SlideShare a Scribd company logo
Bit Replacement Audio Watermarking
                     Using Stereo Signals


                                               Term Project

                               Muhammad Umer Kakli
                            Muhammad Naeem Tayyab




This Paper was presented in International Conference on
   New Trends in Information & Service Science 2009
         By Wei Cao, Yixin Yan, Shengming Li
Digital Watermarking involves embedding secret data
as an additional information to the digital signal such
          as Audio, Image or Video Signal.



        Copyright Protection
        Video Fingerprinting
        Broadcast Monitoring
For Digital Audio Watermarking, the approaches can be
                   Blind or Non-blind.

For Non-blind watermarking techniques, original signals
are required for watermark extraction while in Blind
technique original signals are not required to extract
watermark.
   Removal Attacks: Trying to remove the watermark
      signal without attempting to break the security of
      watermark algorithm.
   Geometric Attacks: Don’t remove the watermark itself,
      but intended to distort the watermark detector
      synchronization with the embedded information.
   Cryptographic Attacks: Aim at cracking the security
      methods in watermarking schemes and thus finding
      a way to remove the embedded watermark
      information
   Protocol Attacks: Aim at attacking the entire concept
      of watermarking application.
Figure 1: Classification of Watermark Attacks
   LSB Encoding

   Echo Hiding

   Spread Spectrum Watermarking

   Watermarking the phase of the host signal
   Watermark added to the Least Significant Bit
     (LSB)

   Easy to embed and retrieve

   High bit rate
De-merits of LSB Encoding Scheme
 Robustness of this method is very low
 Watermark bits can be easily detected and changed
 Addition of High level noise, re-sampling and MP3
  Compression may completely destroy the watermark
  information.

Proposed Scheme
   Instead of using LSB of mono-signal samples, it is
    perceived that by using higher bits of Stereo-Signal
    samples, it can be more robust.
   The proposed Audio Watermarking scheme improves
    mono-signal watermarking method by introducing
    watermarking threshold and making use of Stereo
    Signals.

Mono Signals Vs. Stereo Signals
   Mono means audio signals are mixed together and
    routed through a single channel while In Stereo two or
    more individual channels are using. left channel's o/p is
    connected to the left speakers and right channel's o/p is
    connected to the right speakers. It gives the effect of
    direction    and       the     depth       of     sound.
   Watermarking threshold is calculated using the following
    equation
                Watermarking Threshold = 1/2n-(w+4)
                   n=Number of bits per sample
                   w=Watermark embed bit layer

   Samples whose values are higher than threshold are
    considered as “Non-Silent” samples and they are used
    to embed watermark bits. Samples whose values are
    lower than threshold are considered as “Silent”
    samples and they are not used for watermark
    embedding.
After threshold calculation , let each “non-silent” sample
value of original stereo signal be represented in 16 bit
binary format.
              a16,a15,a14,………….a3,a2,a1

where a1 is the bit in the 1st bit layer, a2 is the bit in the
2nd bit layer and so on.

A watermark bit stream is first generated and ith bit layers
of “non-silent” samples are used as watermark
embedded bit layer.
If the first bit of the stream is bit “1”, and ai of the first “non-silent”
sample of left-channel signal is also bit “1”, no action is taken. If ai is
not “1”, watermark embedding process of left-channel signal is
performed according to the following procedures,
If the first bit of the stream is bit “0”, and ai of the first “non-silent”
sample of right-channel signal is also bit “0”, no action is taken. If ai
is not “0”, watermark embedding process of right channel signal is
performed according to the following procedures,
Effect of Watermarking on Bit Layers




  Figure 2: Percentage of Changed bits as embedding in the 5th bit layer
Signal to Noise Ration (SNR)




 Signal to Noise          Embedded Bit Layer of Watermark Signals
     Ratios
      (dB)          1st          2nd       3rd       4th            5th
Stereo Signals     72.09        70.15     67.38     59.36      46.25
Mono Signals       66.52        61.49     56.81     44.37      28.53



             SNR of Watermarked Stereo and Mono Signals
Robustness under Attack of Addition of Noise




Figure 3: Watermark Extraction Rate Under addition of White noise (for 20dB & 50dB)
Robustness under MP3 Compression Attack

                                 Embedded Bit Layer of Watermark
  Extraction Rate (%) for MP3
        Compression
                                            Signals
                                 1st     2nd     3rd     4th     5th
  Extraction Rate (%)           49.80   49.82   49.83   50.06   50.11




    Watermark Extraction Rate Under Attack of MP3 Compression
Robustness under Re-Sampling Attack
        Watermark        Embedded Bit Layer of Watermark Signals
      Extraction Rate
            (%)            1st    2nd      3rd     4th     5th

