Robust Digital Audio Watermarking Based on SVD and Modified Firefly Algorithm

Digital Watermarking is a technology, to facilitate the authentication, copyright protection and Security of digital media. The objective of developing a robust watermarking technique is to incorporate the maximum possible robustness without compromising with the transparency. Singular Value Decomposition (SVD) using Firefly Algorithm provides this objective of an optimal robust watermarking technique. Multiple scaling factors are used to embed the watermark image into the host by multiplying these scaling factors with the Singular Values (SV) of the host audio. Firefly Algorithm is used to optimise the modified host audio to achieve the highest possible robustness and transparency. This approach can significantly increase the quality of watermarked audio and provide more robustness to the embedded watermark against various attacks such as noise, resampling, filtering attacks etc.


Introduction
The term digital watermarking [1], first came into existence in 1993 when Tirkel presented watermarking techniques to hide the watermark data in the image.
Due to the rapid growth in computer and communication industry, cost effective and popular digital recording and storage devices made it possible to copy, and have unauthorised access of the original digital multimedia contents.Digital watermarking has evolved as a solution to these problems of copyright protection, authorization, illegal modifications and distributes the data in an effortless ways without having legal permission of the author.Digital watermarking pro-Journal of Information Security vides a way to imperceptibly embed digital signal or information into the digital multimedia content.The watermarking is done by embedding a watermark signal into the host data for the purpose of copyright protection, access control.Broadcast monitoring etc.A watermark can be a signal, a tag or a label.The embedding process should be in such a way that the watermark image can be extracted from the watermarked audio without any perceptible loss of quality of the host audio.Watermarking techniques can be classified according to domain, visibility and transparency.
According to domain, watermarking is classified as spatial domain and transform domain [2].In spatial domain, watermark is embedded directly into the original audio.In transform domain, the watermark is embedded by modulating the coefficients in a transform such as discrete cosine transforms (DCT), discrete Fourier transform (DFT), discrete wavelet transform (DWT).The transform domain provides more robust and secure watermarking which has attracted many researchers to work in this domain.The main advantage of working in the transform domain is that when the audio is inverse transformed the watermark is distributed irregularly over the host audio which makes the attacker hard to modify and copy the host audio.
The singular value decomposition (SVD) [3] is a kind of transform domain technique.SVD divides a N × N matrix into three matrices: where S is an N × N diagonal matrix.U and V T are N × N orthogonal matrices, whose column vectors are u i 's and v i 's, respectively.The important property of the singular values is that any modifications done on these values do not show any change in the respective matrix.Based on this property, the singular values are modified with the singular values of the watermark image.An N × N image can have N singular values that reveal various tolerances to modifications [4].As there is no idea of the sensitivity of the image to various scaling factors.Therefore, an optimization algorithm [5] is needed to obtain optimum scaling factors [6] that can give highest possible robustness and transparency.For this purpose, firefly algorithm [7] is used, which is a metaheuristic algorithm for optimization problems.The algorithm is based upon the flashing behaviour of fireflies [8].
Randomly generated solutions are treated as fireflies.It has two basic components-brightness and attractiveness.Attractiveness is directly proportional to the brightness but decreases with distance.Brightness is computed on the basis of an objective function.Thus the basic rule is that the brighter firefly will attract the more fireflies and if no such brighter firefly is present then the firefly will move in random direction [9].This random movement may decrease the brightness depending on direction.As a consequence the overall performance of the algorithm is decreased in that particular iteration.Now if we change this property of random movement by moving in a particular direction in which its brightness increases which do not reduce the performance in that iteration.If such direction does not exist then the firefly will remain at its current position [10].Hence the modified singular values (SV) by the watermark values will be more robust and secure.Also it will enhance the overall watermarking scheme and decrease the trade-off between robustness and transparency and less vulnerable to various attacks.The paper is organised in the following manner: Section II elaborates the description of Singular Value Decomposition (SVD); Section III is for Modified Firefly algorithm.The proposed model is being given in Section IV.Section V gives the conclusion of the paper and the proposed model.

Singular Value Decomposition (SVD)
Singular value decomposition (SVD) comes under the category of transform domain technique of digital audio watermarking, which is akin theory of diagonalizing of symmetric matrix in linear algebra.SVD decomposes a matrix into three sub-parts: U, S and V. U and V are the orthogonal matrices while S is the diagonal matrix.These diagonal elements are called the singular values of the corresponding matrix.This decomposition can be illustrated as: where A is a matrix of dimension m × n.U is made up of the eigen vectors of AA T and is called left singular vector.V is formed by the orthogonal vectors of A T A and is called right singular vector.S contains the square roots of either U or V in descending order in its diagonal being a diagonal matrix.Let the rank of the matrix A be r (r < n), then the diagonal elements of S will follow the following relation: Now A can be derived as: where i α is the diagonal element of matrix S at i th position.The singular values give the luminance of the audio at each i th position, whereas singular vectors give the geometrical property.The most important property of SVD is that if any changes are applied to the singular values then will be no significant changes seen on the given matrix.Using this property the watermark image is modified by applying change in its singular values and embedded into the singular values of the host audio without getting any distortions and any perpetual change.
Properties of SVD: 1) Singular values preserve the energy as well as prevent the image from attacks.
2) The matrix in SVD can be variable.It need not be always scalar.
3) The singular values α i are unique in the matrix S.
4) The rank of the matrix is given by the non-zero elements in the diagonal matrix, S.

