Professional Documents
Culture Documents
Textbook Digital Watermarking Techniques and Trends Springer Topics in Signal Processing Book 11 Nematollahi Ebook All Chapter PDF
Textbook Digital Watermarking Techniques and Trends Springer Topics in Signal Processing Book 11 Nematollahi Ebook All Chapter PDF
Textbook Digital Watermarking Techniques and Trends Springer Topics in Signal Processing Book 11 Nematollahi Ebook All Chapter PDF
https://textbookfull.com/product/digital-watermarking-techniques-
and-trends-nematollahi/
https://textbookfull.com/product/digital-image-watermarking-
theoretical-and-computational-advances-intelligent-signal-
processing-and-data-analysis-1st-edition-borra/
https://textbookfull.com/product/digital-watermarking-and-
steganography-fundamentals-and-techniques-second-edition-shih/
https://textbookfull.com/product/digital-audio-watermarking-
fundamentals-techniques-and-challenges-1st-edition-yong-xiang/
Digital Watermarking and Steganography: Fundamentals
and Techniques 2nd Edition Frank Y. Shih
https://textbookfull.com/product/digital-watermarking-and-
steganography-fundamentals-and-techniques-2nd-edition-frank-y-
shih/
https://textbookfull.com/product/conceptual-digital-signal-
processing-with-matlab-keonwook-kim/
https://textbookfull.com/product/from-algebraic-structures-to-
tensors-digital-signal-and-image-processing-matrices-and-tensors-
in-signal-processing-set-1st-edition-gerard-favier-editor/
https://textbookfull.com/product/intelligent-techniques-in-
signal-processing-for-multimedia-security-1st-edition-nilanjan-
dey/
https://textbookfull.com/product/digital-image-processing-a-
signal-processing-and-algorithmic-approach-1st-edition-d-
sundararajan-auth/
Springer Topics in Signal Processing
Digital
Watermarking
Techniques and Trends
Springer Topics in Signal Processing
Volume 11
Series editors
Jacob Benesty, Montreal, Canada
Walter Kellermann, Erlangen, Germany
More information about this series at http://www.springer.com/series/8109
Mohammad Ali Nematollahi · Chalee Vorakulpipat
Hamurabi Gamboa Rosales
Digital Watermarking
Techniques and Trends
13
Mohammad Ali Nematollahi Hamurabi Gamboa Rosales
National Electronics and Computer Universidad Autónoma de Zacatecas
Technology Center (NECTEC) Zacatecas
Pathumthani Mexico
Thailand
Chalee Vorakulpipat
National Electronics and Computer
Technology Center (NECTEC)
Pathumthani
Thailand
This book is suitable for beginners who do not have any information about digi-
tal watermarking concepts. In order to motivate readers to select, familiar, and get
some concepts of a desired watermarking field, this book is structured and organ-
ized in such a way that the reader has ability to only focus on a chapter. For more
and deep concentration on details for that chapter, the reader must study state-
of-the-art references in that chapter. For course work usage, the authors suggest
vii
viii Preface
students to familiar with basic concepts of digital signal processing, natural langue
processing, software engineering, network engineering, machine learning, digital
design, and cryptography subjects.
Although the authors have been attempted to provide the best suggestion
for classification of techniques and trends in the beginning of each chapter, the
authors declare that there is always improvement for classifying these techniques
and trends. Therefore, any suggestion from audience for enhancing the book’s
structure and book’s content will be most welcomed.
First and foremost, I would like to thank and pray to God for blessing my research
study and giving me strength and courage.
I also would like to thank my father and mother for their encouragement and
support by praying for me to do my book successfully.
Furthermore, I would like to express my gratitude and convey my thanks to
Dr. Hamurabi Gamboa Rosales and Dr. Chalee Vorakulpipat for their supervision,
advice, and guidance from the early stage of this book until the completion of the
book.
Similarly, I would like to record my gratitude to my Editors Dr. Loyola D’Silva
and Mr. Ravi Vengadachalam for their guidance, advice, and continuous support
during the entire course of this book.
