Data hiding in audio signals ppt

8,766 views

Published on

data hiding in audio signal

0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
8,766
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
361
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Data hiding in audio signals ppt

  1. 1. DATA HIDING IN AUDIO SIGNALSINTERNAL GUIDE- PRESENTED BY-ARSHIYA NOORI JAKERA PARVIN CHOUDHURY HT NO:08H81A0417
  2. 2. INTRODUCTION With the rapid development of the speech, audio, image, and video compression methods, currently it is not a difficult task to spread digital multimedia over Internet. This makes the protections of digital intellectual property rights and content authentications have been a serious problem. By using watermarking technique we can hide the data in audio signal
  3. 3. BLOCK DIAGRAM Host signal Watermarked signal Watermark Watermark Detected embedder detector watermark ed message Watermark message
  4. 4. SOFTWARE REQUIRED BASED ON MATLAB SOFTWARE
  5. 5. INTRODUCTION TO MATLAB WHAT IS MATLAB? HOW TO START AND QUIT MATLAB? USING HELP IN MATLAB MATRIX, VECTOR AND SCALAR SOME BASIC COMMANDS SOME BASIC PLOT COMMANDS ALGEBRIC OPERATIONS IN MATLAB READING AND WRITING SOUND FILES IN MATLAB
  6. 6. HIDING TECHNIQUEWATERMARKING we can define watermarking systems as in which the hidden message is related to the host signal and non-watermarking systems in which the message is unrelated to the host signal. On the other hand, systems for embedding messages into host signals can be divided into stegnographic systems, in which the existence of the message is kept secret, and non-stegnographic systems, in which the presence of the embedded message does not have to be secret.
  7. 7.  APPLICATION AREAS OWNERSHIP PROTECTION PROOF OF OWNERSHIP AUTHENTICATION AND TAMPERING DETECTION BROADCAST MONITORING INFORMATION CARRIER PERCEPTUAL TRANSPARENCY WATERMARK BIT RATE ROBUSTNESS BLIND OR INFORMED WATERMARK DETECTION SECURITY THEORY
  8. 8. THEORYBasic Watermarking system equivalent to a communication system
  9. 9. SPEECH PROCESSING SPEECH PRODUCTION WHAT IS SPEECH PROCESSING SPEECH CODING SPEECH SYNTHESIS SPECIAL TYPE OF VOICED AND UNVOICED SOUNDS VOWELS DIPHTHONGS SEMIVOWELS NASALS UNVOICED FRICATIVES VOICED FRICATIVES VOICED STOPS UNVOICED STOPS SPEECH RECOGNITION WHY ENCODE SPEECH FACTORS ASSOCIATED WITH SPEECH• Formants• Phonemes
  10. 10. INTRODUCTION TO WAVELET ANALYSIS INTRODUCING WAVELETS WAVELET VS FOURIER ANALYSIS TIME-FREQUENCY RESOLUTION EXAMPLES OF WAVELETS THE DISCRETE WAVELET TRANSFORM THE FAST WAVELET TRANSFORM ALGORITHM SIGNAL RECONSTRUCTION SPEECH WATER MARKING APPLCATIONS & ADVANTAGES AUTHENTICATION AND TAMPERING DETECTION BROADCAST MONITORING INFORMATION CARRIER PERCEPTUAL TRANSPARENCY WATERMARK BIT RATE ROBUSTNESS SECURITY SERVICES
  11. 11. RESULTSMain GUI Step 1: Select the audio signal in for which you want to watermark
  12. 12. Step 2 Select the speech signal which you want to insert
  13. 13. Step 3: Select the watermarking button and hear the watermarked song and a audiowatermarked file will be written and stored in the current directory
  14. 14. ADVANTAGES and DISADVANTAGES ADVANTAGES1.Content preserving operations in the transmission channel should betolerated to facilitate flexible applications.2. Low computational complexity both at the transmitter and receiver side isimportant in real time media processing which can be possible3. Localized malicious modification can be easily detected for he protecteddigital data4. Avoid ability of degradation and robustness for audio signals5.Protection of intellectual digital works6. It takes benefits from two State-Of-The-Art reference systems by exploitingthe receiver of the one for its low computational cost and the embeddingstrategy of the other for its high transmission reliability.7.Its receiver relies on an equalization Wiener Alter and its embedded uses alocal copy.8.This watermarking technique relies on direct sequence spread spectrum(DSSS) to spread the watermarked signal over the entire audible frequencyspectrum such that it approximates white noise, at a power level as to beinaudible.
