- Research Article
- Open Access
- Published:

# A Genetic Algorithm Optimization Technique for Multiwavelet-Based Digital Audio Watermarking

*EURASIP Journal on Advances in Signal Processing*
**volume 2010**, Article number: 471842 (2010)

## Abstract

We propose a new approach for optimization in digital audio watermarking using genetic algorithm. The watermarks are embedded into the low frequency coefficients in discrete multiwavelet transform domain. The embedding technique is based on quantization process which does not require the original audio signal in the watermark extraction. We have developed an optimization technique using the genetic algorithm to search for four optimal quantization steps in order to improve both quality of watermarked audio and robustness of the watermark. In addition, we analyze the performance of the proposed algorithm in terms of signal-to-noise ratio, normalized correlation, and bit error rate. The experimental results show that the proposed scheme can achieve a good robustness against most of the attacks which were included in this study.

## 1. Introduction

During the past few years, digital multimedia technology and Internet networks have made great progress and they are now becoming increasingly important in daily life. Consequently, intellectual property protection is a pressing concern for content owners who are exhibiting digital representation of the photographs, music, video, and original artworks through the Internet.

Digital watermarking is one of the most popular approaches considered as a tool for providing the copyright protection of digital contents. This technique is based on direct embedding of additional information data (called watermark) into the digital contents. Ideally, there must be no perceptible difference between the watermarked and original digital contents, and the watermark should be easily extractable, reliable, and robust against data compression or any signal manipulations [1]. The main requirements of digital watermarking are invisibility, robustness, and data capacity. These requirements are mutually conflicting, and thus, in the design of a watermarking system, the tradeoff has to be made.

According to the International Federation of the Phonographic Industry (IFPI) [2], audio watermarking should have the following specifications: audio watermarking should not degrade perception of original signal. signal-to-noise ratio (SNR) should be greater than 20 dB and there should be more than 20 bits-per-second (bps) data payload for watermark. watermark should be able to resist most common audio processing operations and attacks. watermark should be able to prevent unauthorized detection, removal, and embedding, unless the quality of audio becomes very poor.

In general, digital audio watermarking can be performed in time domain and transform domain, where the properties of the underlying domain can be exploited. Currently, watermarking techniques based on transform domain are more popular than those based on time domain since they provide higher audio quality and much more robust watermark.

Typical schemes for digital watermarking were based on transform-domain techniques with discrete cosine transform (DCT) [3, 4], discrete Fourier transform (DFT) [5, 6], and discrete wavelet transform (DWT) [7–12].

In recent years, some discrete multiwavelet transform-based digital watermarking algorithms have been proposed. Kwon and Tewfik [13] proposed an adaptive image watermarking scheme in the discrete multiwavelet transform (DMT) domain using successive subband quantization and a perceptual modeling.

Kumsawat et al. [14] proposed an image watermarking algorithm using the DMT and genetic algorithm (GA) applied to search for optimal watermarking parameters to improve the quality of the watermarked image and the robustness of the watermark. Ghouti and Bouridane [15] proposed a novel audio fingerprinting framework for robust perceptual hashing of audio content using balanced multiwavelets. In [16], Kumsawat et al. proposed a multiwavelet-based audio watermarking scheme by utilizing the audio statistics characteristics and quantization index modulation (QIM) technique.

Improvements in performance of digital audio watermarking schemes can be obtained by exploiting the characteristics of the human auditory system in watermarking process. It is possible to embed perceptually inaudible watermarks with more energy in an audio, which makes watermark more robust [12, 17].

Another way to improve the performance of watermarking schemes is to make use of artificial intelligence (AI) techniques. The watermarking system can be viewed as an optimization problem. Therefore, it can be solved by genetic algorithm [4, 14, 18], adaptive tabu search (ATS) [10], or support vector machine (SVM) [11]. There has been little research in application of GA to digital audio watermarking problems.

