Audio watermarking


Published on

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Audio watermarking

  1. 1. Audio Watermarking Under the guidance of Dr. Saroj Kumar Meher Presented by Suresh Chandra Martha EC200118335
  2. 2. INTRODUCTION <ul><li>Digital Data can be shared by multiple users, distributed over network, and managed for long period time without any damage. </li></ul><ul><li>In contrast to these, the copyright protection problem arises, since unauthorized copying and distribution of digital data are simplified, too . </li></ul><ul><li>As a result, a technique called digital watermarking is introduced to protect the ownership of these contents. </li></ul>
  3. 3. AUDIO WATERMARKING Digital Audio Watermarking is a technology to hide information in an audio file without the information being audible to the listener, and without affecting in any way the audio quality of the original file. What we can define <ul><li>AIMS AT </li></ul><ul><li>Copy control of digital music </li></ul><ul><li>Ownership identification </li></ul><ul><li>Enforcement of usage policy </li></ul><ul><li>Fingerprinting </li></ul>
  4. 4. AUDIO WATERMARKING CHARACTERISTICS <ul><li>Transparency: watermark is not detectable </li></ul><ul><li>Robustness: survives digital processing (e.g., compression) and malicious analytical attacks. </li></ul><ul><li>Efficiency: low cost implementation using minimal resources </li></ul><ul><li>Independence: of both the type and format of multimedia data (e.g., music, speech, video, sample rates, coding scheme, ...) </li></ul>
  5. 5. CLASSIFICATION OF AUDIO WATERMARKING <ul><li>Temporal watermarking </li></ul><ul><li>Temporal watermarking hides watermarks directly into digital audio signals in the time domain. </li></ul><ul><li>Spectral water-marking </li></ul><ul><li>The spectral audio watermarking applies certain frequency transform, such as FFT, DCT, and DWT, etc, to the data block of the audio signal, and hides the watermark information Into the transformed data block. </li></ul>
  6. 6. AUDIO WATERMARKING SCHEMES <ul><li>DC level shifting </li></ul><ul><li>QMF bank band division </li></ul><ul><li>Frequency masking </li></ul><ul><li>Spread spectrum </li></ul>
  7. 7. DC LEVEL SHIFTING <ul><li>Here watermark is embedded by shifting the DC level of the audio signal. </li></ul><ul><li>An input signal is divided into frames of fixed length. </li></ul><ul><li>DC level of each frame =Mean of a frame-value in the frame </li></ul><ul><li>After that a binary watermark sequence generated randomly is introduced to the shifted signal. This is achieved by introducing a DC offset level to each frame in the signal according to the watermark bits. </li></ul><ul><li>If the watermark bit is 0, the signal is shifted downward. </li></ul><ul><li>If the watermark bit is 1, the signal is shifted upward. </li></ul>Cont..
  8. 8. DC LEVEL SHIFTING <ul><li>level 0 =-DCBiasMultiplier x FramePower </li></ul><ul><li>level 1 =+DCBiasMultiplier x FramePower </li></ul><ul><li>where </li></ul><ul><li>level 0 ->DC level introduced when a watermark bit is 0 </li></ul><ul><li>level 1 -> the DC level introduced when a watermark bit is 1. </li></ul><ul><li>To extract a watermark, a watermarked signal is first divided into frames. Then, the mean of each frame is calculated. If the mean of a frame is positive, the corresponding watermark bit is 1. Else, the watermark bit is 0. </li></ul><ul><li>The original signal and watermark is not needed in the extraction process. Therefore, DC level shifting is a blind watermarking scheme </li></ul>
  9. 9. Band Division Based on Quadrature Mirror Filter (QMF) Bank Cont..
  10. 10. Cont..
  11. 11. <ul><li>Watermarked signal is filtered by the analysis filter bank and the low frequency watermarked band is extracted out. </li></ul><ul><li>The modified MDCT coefficients are calculated out and watermark can be determined by rounding the coefficients and observe whether coefficients are even or odd. </li></ul><ul><li>Watermark is 1 when coefficients are odd. </li></ul><ul><li> Watermark is 0 when coefficients are even. </li></ul><ul><li>This technique has a </li></ul><ul><li>High signal to noise ratio </li></ul><ul><li>The rate of detection or bit error rate is very high </li></ul>WATERMARKED SIGNAL EXTRACTION USING QMF
  12. 12. FREQUENCY MASKING <ul><li>Watermarking involves hiding a faint but audible sound under another louder sound (original sound), so the faint sound becomes inaudible and it acts as a watermark for the original sound. </li></ul><ul><li>Watermark is generated firstly by creating a pseudo-noise sequence (PN sequence) from a shift register. The shift register consists of m flip-flops with a maximum period of (2 m ) – 1. </li></ul><ul><li>PN sequence is filtered along with the filter that approximates the frequency characteristics of the human auditory system (HAS). Consequently, it is put through to the time domain for temporal masking. </li></ul>Cont..
  13. 13. <ul><li>The frequency masking algorithm is robust to coding, multiple watermarking, and resampling. </li></ul><ul><li>Different watermark can be embedded by this algorithm into the same signal and is easy to detect by the owner. </li></ul><ul><li>The detection scheme for this algorithm needs the original input signal, which is not flexible </li></ul><ul><li>From the extraction scheme, frequency masking is a private watermarking. </li></ul>
  14. 14. SPREAD SPECTRUM Where w i is element of watermark y is the watermarked signal A correlation detector is carried out to detect the presence of the watermark and is described by Eqn where N is vector cardinality Cont..
  15. 15. SPREAD SPECTRUM While x can be modelled as Gaussian random vector, the normalised correlation test is described as Eqn If p = 1, watermark is present If p=0, watermark is not present
  16. 16. ANALYSIS OF VARIOUS TECHNIQUES <ul><li>DC level shifting algorithm </li></ul><ul><li>The robustness level for the DC level shifting is poor, the watermark can be easily removed by altering the DC levels of the signal and the watermark is destroyed. </li></ul><ul><li>Frequency Masking </li></ul><ul><li>This method is not robust to filtering because watermark is embedded to all frequency bands. </li></ul><ul><li>Attack by high pass filter MPEG can erase the watermark. </li></ul><ul><li>Spread Spectrum & Band Division Based On QMF </li></ul><ul><li>Both the band division method and the spread spectrum method are capable of defending against the MP3 compression, but the spread spectrum has a better detection rate than the band division method. </li></ul>Cont..
  17. 17. <ul><ul><ul><li>The implementation steps for spread spectrum are more complicated. This makes it hard to hack and breakdown the algorithm. </li></ul></ul></ul><ul><li>Band Division Based On QMF </li></ul><ul><li>Band division technology performs extraction scheme with no original signal require attacks are still not upgraded to hack down this audio watermarking technology. </li></ul>
  18. 18. <ul><li>CONCLUSION </li></ul><ul><li>Watermark can be embedded in an audio signal without being recognized by hearing and the perceptibility requirement is fulfilled . </li></ul><ul><li>Extraction can be done without the presence of the original signal and the watermark itself, so can be classified as blind or public watermarking. </li></ul><ul><li>Thank You !!! </li></ul>
  19. 19. QUESTIONS??