                    14.70 48.99 49.54 49.83 49.71 50.11
      Re-sampling
       Frequency




                    22.05 49.61 49.73 50.17 50.66 50.70
         (KHz)




                    66.15 49.17 49.84 49.96 50.30 50.43
                    88.20 50.03 53.29 55.64 58.52 60.79


      Watermark Extraction Rate Under Attack of Re-sampling
The noise level due to embedding watermark is
significantly reduced. This schemes is robust against
addition of white noise, even if the noise level is high.
The proposed scheme is not robust against MP3
Compression and re-sampling unless frequency is
integer multiple of original sampling frequency.
Bit replacement audio watermarking

More Related Content

What's hot

Communication Networks II
Communication Networks IICommunication Networks II
Communication Networks II
anishgoel
 
Adaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signalAdaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signal
Sai Malleswar
 
Analog to-digital conversion
Analog to-digital conversionAnalog to-digital conversion
Analog to-digital conversion
Muhammad Uzair Rasheed
 
DPCM
DPCMDPCM
30 CHL PCM PDH SDH BY SKG
30 CHL PCM PDH SDH BY SKG30 CHL PCM PDH SDH BY SKG
30 CHL PCM PDH SDH BY SKG
Saroj Kumar Gochhayat
 
Digital communication unit 1
Digital communication unit 1Digital communication unit 1
Digital communication unit 1
Gangatharan Narayanan
 
Pulse code modulation and Quantization
Pulse code modulation and QuantizationPulse code modulation and Quantization
Pulse code modulation and Quantization
Muhamamd Awaissaleem
 
NI Presenation Delta
NI Presenation DeltaNI Presenation Delta
NI Presenation Delta
Jeremy Ruppert
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
ramalakshmi54
 
Wireless digital communication and coding techniques new
Wireless digital communication and coding techniques newWireless digital communication and coding techniques new
Wireless digital communication and coding techniques new
Clyde Lettsome
 
Digital communications 1
Digital communications 1Digital communications 1
Digital communications 1
Jojie Cepeda
 
Presentation ct
Presentation ctPresentation ct
Presentation ct
surabhisushant
 
Slides2 The Communication System midterm Slides
Slides2  The Communication System midterm SlidesSlides2  The Communication System midterm Slides
Slides2 The Communication System midterm Slides
Noctorous Jamal
 
00699b
00699b00699b
00699b
Rafaelrpa
 
Companding and DPCM and ADPCM
Companding and DPCM and ADPCMCompanding and DPCM and ADPCM
Companding and DPCM and ADPCM
naimish12
 
Digital signal processing part1
Digital signal processing part1Digital signal processing part1
Digital signal processing part1
Vaagdevi College of Engineering
 
Pcm
PcmPcm
Wireless quality of services
Wireless quality of servicesWireless quality of services
Wireless quality of services
Utkarsh Vashistha
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
Gec bharuch
 
Digital Signal Processing-Digital Filters
Digital Signal Processing-Digital FiltersDigital Signal Processing-Digital Filters
Digital Signal Processing-Digital Filters
Nelson Anand
 

What's hot (20)

Communication Networks II
Communication Networks IICommunication Networks II
Communication Networks II
 
Adaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signalAdaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signal
 
Analog to-digital conversion
Analog to-digital conversionAnalog to-digital conversion
Analog to-digital conversion
 
DPCM
DPCMDPCM
DPCM
 
30 CHL PCM PDH SDH BY SKG
30 CHL PCM PDH SDH BY SKG30 CHL PCM PDH SDH BY SKG
30 CHL PCM PDH SDH BY SKG
 
Digital communication unit 1
Digital communication unit 1Digital communication unit 1
Digital communication unit 1
 
Pulse code modulation and Quantization
Pulse code modulation and QuantizationPulse code modulation and Quantization
Pulse code modulation and Quantization
 
NI Presenation Delta
NI Presenation DeltaNI Presenation Delta
NI Presenation Delta
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
 
Wireless digital communication and coding techniques new
Wireless digital communication and coding techniques newWireless digital communication and coding techniques new
Wireless digital communication and coding techniques new
 
Digital communications 1
Digital communications 1Digital communications 1
Digital communications 1
 
Presentation ct
Presentation ctPresentation ct
Presentation ct
 
Slides2 The Communication System midterm Slides
Slides2  The Communication System midterm SlidesSlides2  The Communication System midterm Slides
Slides2 The Communication System midterm Slides
 