In this paper, we propose an audio watermarking method based on the discrete multiwavelet transform for the application of copyright protection. In our algorithm, the watermark is embedded into the multiwavelet transform coefficients using quantization index modulation technique. The watermark can be not only detected but also extracted to verify the owner. We apply the GA to search for four optimal watermarking parameters in order to achieve optimum performance. Finally, we have compared the experimental results before and after optimization using GA with the results of previous works.

This paper is organized as follows. In Sections 2.1 and 2.2, the preliminaries of multiwavelets and GA are introduced, respectively. Watermarking in the DMT domain with GA optimization is described in Section 3. In Section 4, the experimental results and discussions are shown. The conclusions of our study can be found in Section 5.

## 2. Preliminaries

### 2.1. Multiwavelet Transform

In recent years, multiwavelet transformation has gained a lot of attention in signal processing applications. The main motivation of using multiwavelet is that it is possible to construct multiwavelets that simultaneously possess desirable properties such as orthogonality, symmetry, and compact support with a given approximation order [14, 19]. These properties are not possible in any scalar wavelet (wavelet based on one scaling function). One of the well-known multiwavelets was constructed by Donovan, Geronimo, Hardin, and Massopust (DGHM) [20]. DGHM multiwavelets simultaneously possess orthogonality, compact support, an approximation order of 2, and symmetry.

Unlike scalar wavelet, even though the multiwavelet is designed to have approximation order the filter bank associated with the multiwavelet basis does not inherit this property. Furthermore, since the multiwavelets have more than one scaling function, the dilation equation becomes a dilation with matrix coefficients. Thus, in applications, one must associate a given discrete signal into a sequence of length vectors (where is the number of scaling functions) without losing some certain properties of the underlying multiwavelet. Such a process is referred to as prefiltering or multiwavelet initialization.

The block diagram of a multiwavelet with prefilter and postfilter is shown in Figure 1 where is the approximation subband which mainly represents the low frequency component of the audio signal, and is the detail subband which mainly represents the high frequency component of the audio signal. and are the transform of and respectively. Two audio subbands are obtained from each level of decomposition; one detail subband and one approximation subband. For the next level of decomposition, the multiwavelet transform is applied to the approximation subband of the previous decomposition level. Thus, levels of decomposition result in subbands at the analysis filter bank.

### 2.2. Genetic Algorithm

Genetic algorithm is one of the most widely used artificial intelligent techniques belonging to the area of evolutionary computation. Genetic algorithm based on the mechanisms of natural selection and genetics, has been developed since 1975 [21] and has been applied to a variety of optimization and search problems [4, 14, 18, 22]. GA has been proven to be very efficient and stable in searching for global optimum solutions. Usually, a simple GA is mainly composed of three operations: selection, genetic operation, and replacement. A brief summary for implementing GA can be summarized as follows.

Defining the solution representation of the system is the first task of applying GA. GA uses a population, which is composed of a group of chromosomes, to represent the solutions of the system. The solution in the problem domain can then be encoded into the chromosome in the GA domain and vice versa. Initially, a population is randomly generated. The fitness function then uses objective values from objective function to evaluate the fitness of each chromosome. The fitter chromosome has the greater chance to survive during the evolution process. The objective function is problem specific; its objective value can represent the system performance index (e.g., an error). Next, a particular group of chromosomes is chosen from the population to be parents. The offspring is then generated from these parents by using genetic operations, which normally are crossover and mutation. Similar to their parents, the fitness of the offspring is evaluated and used in replacement processes in order to replace the chromosomes in the current population by the selected offspring. The GA cycle is then repeated until a desired termination criterion is satisfied, for example, the maximum number of generations is reached or the objective value is below the threshold. There are various techniques in designing GA that we have to take into account. These include encoding schemes, fitness evaluation, parent selection, genetic operations, and replacement strategies. The GA cycle is shown in Figure 2 where the phenotype is the coding scheme used to represent the chromosomes.

## 3. The Proposed Watermarking Algorithm

In this section, we first give a brief overview of the watermark embedding and watermark extracting algorithms in the DMT domain based on the concept of the quantization index modulation technique. We then describe our proposed optimization technique in watermarking scheme using genetic algorithm.