Lastly, I would like to express my special thanks to Thailand’s National
Electronics and Computer Technology Center (NECTEC) for providing a beauti-
ful, peaceful, and calm academic environment for research and study.
ix
Contents
xi
xii Contents
2.5.2 Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.5.3 Ambience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.5.4 Conversion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.5.5 Loss Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.5.6 Noise. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.5.7 Modulation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.5.8 Time Stretch and Pitch Shift. . . . . . . . . . . . . . . . . . . . . . . 32
2.5.9 Sample Permutations. . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.6 Comparison Among Different Audio Watermarking Methods. . . 36
References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3 Speech Watermarking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.2 Speech Versus Audio. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.3 Linear Predictive Analysis (LPA). . . . . . . . . . . . . . . . . . . . . . . . . 40
3.4 Speech Watermarking Techniques. . . . . . . . . . . . . . . . . . . . . . . . . 42
3.4.1 Speech Watermarking Based on Auditory Masking. . . . . 42
3.4.2 Speech Watermarking Based on Phase Modulation. . . . . 43
3.4.3 Speech Watermarking Based on Quantization. . . . . . . . . 45
3.4.4 Speech Watermarking Based on Transformation. . . . . . . 46
3.4.5 Speech Watermarking Based on Parametric Modeling. . . . 48
3.5 Attacks for Speech Watermarking. . . . . . . . . . . . . . . . . . . . . . . . . 48
3.5.1 Additive White Gaussian Noise (AWGN). . . . . . . . . . . . 48
3.5.2 Low-Pass Filter (LPF) . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.5.3 Band-Pass Filter (BPF). . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.5.4 A-Law. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.5.5 µ-Law. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.5.6 CELP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.5.7 Amplitude Variation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.5.8 Resample . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.5.9 Requantization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.6 Challenges in Speech Watermarking. . . . . . . . . . . . . . . . . . . . . . . 50
References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Mohammad Ali Nematollahi was born in 1986 in Shiraz, Iran. He received his
Bachelor of Science degree in Computer Engineering (software engineering) in
Yazd, Iran, in 2008. He completed his Master’s degree in Computer Engineering
(software engineering) in Islamic Azad University (IAU), Dubai, UAE, in 2011.
He also was a lecturer in IAU in 2010 and 2011. He is a Ph.D graduate in Com-
puter and Embedded System Engineering from Universiti Putra Malaysia (UPM) in
2015. He is currently a postdoctorate researcher in Cybersecurity Laboratory at the
National Electronics and Computer Technology Center (NECTEC) of Thailand. He
had written numerous articles which were mainly published in International Jour-
nals. His research interests include digital signal processing, speaker recognition,
and digital watermarking.
Contact him: greencomputinguae@gmail.com
Dr. Chalee Vorakulpipat received his B.Eng. in electronics engineering from
King Mongkut’s Institute of Technology Ladkrabang, Thailand, and M.S. in infor-
mation technology from Kasetsart University, Thailand. He was awarded a schol-
arship from the Royal Thai Government to pursue a doctoral study. He earned his
Ph.D. in information systems from the University of Salford, UK. He is currently a
senior researcher and head of Cybersecurity Laboratory at the National Electronics
and Computer Technology Center of Thailand. He has been involved in several pro-
jects in information security, mobile device management, social networking sites,
ubiquitous computing, context-aware computing, e-health, and mobile application
development. He has over 30-refereed publications in these areas which appeared
in conference proceedings and journals such as Computers and Security, Advanced
Engineering Informatics, Automation in Construction, Knowledge Engineering Re-
view, and ETRI Journal. He also serves as subcommittee on national information
security of Thailand. In the academic role, he works as a lecturer for information
systems courses at several universities in Thailand. He holds information security
professional certificates including CISSP, CISA, and IRCA: ISMS Lead Auditor,
and a project management professional certificate—PMP.