00699b
00699b00699b
00699b
 
Companding and DPCM and ADPCM
Companding and DPCM and ADPCMCompanding and DPCM and ADPCM
Companding and DPCM and ADPCM
 
Digital signal processing part1
Digital signal processing part1Digital signal processing part1
Digital signal processing part1
 
Pcm
PcmPcm
Pcm
 
Wireless quality of services
Wireless quality of servicesWireless quality of services
Wireless quality of services
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
 
Digital Signal Processing-Digital Filters
Digital Signal Processing-Digital FiltersDigital Signal Processing-Digital Filters
Digital Signal Processing-Digital Filters
 

Similar to Bit replacement audio watermarking

Digital Audio
Digital AudioDigital Audio
Digital Audio
Magic Finger Lounge
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
AyushJaiswal781174
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
IJERA Editor
 
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalEvaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
IJRES Journal
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
ijcisjournal
 
Speech processing and recognition
Speech processing and recognition Speech processing and recognition
Speech processing and recognition
Manvi Priya
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
ijsrd.com
 
Chapter 2- Digital Data Acquistion.ppt
Chapter 2- Digital Data Acquistion.pptChapter 2- Digital Data Acquistion.ppt
Chapter 2- Digital Data Acquistion.ppt
VasanthiMuniasamy2
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
Mr SMAK
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
Mr SMAK
 
Coding
CodingCoding
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
IAEME Publication
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
CSCJournals
 
Audio compression 1
Audio compression 1Audio compression 1
Audio compression 1
Rajat Kumar
 
DSP Based Speech Operated Home Appliances UsingZero Crossing Features
DSP Based Speech Operated Home Appliances UsingZero Crossing FeaturesDSP Based Speech Operated Home Appliances UsingZero Crossing Features
DSP Based Speech Operated Home Appliances UsingZero Crossing Features
CSCJournals
 
Speaker recognition.
Speaker recognition.Speaker recognition.
Speaker recognition.
Nimmagadda Ushakiran
 
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Masayuki Tanaka
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
Saurabh Kaushik
 
IIR Filter Design for De Nosing Speech Signal using Matlab
IIR Filter Design for De Nosing Speech Signal using MatlabIIR Filter Design for De Nosing Speech Signal using Matlab
IIR Filter Design for De Nosing Speech Signal using Matlab
ijtsrd
 
0A-01-ACA-Fundamentals-Digitization.pdf
0A-01-ACA-Fundamentals-Digitization.pdf0A-01-ACA-Fundamentals-Digitization.pdf
0A-01-ACA-Fundamentals-Digitization.pdf
AlexanderLerch4
 

Similar to Bit replacement audio watermarking (20)

Digital Audio
Digital AudioDigital Audio
Digital Audio
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalEvaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
Speech processing and recognition
Speech processing and recognition Speech processing and recognition
Speech processing and recognition
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
 
Chapter 2- Digital Data Acquistion.ppt
Chapter 2- Digital Data Acquistion.pptChapter 2- Digital Data Acquistion.ppt
Chapter 2- Digital Data Acquistion.ppt
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
 
Coding
CodingCoding
Coding
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
Audio compression 1
Audio compression 1Audio compression 1
Audio compression 1
 
DSP Based Speech Operated Home Appliances UsingZero Crossing Features
DSP Based Speech Operated Home Appliances UsingZero Crossing FeaturesDSP Based Speech Operated Home Appliances UsingZero Crossing Features
DSP Based Speech Operated Home Appliances UsingZero Crossing Features
 
Speaker recognition.
Speaker recognition.Speaker recognition.
Speaker recognition.
 
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
IIR Filter Design for De Nosing Speech Signal using Matlab
IIR Filter Design for De Nosing Speech Signal using MatlabIIR Filter Design for De Nosing Speech Signal using Matlab
IIR Filter Design for De Nosing Speech Signal using Matlab
 
0A-01-ACA-Fundamentals-Digitization.pdf
0A-01-ACA-Fundamentals-Digitization.pdf0A-01-ACA-Fundamentals-Digitization.pdf
0A-01-ACA-Fundamentals-Digitization.pdf
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Bit replacement audio watermarking