### 3.1. Watermark Embedding Algorithm

The watermark embedding algorithm is described as follows:

Generate a seed by mapping a signature or text through a one-way deterministic function. The seed is used as the secret key () for watermarking.

To increase security, perform a pseudorandom permutation in order to disperse the spatial relationship of the binary watermark pattern. Therefore, it would be difficult for a pirate to detect or remove the watermark. We use and to denote the original watermark image and the permuted watermark image, respectively. The relationship between and can be expressed as where is permuted to the pixel position in a secret order using the secret key Since the audio signal is one-dimensional, we should transform the permuted watermark image into the one-dimensional sequence in order to embed it in the audio signal. Then, the is transformed and mapped into a binary antipodal sequence for where is the length of watermark and

Transform the original audio signal using the DMT. Five-level DMT is chosen because it was found in our experimental results that the higher levels do not yield significantly better results while they increase computational complexity. Since the approximation coefficients are supposed to be relatively stable and less sensitive to slight changes of the audio signal, they are ideal embedding area. In order to achieve a balance between robustness and fidelity, the coefficients at coarsest approximation subband are selected for watermark embedding based on artificial intelligent technique. Furthermore, the coefficients in high-frequency subband are not used for watermark embedding because of their low signal energy in this frequency band.

Select the significant coefficients in the DMT domain which is the first largest coefficients at coarsest approximation subband to embed the watermark bits. The position of significant coefficients will be sent to the receiver as the side information.

Based on the statistical values of the selected coefficients, we have grouped them into 4 groups corresponding to their magnitudes. Each group will be quantizing with different quantization steps. To increase the watermarking security, we order the selected coefficients in a pseudorandom manner. The random numbers can be generated using the same secret key in generating the watermark

For watermark embedding, the sequence is embedded into the selected coefficients by quantization index modulation technique. The quantization function is given as follows [16]:

where rounds to the greatest integer smaller than and are the DMT coefficients of the original audio data and the corresponding watermarked audio data, respectively. The variable for denotes the quantization steps corresponding to 4 groups of the selected coefficients. The coarsest approximation subband of five-level multiwavelet decomposition and the 4 groups of the first largest coefficients are shown in Figures 3(a) and 3(b), respectively.

A large quantization step makes the watermark robust, but it will destroy the original quality of the audio signal. Thus, the value of quantization step should be as large as possible under the constraint of imperceptibility.

In order to optimize both quality of watermarked audio and robustness of the watermark, this work employs the genetic algorithm to search for 4 optimal quantization steps. These quantization steps are varied to achieve the most suitable watermarked audio signal for each given audio signal. The details of genetic algorithm optimization process will be described in details in Section 3.3.

Reorder the selected coefficients and inverse DMT to obtain the watermarked audio signal. The overall watermark embedding process is shown in Figure 4.

### 3.2. Watermark Extracting Algorithm

The watermark extracting algorithm is outlined as follows:

Transform the watermarked audio signal into five-level decomposition using the DMT to obtain detailed coefficients and approximation coefficients. Then, we choose the first largest coefficients in the coarsest approximation subband from position in the side information and group them into 4 groups. We further order them in a pseudorandom manner using the secret key .

Let denote the largest coefficients of the coarsest approximation subband. The embedded watermark can be extracted from by using the following rule:

Inverse the permutation of where to obtain the extracted watermark In our proposed method, the extracted watermark is a visually recognizable image. After extracting the watermark, we used normalized correlation coefficients to quantify the correlation between the original watermark and the extracted one. A normalized correlation between and is defined as

where and denote an original watermark and extracted one, respectively, and for The watermark extracting process is shown in Figure 5.

### 3.3. Improving Performance Using Genetic Algorithms

In the design of digital audio watermarking system, there are three goals that are always conflicted. These goals are imperceptibility, robustness, and data capacity. In order to minimize such conflicts, this work employs the genetic algorithm to search for 4 optimal watermarking parameters. This allows the system to achieve optimal performance for digital audio watermarking.