Contact him: Chalee.Vorakulpipat@nectec.or.th
xvii
xviii About the Authors
AbS Analysis-by-synthesis
AD Analog to digital
ADPCM Adaptive differential pulse code modulation
APF All pass digital filters
AR Autoregressive
ATC Air traffic control
AWGN Additive white Gaussian noise
BER Bit error rate
BPF Band-pass filter
BR Block replacement
CELP Code excitation linear prediction
DA Digital to analog
DBA Database base administrator
DCT Discrete cosine transform
DEW Differential energy watermark
DFT Discrete fourier transform
DNA Deoxy-ribonucleic Acid
DRT Diagnostic rhyme test
DSP Digital signal processing
DSSS Direct sequence spread spectrum
DWT Discrete Wavelet Transform
ELT Extended lapped transforms
FFT Fast fourier transform
FNR False negative rate
FPGA Field programmable gate array
FPR False positive rate
FSM Finite state machine
HAS Human auditory system
HDL Hardware design language
HVS Human visual system
xix
xx Abbreviations
xxiii
xxiv List of Figures
xxv
Chapter 1
Preliminary on Watermarking Technology
1.1 Overview
'DWD+LGLQJ
6WHJ &U\
DQRJ SWRJ
UDSK :DWHUPDUNLQJ UDSK
\ \
3$57$
3$57% 3$57&
3$57'
6LJQDO
0XOWLPHGLD:DWHUPDUNLQJ 'RFXPHQW:DWHUPDUNLQJ $GYDQFH,Q:DWHUPDUNLQJ
:DWHUPDUNLQJ
&KDSWHU &KDSWHU
&KDSWHU
&KDSWHU 6HFXULW\
&KDSWHU &KDSWHU &KDSWHU &KDSWHU &KDSWHU &KDSWHU &KDSWHU &KDSWHU
1DWXUDO 'DWDEDVH
$XGLR 6SHHFK ,PDJH 9LGHR ' 7H[W 6RIWZDUH 1HWZRUN +DUGZDUH,3 (QKDFHPHQ
/DQJXDJH ;0/
:DWHUPDU :DWHUPDU :DWHUPDU :DWHUPDU :DWHUPDU :DWHUPDU :DWHUPDU 6WUHDP :DWHUPDUNL WRI'LJLWDO
:DWHUPDU RQWRORJ\ :DWHUPDUNL
NLQJ NLQJ NLQJ NLQJ NLQJ NLQJ NLQJ :DWHUPDU QJ
NLQJ :DWHUPDU QJ
NLQJ
NLQJ
$WWDFN
:DWHUPDUN :DWHUPDUN :DWHUPDUN :DWHUPDUN
(PEHGGLQJ &KDQQHO 'HFRGLQJ
(QFRGLQJ ([WUDFWRU
improve the security and decrease the watermark payload P. Then, a modulated/
scaled watermark method WM is used to embed watermark bits into the cover
object Oc with minimum embedding distortion to provide enough imperceptibil-
ity. After embedding the watermark, the watermarked cover WC may be imposed
to intentional and unintentional manipulations such as conversions, compression,
noise, adding, removing, and editing which would change it to manipulated water-
marked cover W C. The amount of degradation can be computed by finding the def-
erence between W C and WC which may be considered as noise of the environment.
Detection of the watermark is done based on the received manipulated water-
marked cover W C and the watermark key K. There are two major approaches for
watermark detection: The first one is informed detector (non-blind) approach that
requires original cover work Oc, and the second one is oblivious detector (blind)
approach which extracts watermark only from manipulated watermarked cover W C
without any knowledge of the original cover Oc. Thus, digital watermarking can
be categorized based on source and extraction module into three main classes:
(a) Blind watermarking that detects the watermark without the original cover Oc.
However, in some applications, key K uses are required for generating random
sequences.
(b) Semi-blind watermarking that detects the watermark with using some informa-
tion about the original cover Oc. For example, it should access to the published
watermarked signal that is the original signal after just adding the watermarks.
(c) Non-blind watermarking that detects the watermark using the original cover
Oc and manipulated watermarked cover W C together.
Fig. 1.3 Requirements of
digital watermarking [2]
vertical, and horizontal translations but there is no need that watermark is robust
against wide variety of modifications such as scaling, rotation, filtering, and distor-
tion that might not take place during broadcasting.
In addition, other types of applications require other types of covert communi-
cation including steganography and fragility in which robustness is totally undesir-
able and irrelevant for that application. For example, authentication only requires
fragile watermarking to check whether the digital object has been modified. To
conclude, robustness requires just for unpredictable applications such as proof of
ownership, copy control, identification, and fingerprinting where conceivable dis-
tortion is inevitable and there is a concern about removal of the watermark.
The hidden bit rate in digital object is defined as capacity or payload and usually
is measured in bit per second (bps). In some cases, the watermark bit is inher-
ently tied to the number of alternative messages that can be embedded thanks to
the encoding algorithm. It is obvious that the payload is directly related to the size
of the host data. Whenever the amount of the host samples increases, more water-
mark bits embed into the host data.
1.3.3.1 Objective Measurement
In the objective test, the main aim is expressing the amount of the watermark dis-
tortion which can be computed by comparing similarity or deference between
original and watermarked objects. A simple and common method known as sig-
nal-to-noise ratio (SNR) can be a good example of objective measurement which
6 1 Preliminary on Watermarking Technology
1.3.3.2 Subjective Measurement
There is not always correlation between objective measurement and human per-
ceptions. On the other hands, human response to a watermarked object may be
different from the result of objective measurements. Therefore, subjective meas-
urement is used to better evaluate watermarking techniques. The most common
subjective technique is mean opinion score (MOS) which is more simple and
popular than other subjective techniques. It is based on reporting the dissimilar-
ities between the quality of the original and watermarked objects. For instance,
Table 1.1 presents MOS grades for speech watermarking techniques based on the
understanding of the speech signals.
Subjective listening tests are conducted by human’s auditory and human’s visu-
ally perceptions. It should be mentioned that Human Auditory System (HAS) is
much more sensitive than Human Visual System (HVS). As a result, reaching
inaudibility for audio and speech signals is much more difficult than invisibility
in which both are related to imperceptibility requirement of digital watermarking.
1.3.3.3 Intelligibility Measurement
Intelligibility means how understandable the digital object is. The main focus
of intelligibility is on information value and content of digital media. For exam-
ple, high-quality voice of a baby speech has lack of verbal information which
causes no intelligibility at all although the sound quality is pleasant. For major-
ity of applications such as speech, text, and natural language, intelligibility is
much more desirable than imperceptibility [4]. Here some intangibility measure-
ment techniques for speech include the following: Measuring Normalized Blocks
(MNB), Modified Rhyme Test (MRT), Perceptual Speech Quality Measure
(PSQM), Perceptual Evaluation Of Speech Quality (PESQ), Subjective Difference
When Andy thus wildly rushed out of doors he fell over some object
which he did not chance to see. Perhaps in his excitement he even
imagined some one had given him a clip alongside the head with a
club, for he struck the ground with a bang that must have made him
see stars.
“Frank! Frank! Come here, quick!” he shouted.
The other, who had been thrusting his head out of the window of the
hangar, immediately made a break for the door. Doubtless he half
expected to see his cousin wrestling with some daring intruder,
whom he had caught in the act of setting fire to the shed or some
such caper.
“Where are you? What’s going on here?”
Calling in this strain Frank arrived in time to see Andy still on his
hands and knees just as he had fallen. He seemed to be staring up
at the starry heavens as though he had taken a sudden intense
interest in the planets of the universe.
“Did you see anything?” he questioned, as he managed to clamber
to his feet and clutch hold of the other.
“Not a thing!” came the ready reply; “but it seemed to me I heard
shouts. And they seemed to be getting fainter and fainter, as if the
fellows were running away.”
“That’s it, Frank, voices that sounded like they were sailing along
overhead!” exclaimed Andy, excitedly.
“What’s that?” demanded the other, turning upon him; “overhead,
you say? Ginger! Now that you mention it, seems to me there might
be something in that. But how could anybody get above us, when
there isn’t a single tree in this big field?”
“Frank,” Andy went on, earnestly, “I saw something just disappearing
over yonder, where the woods begin to poke up in the east. And I
give you my word that was where the voices came from!”
“Disappearing? Do you mean over the tree-tops, Andy?” cried the
other, just as if the announcement he listened to nearly took his
breath away.
Andy nodded his head several times, while his face, seen in the
moonlight, appeared to be covered with an eager grin.
“Yep, went over the tops of those same trees just like a bird—poof!
and it was gone. I couldn’t make head or tail out of it, because, you
see, I was nearly standing on my own head just then. But it wasn’t a
bird, I’ll take my affidavit on that! It sure must have been some sort of
flying machine, Frank!”