Modified Firefly Algorithm
Firefly algorithm [7] is a metaheuristic algorithm for optimization problems.
The algorithm is based upon the flashing behaviour of fireflies.Randomly generated solutions are treated as fireflies.It has two basic components-brightness and attractiveness.Attractiveness is directly proportional to the brightness but decreases with distance.Brightness is computed on the basis of an objective function.Thus the basic rule is that the brighter firefly will attract the more fireflies and if no such brighter firefly is present then the firefly will move in random direction [9].
In firefly algorithm, the brightest firefly is a firefly with current global best solution and it will move in random direction if no brighter firefly is found.This random movement may decrease the brightness depending on direction.As a consequence the overall performance of the algorithm is decreased in that particular iteration.
It is proved in elementary physics that intensity of light is inversely proportional to the square of the distance from the source to the object.Therefore we can formulate the light intensity, I in terms of distance, r as follows: where λ is the light absorption coefficient and I 0 is the light intensity at the source point.
For the sake of simplicity this can be written as: ( ) Likewise, attractiveness can also be derived: ( ) where A 0 is the attractiveness at r = 0.
Steps of implementation of firefly are as follows: 1) Generate a solution set randomly.
2) Find the intensity for each of the generated firefly.
3) The movement of the firefly will be done in the direction of brighter firefly and if no such direction is found then the firefly will move in random direction.
5) End the process if termination condition holds true; else go back to step 2.
The main drawback of the FA is that if there is no such direction in which the brightness increases, it moves the firefly randomly, and this random movement may sometimes cause degradation in the performance of FA because brightness may reduce in some random direction.Now if we change this property of random movement by moving in a particular direction in which its brightness increases then it will not degrade the performance in that iteration.If such direction does not exist then the firefly will remain at its current position.This is the Modified Firefly algorithm.
The movement of the firefly will be according to the following relation: : where, d is the location of the firefly, µ is the chosen direction in which movement is to be done and α is the step length selected randomly.
Attractiveness of a firefly can be calculated as: where A 0 is the attractiveness of a firefly say, i at r = 0, 0 I ′ is the intensity of firefly i and I 0 is the intensity of firefly j.

Proposed Watermarking Model
This paper proposes a SVD [11] based watermarking technique which uses multiple scaling factors (MSF) to embed the watermark image into host audio.These MSFs are generated using the optimization algorithm, Modified Firefly Algorithm (MFA) [12].The embedding and extraction process by applying block by block SVD and combining it with the MFA is described in the following sections in the form of flow charts and then the conclusion is derived with the help of experimental results.

1) Steps of embedding watermark:
The steps of embedding the watermark image into the host audio are shown in Figure 1.
Step1: Divide the host audio (H) and watermark image (W) into n non overlapping frames of size m × m.
Step 2: Apply SVD on these blocks of host audio (H i ) and watermark image [ ] ( ) Step 3: Embed the singular values of the watermark image (S wi ) into the singular values of host audio (S i ) using the following formula: , otherwise Step 4: Do inverse SVD on the sub-blocks to regain the H i : Step 5: Recombination of the blocks is performed to get the watermarked image with size equal to the host image.

2) Extraction process of watermark
In the extraction process watermark image is being extracted from the watermarked audio (H w ), which is produced as a result of the embedding process.This extraction procedure is described below in Figure 2 with the help of flow chart.
Step   Step 2: Perform SVD each sub-block: ( ) Step 3: Singular Values of the watermark image is extracted using: Step 4: Now watermark image is recovered from the watermarked image by: Step 5: To get the original size and dimension of the watermark image, the recovered blocks are recombined.

Proposed Algorithm
Let the host audio be H and watermark image be W of size N × N, then the following are the steps of the algorithm by which this model works: Step 1: n no. of fireflies are generated randomly using MFA.
Where [ ] , , , , n n ρ ρ ρ ρ =  Step 2: for each generated firefly, ρ, perform the following operations: 1) Apply embedding process discussed in the previous section on the host audio and watermark image.
2) Induce r number of attacks on the watermarked audio (Hw); hence attacked audio (Hw') are generated.
3) Extract the watermark from the host audio and attacked images using extraction algorithm described above.
PSNR , W Hw′ is the peak signal to noise ratio between watermark au- dio and the watermark extracted from the attacked audio.
Step 3: Now take the maximum value of the objective function to choose the multiple scaling factor which in turn optimizes the trade-off between the imperceptibility and robustness of the watermarking procedure.

Implementation Results
To verify the results of above-mentioned technique, we implemented the algorithm in the MATLAB 7.0.The audio file named "in" (Figure 3 .This value provides good tradeoffs between imperceptibility of watermark and robustness against different attacks [13].

Robustness Test
The following attacks [14] are performed on the watermarked audio signal to test the robustness of our scheme.The audio editing and attacking tools used in the experiment are MATLAB 7.0 and Gold Wave 5.18.The effects of different attacks are shown in Table 1.Journal of Information Security

4 )
Compute the PSNR values of the host audio (H), watermarked audio (Hw) and attacked audio (Hw').5) Compute the objective function (O) of the firefly (ρ) using the objective function below:

(
Figure 3(b).The original and extracted watermark without any attack has been shown in Figure4(a) and Figure4(b).This value provides good tradeoffs be-
1: Divide the produced watermarked image (H w ) into n non overlapping blocks (H iw ) of equal size.

Table 1 .
Effect of different attacks.