For the optimization process, GA is applied in the watermark embedding and the watermark extracting processes to search for quantization steps The objective function of searching process is computed by using factors that relate to both imperceptibility and robustness of a watermark. A high quality output audio and robust watermark can then be achieved. The diagram of our proposed algorithm of applying GA is shown in Figure 6 and details of genetic algorithm optimization process are described as follows.

#### 3.3.1. Chromosome Encoding

Chromosomes in GA represent desired parameter to be searched. The population (chromosomes) size must be chosen carefully to give sufficient genetic diversity. A small-sized population reduces the evaluation cost but it may cause premature convergence. For a large-sized population, the higher computation time is required. Therefore, it is important to achieve a good or acceptable result within a reasonable computation time. In this paper, the proper population size is set to be 40 (as described in the next section). The encoding scheme is binary string with 32 bit resolutions for each chromosome. Hence, the parameter is represented by chromosome with length of 128 bits.

#### 3.3.2. Objective Function Evaluation

The most critical step in the GA optimization process is the definition of a reliable objective function. Objective function is a fitness measure on solution represented by each chromosome. Its value tells how well the chromosome satisfies the final goal. In this paper, the objective function of GA is formed by combining two performance measures in digital audio watermarking, namely, average of the three normalized correlations and difference between desired and obtained from each iteration as performance indexes. Hence, is an imperceptibility measure, while is a robustness measure. The objective function can be computed as follow:

where and are weighting factors of and , respectively. These weighting factors represent the significance of each index used in GA searching process. If both indexes are equally significant, the values of these factors will be 0.5 each where the relationship must always hold. In this work, the weighting factors and are equally set to 0.5.

According to the International Federation of the Phonographic Industry, the of watermarked audio signal should be greater than 20 dB. Therefore, the value of desired has been assigned to 24 dB in all experiments. During GA-based optimization processes, three attacks are chosen to evaluate the robustness of the embedded watermark. They are MP3 compression at 64 kbps (Attack1), Gaussian noise addition (Attack2), and requantization (Attack3). Details of these attacks will be thoroughly described in Section 4.3. After obtaining the in the watermarked audio, the DIF value, and the average of the three normalized correlations after attacking, we are ready to start the objective function evaluation. An illustrative diagram is shown in Figure 6.

In order to gain the optimal performance of the quantization-based audio watermarking system, should be optimized at GA processes. By using objective function above, the parameter can be optimally searched to achieve the best of both output audio quality and watermark robustness.

#### 3.3.3. Selection, Genetic Operation, and Replacement

After evaluating fitness value of each chromosome based on the proposed objective function, chromosomes will be selected to produce offspring by crossover and mutation operations. In this work, a ranking selection is chosen for selection mechanism. The crossover is uniform, with probability of 0.7. Mutation is standard, with probability of 0.05. The chromosomes are then partially replaced by the best chromosome for each generation.

The GA will be iteratively performed on an input audio signal until a desired termination is satisfied. In this work, the maximum number of generations is set to 30 as our stopping criterion. Then the chromosome (the solution) with the best fitness value, that is, the quantization step , is determined. Table 1 represents GA parameters used in the experiments. These parameters are referred to [22] and fixed by experiments.

## 4. Experimental Results and Discussions

In order to demonstrate the performance of the proposed algorithm, some numerical experiments are carried out to measure the audio quality of the watermarked audio and evaluate the robustness of the watermark under typical attacks.

A set of ten audio signals have been used as host signals, representing five general classes of music: classical, country, jazz, rock, and pop. This delineation has been chosen because each class has different spectral properties. Each audio signal has duration of 30 seconds in the WAV format and is mono, 16 bits/sample, with sampling rate of 44.1 kHz. A binary logo "SIP SUT" of size pixels is used as the visually recognizable watermark. Consequently, the total watermark data rate is 34.14 bps which satisfies the IFPI requirement described in Section 1. Figures 7(a) and 7(b) show the original watermark and permuted watermark, respectively.