His listener whistled to express his surprise.
“Here, let’s go and get some clothes on over these zebra stripes,” he
suggested. “Then we can come out and look into this thing a little
closer.”
In less than three minutes they issued forth again, better able to
stand the chilly air of the night.
“Did you hear anything more than the shouts?” asked Andy, as they
emerged.
“Why, yes; some sort of racket woke me up. Don’t just know what it
was, but I thought somebody might be banging on the side of the
shack, and I jumped. I guess that’s what woke you, too,” continued
the taller lad.
“But Frank,” declared Andy, impressively, “I couldn’t say for certain,
and yet it seemed to me as I lay here, after tumbling over that
wooden bucket I forgot to carry indoors, I heard some sort of sounds
that made me think of the popping of a little motor!”
“A motor!” cried the other, “and up there in the air, too!”
They stared hard at each other. Some startling thought must have
instinctively lodged in each brain, for almost immediately Andy went
on sadly, saying:
“Just to think, they’ve beaten us a mile! And after all the talking we’ve
gone and done, too. However will we hold our heads up after this?”
“See here, you don’t mean that those fellows have got their biplane
rigged up already and are soaring around in the moonlight?”
demanded Frank.
“Well,” Andy continued, “it looks like it, don’t it? Something that can
fly and carry passengers certainly passed over our hangar just then.
And not only that, but they let loose at us, no doubt intending to
smash in our roof with a great big dornick.”
“Hold on, you’re jumping too far ahead, Andy. Let’s go slow and not
get off the track so easy. If you were on the witness stand could you
swear that you saw a biplane just disappearing over the trees
yonder?”
“Well, no; perhaps not exactly,” said the other; “but I saw something
that was moving along just as neat as you please.”
“Yes, and the moonlight is mighty deceiving, I know,” remarked
Frank. “But we’ll say that you did see something, that might have
been a flying machine or a cloud. Will you declare that you heard the
popping of a motor?”
“I think I did, but perhaps it may have been the blood rushing through
my brain, for I came down pretty solid. Still, it wouldn’t surprise me if
we learned, after all, that it was a motor in an aeroplane. Then think
what they tried to do to us, will you?”
“There you go, Andy. Don’t be a false alarm all your life. We’re going
to investigate that same noise presently, when we’ve threshed this
other thing dry. It may be that they’ve gone and done it. But if two
greenhorns can start up in an aeroplane by moonlight and sail
around just as they please, flying must be easier than I ever
dreamed of, that’s all.”
Frank did look puzzled. He could not bring himself to believe such a
wonderful thing had happened. Knowing both Percy and his crony as
he did, he doubted their ability to accomplish the feat in broad
daylight, let alone night, with its deceptive moonlight.
And that was why he frowned as he tried to figure the thing out.
“We both heard the big row,” he mused. “Then Andy here declares
he saw something floating off above the trees yonder; he can’t say
for sure whether it was an airship or a nighthawk. And he kind of
thinks he heard something like the crackling of an aeroplane motor!
Now, what happened? That’s what we’ve just got to find out.”
He looked around him.
“Yes,” he continued, as if speaking to himself, “I’m nearly sure that
crash came from over yonder to the west. It seemed to reach me by
way of the window, and that was why I made for that opening in such
a hurry. Thought some fellow might be trying to climb in there and
had fallen back.”
Again he cast his eyes upward, then slowly described a half circle.
“Andy says it disappeared over that clump of trees, which is almost
due east of here. And I thought I heard the crash over at the other
side of the shack, making it almost west. Now, that sounds
reasonable. If they dropped something, meaning to hit the roof of the
hangar, and undershot the mark, it would have fallen to the ground to
the west of the building!”
“Yes,” said Andy, who had been listening eagerly, “and you
remember, there’s a little pile of lumber lying there, which we meant
to use if we had to enlarge the house. It must have struck those
boards, Frank!”
“That’s a clever thought,” admitted the other, “and one I didn’t clutch
myself. Let’s meander over that way and take a little observation.
What say?”
“I’m with you every time,” declared Andy, quickly. “I never could
stand having two mysteries bothering me at once. It’s enough to be
always wondering where that blessed little monkey wrench could
have vanished to.”
