Your SlideShare is downloading. ×
0
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Audio watermarking
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Audio watermarking

4,719

Published on

4 Comments
4 Likes
Statistics
Notes
No Downloads
Views
Total Views
4,719
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
320
Comments
4
Likes
4
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Audio Watermarking Under the guidance of Dr. Saroj Kumar Meher Presented by Suresh Chandra Martha EC200118335
  • 2. INTRODUCTION <ul><li>Digital Data can be shared by multiple users, distributed over network, and managed for long period time without any damage. </li></ul><ul><li>In contrast to these, the copyright protection problem arises, since unauthorized copying and distribution of digital data are simplified, too . </li></ul><ul><li>As a result, a technique called digital watermarking is introduced to protect the ownership of these contents. </li></ul>
  • 3. AUDIO WATERMARKING Digital Audio Watermarking is a technology to hide information in an audio file without the information being audible to the listener, and without affecting in any way the audio quality of the original file. What we can define <ul><li>AIMS AT </li></ul><ul><li>Copy control of digital music </li></ul><ul><li>Ownership identification </li></ul><ul><li>Enforcement of usage policy </li></ul><ul><li>Fingerprinting </li></ul>
  • 4. AUDIO WATERMARKING CHARACTERISTICS <ul><li>Transparency: watermark is not detectable </li></ul><ul><li>Robustness: survives digital processing (e.g., compression) and malicious analytical attacks. </li></ul><ul><li>Efficiency: low cost implementation using minimal resources </li></ul><ul><li>Independence: of both the type and format of multimedia data (e.g., music, speech, video, sample rates, coding scheme, ...) </li></ul>
  • 5. CLASSIFICATION OF AUDIO WATERMARKING <ul><li>Temporal watermarking </li></ul><ul><li>Temporal watermarking hides watermarks directly into digital audio signals in the time domain. </li></ul><ul><li>Spectral water-marking </li></ul><ul><li>The spectral audio watermarking applies certain frequency transform, such as FFT, DCT, and DWT, etc, to the data block of the audio signal, and hides the watermark information Into the transformed data block. </li></ul>
  • 6. AUDIO WATERMARKING SCHEMES <ul><li>DC level shifting </li></ul><ul><li>QMF bank band division </li></ul><ul><li>Frequency masking </li></ul><ul><li>Spread spectrum </li></ul>
  • 7. DC LEVEL SHIFTING <ul><li>Here watermark is embedded by shifting the DC level of the audio signal. </li></ul><ul><li>An input signal is divided into frames of fixed length. </li></ul><ul><li>DC level of each frame =Mean of a frame-value in the frame </li></ul><ul><li>After that a binary watermark sequence generated randomly is introduced to the shifted signal. This is achieved by introducing a DC offset level to each frame in the signal according to the watermark bits. </li></ul><ul><li>If the watermark bit is 0, the signal is shifted downward. </li></ul><ul><li>If the watermark bit is 1, the signal is shifted upward. </li></ul>Cont..
  • 8. DC LEVEL SHIFTING <ul><li>level 0 =-DCBiasMultiplier x FramePower </li></ul><ul><li>level 1 =+DCBiasMultiplier x FramePower </li></ul><ul><li>where </li></ul><ul><li>level 0 ->DC level introduced when a watermark bit is 0 </li></ul><ul><li>level 1 -> the DC level introduced when a watermark bit is 1. </li></ul><ul><li>To extract a watermark, a watermarked signal is first divided into frames. Then, the mean of each frame is calculated. If the mean of a frame is positive, the corresponding watermark bit is 1. Else, the watermark bit is 0. </li></ul><ul><li>The original signal and watermark is not needed in the extraction process. Therefore, DC level shifting is a blind watermarking scheme </li></ul>
  • 9. Band Division Based on Quadrature Mirror Filter (QMF) Bank Cont..
  • 10. Cont..
  • 11. <ul><li>Watermarked signal is filtered by the analysis filter bank and the low frequency watermarked band is extracted out. </li></ul><ul><li>The modified MDCT coefficients are calculated out and watermark can be determined by rounding the coefficients and observe whether coefficients are even or odd. </li></ul><ul><li>Watermark is 1 when coefficients are odd. </li></ul><ul><li> Watermark is 0 when coefficients are even. </li></ul><ul><li>This technique has a </li></ul><ul><li>High signal to noise ratio </li></ul><ul><li>The rate of detection or bit error rate is very high </li></ul>WATERMARKED SIGNAL EXTRACTION USING QMF
  • 12. FREQUENCY MASKING <ul><li>Watermarking involves hiding a faint but audible sound under another louder sound (original sound), so the faint sound becomes inaudible and it acts as a watermark for the original sound. </li></ul><ul><li>Watermark is generated firstly by creating a pseudo-noise sequence (PN sequence) from a shift register. The shift register consists of m flip-flops with a maximum period of (2 m ) – 1. </li></ul><ul><li>PN sequence is filtered along with the filter that approximates the frequency characteristics of the human auditory system (HAS). Consequently, it is put through to the time domain for temporal masking. </li></ul>Cont..
  • 13. <ul><li>The frequency masking algorithm is robust to coding, multiple watermarking, and resampling. </li></ul><ul><li>Different watermark can be embedded by this algorithm into the same signal and is easy to detect by the owner. </li></ul><ul><li>The detection scheme for this algorithm needs the original input signal, which is not flexible </li></ul><ul><li>From the extraction scheme, frequency masking is a private watermarking. </li></ul>
  • 14. SPREAD SPECTRUM Where w i is element of watermark y is the watermarked signal A correlation detector is carried out to detect the presence of the watermark and is described by Eqn where N is vector cardinality Cont..
  • 15. SPREAD SPECTRUM While x can be modelled as Gaussian random vector, the normalised correlation test is described as Eqn If p = 1, watermark is present If p=0, watermark is not present
  • 16. ANALYSIS OF VARIOUS TECHNIQUES <ul><li>DC level shifting algorithm </li></ul><ul><li>The robustness level for the DC level shifting is poor, the watermark can be easily removed by altering the DC levels of the signal and the watermark is destroyed. </li></ul><ul><li>Frequency Masking </li></ul><ul><li>This method is not robust to filtering because watermark is embedded to all frequency bands. </li></ul><ul><li>Attack by high pass filter MPEG can erase the watermark. </li></ul><ul><li>Spread Spectrum & Band Division Based On QMF </li></ul><ul><li>Both the band division method and the spread spectrum method are capable of defending against the MP3 compression, but the spread spectrum has a better detection rate than the band division method. </li></ul>Cont..
  • 17. <ul><ul><ul><li>The implementation steps for spread spectrum are more complicated. This makes it hard to hack and breakdown the algorithm. </li></ul></ul></ul><ul><li>Band Division Based On QMF </li></ul><ul><li>Band division technology performs extraction scheme with no original signal require attacks are still not upgraded to hack down this audio watermarking technology. </li></ul>
  • 18. <ul><li>CONCLUSION </li></ul><ul><li>Watermark can be embedded in an audio signal without being recognized by hearing and the perceptibility requirement is fulfilled . </li></ul><ul><li>Extraction can be done without the presence of the original signal and the watermark itself, so can be classified as blind or public watermarking. </li></ul><ul><li>Thank You !!! </li></ul>
  • 19. QUESTIONS??

×