We use and (Bit error rate) to analyze the performance of the proposed algorithm. The and are defined as:

where and denote the original and modified audio, respectively.

### 4.1. Results of Genetic Algorithm Optimization

The population size plays a crucial role in representing the solutions to the problem at hand. The results of varying the number of population are displayed in Table 2. The calculated average values () and standard deviation values of the results of ten audio signals are also given in the tables. From the table, the objective value increase as the size of population. However, the differences between the objective values obtained from different population sizes are not very significant. Thus, the experiments were not carried out with the population size beyond 40.

Figures 8 and 9 show the convergence of GA optimization at 30 generations of Classical1, and Rock1, respectively. It is obvious that as the number of generation increases, the objective function gradually approaches to a saturation value. The resulting parameters, which are 4 quantization steps from GA optimization of 10 test audios, are shown in Table 3. These parameters are optimally varied to achieve the most desirable ones for original audios with different characteristics.

### 4.2. Imperceptibility Test Results

The watermarked audio quality is examined by watermarking the original audio signals with the resulting parameters from GA. Then, the SNR test is conducted, which serves as an objective measurement of audio signal quality. The SNR is measured by comparing the watermarked signal with the original one.

Figure 10 shows the original Classical1 audio signal waveform and the corresponding watermarked audio signal waveform. Note that SNR is as high as 26.04 dB for watermarked audio signal. However, there is no obvious difference between original signal and watermarked signal by using informal listening test, and from Figures 10(a) and 10(b). It demonstrates that the proposed algorithm has perfect insensibility in the sense of hearing.

The results of watermarked audio quality are shown in Table 4. The results obtained from our proposed method which is called with-GA (after optimization) are compared with the method without using Genetic Algorithm which is referred to as without-GA (before optimization). In the without-GA method, the quantization step is fixed at 0.4. We can see that the proposed method can improve the SNR of the watermarked audio about 2 dB.

### 4.3. Robustness Test Results

We first tested the robustness of the proposed algorithm to ten audio samples under no attacks. If the BER of the recovered watermark sequence is 0, it means that the embedded bit can be recovered exactly. The effects of the following eight types of attacks are then investigated.

Resampling: the audio signal is first downsampled at 22.05 kHz, and then upsampled at 44.1 kHz.

Requantization: the 16-bit watermarked audio signals have been requantized down to 8 bits/sample and back to 16 bits/sample.

Low-pass filtering: low-pass filtering using a second-order Butterworth filter with cutoff frequency of 6 kHz, 12 dB/octave roll-off, is performed to the watermarked audio signals.

Addition of noise: white Gaussian noise with 1% of the power of the audio signal is added.

Cropping: two thousand samples of each testing signal are cropped out at 5 random positions.

Low bitrate codec: the robustness against the low-rate codec was tested by using MPEG 1 Layer III compression (MP3) with compression rates of 56, 64, 96, and 128 kbps.

Digital-to-analog/analog-to-digital (DA/AD) with same rate reacquisition: the output of audio signal from a sound card is connected to the analog input of another computer.

Time-scale modification (TSM): time-scale modification between +5% and of the total audio excerpt length is performed.

Detection results for the various attacks described above are shown in Table 5 which displayed the NC and BER from watermark extraction. The experimental results given in Table 5 show that the watermark is not affected by resampling, requantization, additive noise, and MP3 compression at 64, 96, and 128 kbps. This indicated that the watermark is very robust to these attacks.

For low-pass filtering, cropping, MP3 compression at 56 kbps, DA/AD, and TSM attacks, the BER values of the recovered watermark sequence are 8.0133%, 5.2636%, 0.0977%, 17.2852%, 11.8164%, and 16.0616% for the Without-GA method and 6.9336%, 0.1953%, 0.0977%, 5.7619%, 2.2461%, and 2.1484% for the with-GA method, respectively. Although a lot of loss occurred in the audio signal, the bit error rates are still acceptable. The results show that our proposed method yields better results than the method without-GA. Because GA search guarantees the global optimum solution, the proposed method can thus improve the quality of the watermarked audio and give almost the same robustness of the watermark.