“Come on and drop that, if you please. Life is too short to be
everlastingly whining about lost opportunities and monkey wrenches
and such things,” said Frank, leading off as he spoke.
“Oh, splash! You haven’t got a grain of sentiment about you, Frank.
Everything is too practical, according to your way of thinking. Now to
my mind, there’s nothing prettier in the world than a cleverly
constructed wrench that knows its business and refuses to get out of
joint just when you need it to hold most.”
But Frank had declined to listen to his “chaff,” as Andy would have
called it himself. Already the other had advanced toward the opposite
side of the structure. Here, in the fairly bright moonlight, they could
see the pile of planks that had been left in the expectation that the
building might have to be enlarged sooner or later.
Straight toward these Frank strode. The nearer he came to the pile
the stronger grew his impression that they must be near a plausible
solution of the mysterious racket.
“It came from somewhere about here, I should say,” he remarked, as
he halted by the heap of boards to glance around.
“Yes, but so far as I can see there’s no big stone lying on top of the
pile. Guess after all it was a mistake. We must have dreamed it,”
said Andy, ready to give up.
But Frank was very stubborn. Once he had set his mind on a thing it
was hard indeed to change him. And somehow he believed more
than ever that if they looked close enough they would find the
explanation of the queer noise in this quarter.
“Strange!” he muttered, evidently chagrined because he did not
seem to discover what he had expected as soon as he had thought
would be the case.
“No big stone here, that’s sure!” declared Andy, picking himself up
from the ground.
“What was that you stumbled over?” asked his cousin quickly.
“That? Oh, only a bag of sand that swift bunch of masons who laid
the foundations of our shack forgot to carry away with them. They’re
a punk lot. Might have knocked my nose that time and started the
claret to running,” and he gave the object of his disgust a vicious kick
with his toe, after which he immediately began a war dance around
the spot, for he had quite forgotten that he was wearing a pair of
deerskin moccasins just then and had stubbed his toe against the
hard contents of the bag.
“What are you giving me?” demanded Frank. “A bag of sand! Why,
you know very well those masons never brought their sand in bags.
It came in a load and was dumped right over at the other side of the
shack.”
“All right. This is a bag, I tell you. Perhaps it’s got gold dust in it, for
all I know. Feels hard enough for that. I’ll put you wise, Frank. Just
you try giving it a good kick, if you want to see,” grumbled Andy,
nursing his injured toe.
“A sandbag! Whew! I wonder——”
Frank did not finish what he had on his mind, and his companion
looked his surprise at seeing him drop down alongside the object in
question, which he began to handle eagerly.
Then, to the utter amazement of Andy, he made to pick the heavy
bag up and start away with it.
“Hey, come back here!” called the other, trailing and limping after
him; “what under the sun are you going to do with that thing? Want it
for a pillow? Maybe you think we can make a breakfast off it? Why,
what ails the fellow? He acts like he’d struck a prize, that’s what!”
“Come along inside and I’ll show you something,” called the other
over his shoulder, which, of course, only added new fuel to the fire of
curiosity that was already raging in Andy’s soul.
When he got inside he found Frank in the act of scratching a match,
which he immediately applied to a lamp, one of those by which they
were wont to work of nights.
There upon a rude table where they planed and sawed Andy saw a
small, stoutly made canvas bag that had what seemed to be a
handle on one side.
“Well, I declare, it’s got a label of some sort tied to it! Nice, pleasant
fellows these, trying to smash in the roof of our hangar and then
sending their compliments along with it!” Andy exclaimed, for like a
flash it had come to him that the sandbag had been hurled down
from above!
“Here, listen while I read what it says!” exclaimed Frank.
“Balloon ‘Monarch.’
“DeGraw, Pilot.
“Launched at St. Louis July 4. Sixty-seven hours up. Last
bag ballast but two. Please notify committee through New
York newspapers.”
“Butt in; I’m listening, Frank!”
Then the two boys stood there and stared at each other, as though
hardly able to grasp what the whole thing meant, but the one positive
fact that stood out was that this sandbag must have come down from
a passing balloon!
CHAPTER VI.
BLOOMSBURY IS BOOKED FOR FAME.