  15. 15. DISADVANTAGES1.Digital information can easily be disseminated and copied via globalnetworks. Due to this ease, challenges regarding digital information havecreated a need for more copyright laws. However, laws cannot be the onlyentity required to protect digital works.2.Terrorists can also use Audio data hiding to keep their communicationssecret and to coordinate attacks.3.There is a narrow margin between hiding watermark information in wayswhich pass through perceptual encoders, and still cannot be perceived bylisteners.4.There is a chance of distortion which leads to add any unwanted signal.dueto which listener cannot get the original signal.5.The phase encoding watermarking technique offers higher data rates overthe previous methods, averaging from 8 to 32 bits per second. This techniqueis increasingly effective in the presence of noise.6. The robustness of the scheme can be increased somewhat with longeraudio files, by inserting the watermark signal multiple times, which will aid inextraction, and also in error correction if the signal is manipulated.
  16. 16. APPLICATIONS1. Audio data hiding can be used anytime you want to hide data. There aremany reasons to hide data but most important is to prevent unauthorizedpersons from becoming aware of the existence of a message. 2. In the business world Audio data hiding can be used to hide a secretchemical formula or plans for a new invention. Audio data hiding can also beused incorporate world.3.Audio data hiding can also be used in the noncommercial sector to hideinformation that someone wants to keep private.4.Data hiding in video and audio, is of interest for the protection ofcopyrighted digital media, and to the government for information systemssecurity and for covert communications.5. It can also be used in forensic applications for inserting hidden data intoaudio files for the authentication of spoken words and other sounds, and inthe music business for the monitoring of the songs over broadcast radio.6. Terrorists can also use Audio data hiding to keep their communicationssecret and to coordinate attacks.
  17. 17. FUTURE SCOPE An increase in high bandwidth internet connections has also promptedthe motion picture industry to take note of possible revenue losses due tounauthorized movie distribution via the internet. Microsoft is currentlydeveloping new watermark technologies and is in the process of testingfuture operating systems equipped with DRM for all media types. The success of IP protection schemes over past years, including mostcurrent watermarking technology, is limited. Virtually all the technologiesintroduced to date have been cracked or have proven unsuitable due to thedegradation and distortion they introduce – for example, past watermarkingschemes from Verance have proven audible when demonstrated for recordcompanies. Watermarking digital audio becomes particularly difficult whenthe file is subject to a lossy compression schemes such as MP3 orWMA. These perceptual compression schemes, and current watermarkingschemes, take advantage of many of the same limitations of the humanauditory system – creating a problem whereby watermark information canbe distorted and lost.
  18. 18. CONCLUSION In this paper we have introduced a robust method of imperceptible audio datahiding. This system is to provide a good, efficient method for hiding the data fromhackers and sent to the destination in a safe manner. This proposed system willnot change the size of the file even after encoding and also suitable for any typeof audio file format. Thus we conclude that audio data hiding techniques can beused for a number of purposes other than covert communication or deniable datastorage, information tracing and finger printing, tamper detection. As the sky isnot limit so is not for the development. Man is now pushing away its ownboundaries to make every thought possible. So similarly these operationsdescribed above can be further modified as it is in the world of informationtechnology. After designing any operation every developer has a thought in hismind that he could develop it by adding more features to it.

×