SlideShare a Scribd company logo
1 of 15
PRESENTATION ON
AN ALGORITHMIC APPROACH FOR VOICE
BASED WATERMARKING
Prepared by-
Kamonasish Hore
Introduction:
 The piracy of the data is increasing now-a-days so watermarking has
become a hotspot in recent years. Yet most of them use a private key of
a copyright holder as watermark but still have some limitations.
 Thus we propose a new idea for watermarking , which uses voice as the
original watermark as far as we know voice of a human being is inherent
and not changes along with time.
 The main contribution of this work is the voice signal is embedded into
relations. Voice of copyright holder is used to generate watermark by
watermark generation algorithm.
Objective:
 The basic objective of this project is to embed the voice
into a file (i.e. data file or any other file) so as to copyright
the file and make it secure from piracy.
Benefits:
Voice of copyright holder is used for watermark because of its
following characteristics.
 No two persons can have same features in their voice i.e. voice of
every person has a unique feature.
 Everyone has speech so universality is again one of the
characteristic of voice.
 Measurable, speech can easily be converted into bit format thus use
of voice content large data. So it is challenging to use voice as a
watermark.
Proposed Work : Block Diagram
 Phase 1: Generation of the wave file using a software and
a headphone with microphone facility.
 Phase 2: Implementation of the saved wave file in matlab.
 Phase 3: Filtration of the wave file using a filter in matlab.
 Phase 4: Embed the wave file into particular file(text
document )
 Phase 5: Encryption of that file using algorithm.
 Phase 6: Decryption of that file using algorithm.
 Phase 7: Desired output as watermark.
 Phase 8: Creating a GUI
Phases of the Project:
Hardware and Software Requirement
specifications:
 Microphone.
 Software for creating a voice signal (.wav file format.)
 Laptop/Desktop
 Matlab (R2011a and above)
Future Scope and Enhancements:
 Watermarking extensions to handle non-numeric attributes.
 New algorithms for fingerprinting to track multiple sources of piracy.
 Phase 1: Generation of the wave file using a
software and a headphone with
microphone facility.
 Phase 2: Implementation of the saved wave file
in matlab.
 Phase 3: Filtration of the wave file using a filter
in matlab to reduce noise.
GUI
Snapshot after loading the saved .wav file with desired
wave form.
Phase 5: Encryption of the file using md5 hash
algorithm.
 [1] Journal- Watermarking Relational Databases using
Optimization Based Techniques.
 [2] R. Agrawal and J. Kiernan. Watermarking Relational Databases.
In Proceedings of 28th International Conference on Very Large Data
Bases, Hong Kong, China, 2002.
 [3] YouTube- Matlab demonstration-basic signal manipulation using
audio signals.
 [4] Journal- Voice Based Watermarking Technique for Relational
Databases.
 [5] YouTube- Matlab for Beginers.
Reference:
THANK YOU

More Related Content

Similar to Watermarking

Victoria presentation notes
Victoria   presentation notesVictoria   presentation notes
Victoria presentation notes
Oxford Trainees
 
Improved sound recording glossary
Improved sound recording glossaryImproved sound recording glossary
Improved sound recording glossary
KeatonBradley
 
EricLong_Resume_Public
EricLong_Resume_PublicEricLong_Resume_Public
EricLong_Resume_Public
Eric Long
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheet
luisfvazquez1
 
Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...
Videoguy
 

Similar to Watermarking (20)

Victoria presentation notes
Victoria   presentation notesVictoria   presentation notes
Victoria presentation notes
 
Efficient Intralingual Text To Speech Web Podcasting And Recording
Efficient Intralingual Text To Speech Web Podcasting And RecordingEfficient Intralingual Text To Speech Web Podcasting And Recording
Efficient Intralingual Text To Speech Web Podcasting And Recording
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
fightingdci
fightingdcifightingdci
fightingdci
 
Improved sound recording glossary
Improved sound recording glossaryImproved sound recording glossary
Improved sound recording glossary
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
EricLong_Resume_Public
EricLong_Resume_PublicEricLong_Resume_Public
EricLong_Resume_Public
 