Then, a rough comparison is given in Table 6 based on embedding data payload and BER under MP3 compression with bit rates of 64 kbps and 128 kbps. It can be seen that the data payload of the proposed algorithm is significantly higher than those of [5, 7, 10]. As shown in Table 6, the detected BER values are all zero which indicates that compression and decompression have no effect on our algorithm.

Finally, results obtained from our proposed method which is called With-GA are compared in finer details with the method based on wavelet transform and ATS in [10]. In order to compare robustness between the two techniques in a fair manner, parameters for each scheme should be adjusted so that watermarked audio signals of approximately close imperceptibility are produced. In these experiments, the SNR of watermarked audio in each scheme has been set to 24 dB. According to the experimental results, the value of the embedding capacity has been assigned to 34.14 bps in all experiments. The comparison results are listed in Table 7.

Table 7 shows test results of Rock1 audio signal with no attack, re-sampling, requantization, low-pass filtering, addition of noise, cropping, and MPEG 1 Layer III compression with compression rates of 128, 96, 64 kbps and 56 kbps, respectively. The BER of watermark signal and the SNR of digital audio signal are also displayed.

According to these results, the extracted watermark images from our proposed method have some distortion for low-pass filtering and cropping attacks but they are still visually recognizable. In addition, the bit error rates of the extracted watermarks using our proposed method are always lower than the ones using method in [10]. The results demonstrate that our proposed method yields significantly more robust watermark than the method in [10] does.

## 5. Conclusions

This paper proposes a digital audio watermarking algorithm in the multiwavelet transform domain. In order to make the watermarked signal inaudible, the watermark is embedded into low frequency part of the highest energy of audio signal by taking advantage of multiresolution characteristic of multiwavelet transform. The watermark insertion and watermark extraction are based on the quantization index modulation technique and the watermark extraction algorithm does not need the original audio in the extraction process. Performance improvement with respect to existing algorithms is obtained by genetic algorithm optimization. In our optimization process, we use genetic algorithm searching for optimal parameter which is the quantization step. This parameter is optimally varied to achieve the most suitable for original audios with different characteristics. The testing results of the watermarked audio quality and watermark robustness with various watermark attacks show that our proposed method can improve the performance of the watermarking process such that the better watermarked audio quality and watermark robustness are achieved. Further research can be concentrated on the development of our proposed method by using the characteristics of the human auditory system and psychoacoustic model.

## References

- 1.
Lee S-J, Jung S-H: A survey of watermarking techniques applied to multimedia.

*Proceedings of the IEEE International Symposium on Industrial Electronics, June 2001, Pusan, South Korea*1: 272-277. - 2.
Katzenbeisser S, Petitcolas FAP:

*Information Hiding Techniques for Steganography and Digital Watermarking*. Artech House, Norwood, Mass, USA; 2000. - 3.
Cox IJ, Kilian J, Leighton FT, Shamoon T: Secure spread spectrum watermarking for multimedia.

*IEEE Transactions on Image Processing*1997, 6(12):1673-1687. 10.1109/83.650120 - 4.
Huang C-H, Wu J-L: Watermark optimization technique based on genetic algorithms.

*Security and Watermarking of Multimedia Contents II, January 2000, San Jose, Calif, USA, Proceedings of SPIE*3971: 516-523. - 5.
Seok JW, Hong JW: Audio watermarking for copyright protection of digital audio data.

*IEE Electronics Letters*2001, 37(1):60-61. 10.1049/el:20010029 - 6.
Orović I, Zogović P, Žarić N, Stanković S: Speech signals protection via logo watermarking based on the time-frequency analysis.

*Annals of Telecommunications*2008, 63(7-8):369-377. 10.1007/s12243-008-0036-3 - 7.
Wang R, Xu D, Chen J, Du C: Digital audio watermarking algorithm based on linear predictive coding in wavelet domain.

*Proceedings of the 7th International Conference on Signal Processing (ICSP '04), August 2004, Beijing, China*3: 2393-2396. - 8.
Huang J, Wang Y, Wu S: Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform.

*EURASIP Journal on Advances in Signal Processing*2010, 2010:-17. - 9.
Wu S, Huang J, Huang D, Shi YQ: Efficiently self-synchronized audio watermarking for assured audio data transmission.

*IEEE Transactions on Broadcasting*2005, 51(1):69-76. 10.1109/TBC.2004.838265 - 10.
Sriyingyong N, Attakitmongcol K: Wavelet-based audio watermarking using adaptive tabu search.

*Proceedings of the 1st International Symposium on Wireless Pervasive Computing, January 2006, Phuket, Thailand*1: 1-5. - 11.
Wang X-Y, Niu P-P, Yang H-Y: A robust, digital-audio watermarking method.

*IEEE Multimedia*2009, 16(3):60-69. - 12.
Wang R-D, Xu D-W, Li Q: Audio watermarking algorithm based on wavelet packet and psychoacoustic model.

*Proceedings of the 6th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT '05), December 2005, Dalian, China*1: 812-814. - 13.
Kwon KR, Tewfik AH: Adaptive watermarking using successive subband quantization and perceptual model based on multiwavelet transform.

*Security and Watermarking of Multimedia Contents IV, January 2002, San Jose, Calif, USA, Proceedings of SPIE*4675: 334-348. - 14.
Kumsawat P, Attakitmongcol K, Srikaew A: A new approach for optimization in image watermarking by using genetic algorithms.

*IEEE Transactions on Signal Processing*2005, 53(12):4707-4719. - 15.
Ghouti L, Bouridane A: A robust perceptual audio hashing using balanced multiwavelets.

*Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '06), May 2006, Toulouse, France*1: 209-212. - 16.
Kumsawat P, Attakitmongcol K, Srikaew A: Digital audio watermarking for copyright protection based on multiwavelet transform.

*Lecture Notes in Computer Science*2008, 5376: 155-164. 10.1007/978-3-540-89900-6_17 - 17.
Hartung F, Kutter M: Multimedia watermarking techniques.

*Proceedings of the IEEE*1999, 87(7):1079-1107. 10.1109/5.771066 - 18.
Sedghi S, Mashhadi HR, Khademi M: Detecting hidden information from a spread spectrum watermarked signal by genetic algorithm.

*Proceedings of the IEEE Congress on Evolutionary Computation (CEC '06), July 2006, Vancouver, Canada*1: 173-178. - 19.
Attakitmongcol K, Hardin DP, Wilkes DM: Multiwavelet prefilters—Part II: optimal orthogonal prefilters.

*IEEE Transactions on Image Processing*2001, 10(10):1476-1487. 10.1109/83.951534 - 20.
Geronimo JS, Hardin DP, Massopust PR: Fractal functions and wavelet expansions based on several scaling functions.

*Journal of Approximation Theory*1994, 78(3):373-401. 10.1006/jath.1994.1085 - 21.
Holland JH:

*Adaptation in Natural and Artificial Systems*. The University of Michigan Press, Ann Arbor, Mich, USA; 1975. - 22.
Goldberg DE:

*Genetic Algorithms in Search Optimization and Machine Learning*. Addison-Wesley, Reading, Mass, USA; 1989.

## Acknowledgments

This paper was supported by a grant from Suranaree University of Technology, Thailand Research Fund and Commission on Higher Education. The author would like to thank anonymous reviewers for their comments and suggestions which have improved the readability and technical content of this paper.

## Author information

### Affiliations

### Corresponding author

## Rights and permissions

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

## About this article

### Cite this article

Kumsawat, P. A Genetic Algorithm Optimization Technique for Multiwavelet-Based Digital Audio Watermarking.
*EURASIP J. Adv. Signal Process.* **2010, **471842 (2010). https://doi.org/10.1155/2010/471842

Received:

Revised:

Accepted:

Published:

### Keywords

- Image Watermark
- Audio Signal
- Digital Watermark
- Quantization Step
- Watermark Embedding