  • 1. Bit Replacement Audio Watermarking Using Stereo Signals Term Project Muhammad Umer Kakli Muhammad Naeem Tayyab This Paper was presented in International Conference on New Trends in Information & Service Science 2009 By Wei Cao, Yixin Yan, Shengming Li
  • 2. Digital Watermarking involves embedding secret data as an additional information to the digital signal such as Audio, Image or Video Signal.  Copyright Protection  Video Fingerprinting  Broadcast Monitoring
  • 3.
  • 4. For Digital Audio Watermarking, the approaches can be Blind or Non-blind. For Non-blind watermarking techniques, original signals are required for watermark extraction while in Blind technique original signals are not required to extract watermark.
  • 5. Removal Attacks: Trying to remove the watermark signal without attempting to break the security of watermark algorithm.  Geometric Attacks: Don’t remove the watermark itself, but intended to distort the watermark detector synchronization with the embedded information.  Cryptographic Attacks: Aim at cracking the security methods in watermarking schemes and thus finding a way to remove the embedded watermark information  Protocol Attacks: Aim at attacking the entire concept of watermarking application.
  • 6. Figure 1: Classification of Watermark Attacks
  • 7. LSB Encoding  Echo Hiding  Spread Spectrum Watermarking  Watermarking the phase of the host signal
  • 8. Watermark added to the Least Significant Bit (LSB)  Easy to embed and retrieve  High bit rate
  • 9. De-merits of LSB Encoding Scheme  Robustness of this method is very low  Watermark bits can be easily detected and changed  Addition of High level noise, re-sampling and MP3 Compression may completely destroy the watermark information. Proposed Scheme  Instead of using LSB of mono-signal samples, it is perceived that by using higher bits of Stereo-Signal samples, it can be more robust.
  • 10. The proposed Audio Watermarking scheme improves mono-signal watermarking method by introducing watermarking threshold and making use of Stereo Signals. Mono Signals Vs. Stereo Signals  Mono means audio signals are mixed together and routed through a single channel while In Stereo two or more individual channels are using. left channel's o/p is connected to the left speakers and right channel's o/p is connected to the right speakers. It gives the effect of direction and the depth of sound.
  • 11. Watermarking threshold is calculated using the following equation Watermarking Threshold = 1/2n-(w+4) n=Number of bits per sample w=Watermark embed bit layer  Samples whose values are higher than threshold are considered as “Non-Silent” samples and they are used to embed watermark bits. Samples whose values are lower than threshold are considered as “Silent” samples and they are not used for watermark embedding.
  • 12. After threshold calculation , let each “non-silent” sample value of original stereo signal be represented in 16 bit binary format. a16,a15,a14,………….a3,a2,a1 where a1 is the bit in the 1st bit layer, a2 is the bit in the 2nd bit layer and so on. A watermark bit stream is first generated and ith bit layers of “non-silent” samples are used as watermark embedded bit layer.
  • 13. If the first bit of the stream is bit “1”, and ai of the first “non-silent” sample of left-channel signal is also bit “1”, no action is taken. If ai is not “1”, watermark embedding process of left-channel signal is performed according to the following procedures,
  • 14. If the first bit of the stream is bit “0”, and ai of the first “non-silent” sample of right-channel signal is also bit “0”, no action is taken. If ai is not “0”, watermark embedding process of right channel signal is performed according to the following procedures,
  • 15. Effect of Watermarking on Bit Layers Figure 2: Percentage of Changed bits as embedding in the 5th bit layer
  • 16. Signal to Noise Ration (SNR) Signal to Noise Embedded Bit Layer of Watermark Signals Ratios (dB) 1st 2nd 3rd 4th 5th Stereo Signals 72.09 70.15 67.38 59.36 46.25 Mono Signals 66.52 61.49 56.81 44.37 28.53 SNR of Watermarked Stereo and Mono Signals
  • 17. Robustness under Attack of Addition of Noise Figure 3: Watermark Extraction Rate Under addition of White noise (for 20dB & 50dB)
  • 18. Robustness under MP3 Compression Attack Embedded Bit Layer of Watermark Extraction Rate (%) for MP3 Compression Signals 1st 2nd 3rd 4th 5th Extraction Rate (%) 49.80 49.82 49.83 50.06 50.11 Watermark Extraction Rate Under Attack of MP3 Compression
  • 19. Robustness under Re-Sampling Attack Watermark Embedded Bit Layer of Watermark Signals Extraction Rate (%) 1st 2nd 3rd 4th 5th 14.70 48.99 49.54 49.83 49.71 50.11 Re-sampling Frequency 22.05 49.61 49.73 50.17 50.66 50.70 (KHz) 66.15 49.17 49.84 49.96 50.30 50.43 88.20 50.03 53.29 55.64 58.52 60.79 Watermark Extraction Rate Under Attack of Re-sampling
  • 20. The noise level due to embedding watermark is significantly reduced. This schemes is robust against addition of white noise, even if the noise level is high. The proposed scheme is not robust against MP3 Compression and re-sampling unless frequency is integer multiple of original sampling frequency.