified under signal processing attacks by matching of the feature points.
International Journal of Computational Vision and Robotics | 2014
Malay Kishore Dutta; Anushikha Singh; Krishan Mohan Soni
This paper addresses the problem of ownership of digital watermark by inserting a biometric-based watermark in the digital host signal. The biometric-based digital watermark is made secure using an encryption technique using Arnold catmap before embedding. Biometric-based watermark is a potential solution of watermark ownership which can be physically or logically owned to prove ownership. This joint encryption and watermarking scheme has the potential of addressing the ownership of digital signals and keep the biometric data secure. Arnold transformation is used to encrypt the biometric data and discrete cosine transformation is used for embedding the watermark in the image. The watermarking method is chosen so that the data payload demand is met keeping the requirements of perceptual transparency and robustness. Experimental results of perceptual transparency indicates that the method maintains a good quality of transparency with a SNR more than 25 dB for the images. The proposed watermarking method is robust to signal processing attacks and the watermarks were identified using minutia feature point matching under these attacks. The overall design requirements of transparency, robustness and data payload are achieved optimally in this paper.
workshop on information security applications | 2017
Arashdeep Kaur; Malay Kishore Dutta; Krishan Mohan Soni; Nidhi Taneja
Abstract This paper presents an adaptive audio watermarking algorithm in the wavelet domain to optimize the payload under the perceptual transparency constraints of audio signal by strategically using some of its local features. Unlike existing algorithms, the watermark payload in this approach is made adaptive based on the nature of the audio signal. This localized feature based approach to determine the payload addresses the issue of over-loading and under-loading the audio signals with watermark data making the payload optimized for each individual audio host signal. Some audio features are strategically extracted and the most discriminatory features are selected using Principal Component analysis (PCA) approach. A mathematical model is designed using selected audio features like energy, zero cross mean and short time energy to evaluate the degree of embedding under perceptual transparency. It is used to estimate the number of watermarking bits to be inserted for a particular audio signal which makes the approach adaptive in nature optimizing the watermarking payload. At the embedding stage, watermark is embedded in the host audio signal in the third level detailed coefficient of wavelet domain which strikes a balance between the contradicting design parameters of perceptual transparency, robustness and optimized payload. Watermark extraction in this paper is blind with good robustness to signal processing attacks. Experimental results validate that the proposed adaptive algorithm provide good imperceptibility with good robustness against signal processing attacks at adjustable payload for different types of audio signals. Comparative analysis indicates that this proposed adaptive algorithm has better performance in terms of imperceptibility and robustness in comparison to uniform watermarking algorithm.
International Journal of Electronic Security and Digital Forensics | 2016
Arashdeep Kaur; Malay Kishore Dutta; Krishan Mohan Soni; Nidhi Taneja
This paper presents a method of imperceptibly inserting a biometric-based digital watermark generated from iris image in an audio signal. The use of biometric features as a watermark is proposed in this paper to address the issue of ownership of digital watermark and digital content. There is a need to design special audio watermarking algorithm which can accommodate biometric-based watermark without disturbing robustness and perceptual transparency as biometric-based watermarks are generally larger in size. The algorithm is designed using Gram-Schmidt orthogonalisation in third level detailed coefficients of multi-resolution decomposition to achieve high payload with good robustness such that watermark is not audible to human auditory system. The embedding capacity of the proposed method is evaluated to be 480 bps and the highest SNR achieved is 41.519 dB. Experimental results validate that the biometric watermark extracted even under different attack situations can be identified uniquely in the iris database.
international conference on signal processing | 2014
Anushikha Singh; Malay Kishore Dutta; Carlos M. Travieso; Krishan Mohan Soni
This paper proposes a method to establish joint ownership of digital images by embedding imperceptible digital pattern in the image. This digital pattern is generated from biometric features of more than one subject in a strategic matter so that the identification of individual subject can be done and the multiple ownership of the digital images can be established. This digital pattern was embedded and extracted from the image and the experiments were also carried out when the image was subjected to signal processing attacks. Coefficients of mid frequency band discrete cosine transform was used for embedding as these coefficients do not adversely affect the perceptual transparency and is also significantly robust to normal signal processing attacks. Experimental results indicate that the insertion of this digital pattern does not change the perceptual properties of the image and the pattern survives signal processing attacks which can be extracted for unique identification.
international conference on contemporary computing | 2014
Arashdeep Kaur; Malay Kishore Dutta; Krishan Mohan Soni; Nidhi Taneja
This paper presents a high payload watermarking method for audio signals to accommodate biometric based watermarks generated from iris images. The watermark generated from biometric features has a large size and hence the proposed method is capable of accommodating this high payload under perceptual transparency constraints. In this paper, watermark generated from the biometric features can be efficiently embedded in an audio signal under fixed perceptual constraints with good robustness against signal processing attacks using a QR based decomposition method. An algorithm using the QR decomposition in third level detailed coefficients of wavelet decomposition is used to achieve this objective. Experimental results indicate that the extracted biometric watermark can be identified easily even under signal processing attacks such as low pass filtering and Gaussian noise. An optimum balance to embed high payload biometric watermark data is achieved in this paper under various signal processing attacks while maintaining the perceptual transparency of audio signal.
international conference on contemporary computing | 2013
Malay Kishore Dutta; Anushikha Singh; Krishan Mohan Soni; Radim Burget; Kamil Riha
This paper proposes a proficient digital watermark generation technique from encrypted biometric data which will be unique and can be logically owned to prove ownership of digital media. During the use of biometric data as the watermark exposure of biometric data may not be secure and hence this paper proposes a method to encrypt the biometric data using chaotic maps sensitive to secret key for enhancing the security. This joint encryption and watermarking scheme has the potential of addressing the ownership of digital signals and keep the biometric data secure. Arnold transformation is used to encrypt the biometric data and discrete cosine transformation is used for embedding the watermark in the image. Experimental results indicate that the watermark can survive the signal processing and maintain the perceptual properties of the host signal and hence satisfies the design requirements of digital watermarking. The extracted biometric based watermark after decryption was uniquely identified under signal processing attacks by matching of the feature points.