Desktop assistant
Desktop assistant Desktop assistant
Desktop assistant
 
Automatic Subtitle Generation for Sound in Videos
Automatic Subtitle Generation for Sound in VideosAutomatic Subtitle Generation for Sound in Videos
Automatic Subtitle Generation for Sound in Videos
 
Automatic Subtitle Generation For Sound In Videos
Automatic Subtitle Generation For Sound In VideosAutomatic Subtitle Generation For Sound In Videos
Automatic Subtitle Generation For Sound In Videos
 
Sound analysis draft 2
Sound analysis draft 2Sound analysis draft 2
Sound analysis draft 2
 
Sound recording glossary
Sound recording glossarySound recording glossary
Sound recording glossary
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheet
 
心理影响.ppt
心理影响.ppt心理影响.ppt
心理影响.ppt
 
Wireshark
WiresharkWireshark
Wireshark
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking Technique
 
Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...
 
IG2 Task 1
IG2 Task 1 IG2 Task 1
IG2 Task 1
 
Multimedia chapter 4
Multimedia chapter 4Multimedia chapter 4
Multimedia chapter 4
 

Watermarking

  • 1. PRESENTATION ON AN ALGORITHMIC APPROACH FOR VOICE BASED WATERMARKING Prepared by- Kamonasish Hore
  • 2. Introduction:  The piracy of the data is increasing now-a-days so watermarking has become a hotspot in recent years. Yet most of them use a private key of a copyright holder as watermark but still have some limitations.  Thus we propose a new idea for watermarking , which uses voice as the original watermark as far as we know voice of a human being is inherent and not changes along with time.  The main contribution of this work is the voice signal is embedded into relations. Voice of copyright holder is used to generate watermark by watermark generation algorithm.
  • 3. Objective:  The basic objective of this project is to embed the voice into a file (i.e. data file or any other file) so as to copyright the file and make it secure from piracy.
  • 4. Benefits: Voice of copyright holder is used for watermark because of its following characteristics.  No two persons can have same features in their voice i.e. voice of every person has a unique feature.  Everyone has speech so universality is again one of the characteristic of voice.  Measurable, speech can easily be converted into bit format thus use of voice content large data. So it is challenging to use voice as a watermark.
  • 5. Proposed Work : Block Diagram
  • 6.  Phase 1: Generation of the wave file using a software and a headphone with microphone facility.  Phase 2: Implementation of the saved wave file in matlab.  Phase 3: Filtration of the wave file using a filter in matlab.  Phase 4: Embed the wave file into particular file(text document )  Phase 5: Encryption of that file using algorithm.  Phase 6: Decryption of that file using algorithm.  Phase 7: Desired output as watermark.  Phase 8: Creating a GUI Phases of the Project:
  • 7. Hardware and Software Requirement specifications:  Microphone.  Software for creating a voice signal (.wav file format.)  Laptop/Desktop  Matlab (R2011a and above) Future Scope and Enhancements:  Watermarking extensions to handle non-numeric attributes.  New algorithms for fingerprinting to track multiple sources of piracy.
  • 8.  Phase 1: Generation of the wave file using a software and a headphone with microphone facility.  Phase 2: Implementation of the saved wave file in matlab.  Phase 3: Filtration of the wave file using a filter in matlab to reduce noise.
  • 9.
  • 10.
  • 11. GUI
  • 12. Snapshot after loading the saved .wav file with desired wave form.
  • 13. Phase 5: Encryption of the file using md5 hash algorithm.
  • 14.  [1] Journal- Watermarking Relational Databases using Optimization Based Techniques.  [2] R. Agrawal and J. Kiernan. Watermarking Relational Databases. In Proceedings of 28th International Conference on Very Large Data Bases, Hong Kong, China, 2002.  [3] YouTube- Matlab demonstration-basic signal manipulation using audio signals.  [4] Journal- Voice Based Watermarking Technique for Relational Databases.  [5] YouTube- Matlab for Beginers. Reference: