SlideShare a Scribd company logo
1 of 28
THE AUDIO WATERMARKING
Digital
audio
watermarking is a technique for embedding
additional data(for example image) along
with audio signal so that it will not effect its
perceptual quality of an audio signal
Embedded data is used for copyright owner
identification . the watermark (for example
image , data, random sequence)should be
robust
against various signal processing
attacks
Audio watermarking is a
technique used to hide certain copyright
information (for example image, data,
random sequence etc) with audio signal in
such a way that This is not be hearable to
human ear and it should robust against all
kind of intentional and non intentional
attacks , and can be used for the purpose
of Intellectual Property Rights.
In the process of watermarking there are two signals
[1] Host signal (for example audio, video, image, text) which is to be
protected from unauthorized distribution.
[2]Watermark: may be a binary data sequence or an image which is to be
embedded as a proof of ownership with host signal.
“Watermarking is the process of embedding information into a signal (e.g
audio, video or pictures) in a way that is difficult to remove. If the signal is
copied, then the information is also carried in the copy.”
NEED OF WATERMARKING
With the growth of the Internet, unauthorized copying and distribution of digital
media has never been easier. As a result, the music industry claims a multibillion
dollar annual revenue loss due to piracy,

Normally an application is developed by a person or a small group of people and
used by many. Hackers are the people who tend to change the original
application by modifying it or use the same application to make profits without
giving credit to the owner.

So we do require a technique which can protect our data from unauthorized
copying and distribution and can provide copyright owner identification
For our digital data over internet.
OTHER TECHNIQUE WHICH CAN PROTACT UNAUTHORIZED
ACCESS OF DATA



1. STNEOGRAPHY steganography is a technique to send
information by writing on the cover object invisibly. Steganography
comes from the Greek word that means covered writing (Stego =
covered and Graphy = writing). Here the authorized party is only
aware of the existence of the hidden message.



2. CRYPTOGRAPHY In cryptographic techniques significant
information is encrypted so that only the key holder has access to
that information, once the information is decrypted the security is
lost. Cryptography protects the contents of the message.
DIFFERENCES BETWEEN STEGANOGRAPHY AND WATERMARKING
Although steganography and watermarking both describe techniques used for
covert communication,
steganography typically relates only to covert point to point communication
between two parties. The main purpose of steganography is to hide the fact of
communication. The sender embeds a secret message into digital media (e.g.
image) where only the receiver can extract this message
Steganographic methods are not robust against attacks or modification of data
that might occur during transmission, storage or format conversion
Watermarking is techniques whose primary objective is the security of the
object rather than the invisibility of the object. The significant difference between
the two techniques is the superior robustness capability of watermarking
schemes.
DIFFERENCE BETWEEN CRYPTOGRAPHY AND WATERMARKING:IN Cryptography technique message is encrypted and only intented receiver(Key
holder) can decrypt the message .
It is mainly useful for point to point communication.In cryptography once
message is decrypted then security lost.
In watermarking technique message is not encrypted but an another secreat
information is inserted with host signal in such a way that it will not effect
Its perceptual quality and can be used as Copyright.
APPLICATIONS OF WATERMARKING

Ownership protection and proof of ownership:
Authentication and tampering detection
Copy control and access control
Information carrier

Finger printing
Broadcast monitoring
Medical applications
Airline traffic monitoring
REQUIREMENTS OF WATERMARKING
According to IFPI (International Federation of the Phonographic Industry)
audio watermarking algorithms should meet certain requirements. The
most significant requirements are perceptibility,roubstness,security,
reliability, capacity, and speed performance.
[1]PERCEPTIBILITY:One of the important features of the watermarking
technique is that the watermarked signal should not lose the quality of the
original signal. The signal to noise ratio (SNR) of the watermarked signal to the
original signal should be maintained greater than 20dB . In addition, the
technique should make the modified signal not perceivable by human ear.
[2]ROUBSTNESS TO SIGNAL PROCESSING ATTACKS: Watermark should be
roubst against common signal processing attacks such as lossy compression
,linear filtering,Resampling,Requantization,cropping, jittering, D/A and A/D
conversion, Normal correlation (N.C.)is used for the measurement of roubstness.
[3] CAPACITY: The efficient watermarking technique should be able to carry
more information but should not degrade the quality of the audio signal.
REQUIREMENTS OF WATERMARKING

[4]SPEED: Speed of embedding is one of the criteria for efficient
watermarking technique. The speed of embedding of watermark is important
in real time applications where the embedding is done on continuous signals
such as, speech of an official or conversation between airplane pilot and
ground control staff.
Security and Cost
[5]COMPUTATIONAL COMPLEXITY:Computational complexity refers to
the processing required to embed watermark data into a host signal, and /or
to extract the data from the signal.
TRADE OFF BETWEEN THE VARIOUS REQUIREMENT OF WATERMARKING

The Imperceptibility, Roubustness and Capacity are the three most important
characteristics of a watermarking algorithm. However, there is a trade-off
between these three characteristics As seen from Figure imperceptibility,
robustness and capacity are conflicting characteristics of a watermarking
system . ie at the same time one can not fullfill all the requirement of
watermarking simultaneously.
PROBLEMS AND ATTACKS ON WATERMARKING
COMPRESSION: To reduce the size of watermarked audio signal
Is called compression.
RESAMPLING: During Analog to digital conversion a signal can be
Resampled at different different sampling frequencies.
REQUANTIZATION: A signal can be Requantized with different quantization
Level as we change the quantization level the quantization error also changed
And no of bits used to represent per sample also changed.
FILTERING:filtering is used to filter certain frequency componants
of any signal or we can say that it attenuate certain frequency
componant of any signal.
ADDITIVE WHITE GAUSSION NOISE ATTACKS :A.W.G.N. can be
added to watermark signal during attack.
CROPPING: Cropping means to remove the certain part from
the watermarked signal.
THE HUMEN AUDIORATORY SYSTEM [H.A.S.]
Watermarking of audio signals is more challenging
compared to the watermarking of images or video , due to wider
dynamic range of the HAS in comparison with human visual system
(HVS) .
The HAS perceives sounds over a range of power greater than 109:1
and a range of frequencies greater than 103:1.
The sensitivity of the HAS to the additive white Gaussian noise
(AWGN) is high as well noise in a sound file can be detected as low
as 70 dB below ambient level.
Most audio watermarking schemes rely on the imperfections of the human
auditory system (HAS).
HAS is insensitive to small amplitude changes in the time and frequency
domains, allowing the addition of weak noise signals (watermarks) to the
host audio signal such that the changes are inaudible.
In the time domain, it has been demonstrated that the HAS is insensitive to
small level changes and insertion of low-amplitude echoes [3].

Data hiding in the frequency domain takes advantage of the insensitivity of
the HAS to small spectral magnitude changes [3].
Further, HAS is insensitive to a constant relative phase shift in a
stationary audio signal and some spectral distortions are interpreted
as natural, perceptually non-annoying ones [39].
Two Properties of the HAS dominantly used in watermarking algorithms are
1. frequency (simultaneous) masking
2.temporal masking
FREQUENCY(SIMULTANEOUS) MASKING:
Frequency (simultaneous) masking is a frequency
domain observable fact where low levels signal (the maskee) can be made
inaudible (masked) by a simultaneously appearing stronger signal (the
masker), if the masker and maskee are close enough to each other in
frequency [5].
TEMPORAL MASKING:
.In the time domain, it has been demonstrated that the HAS is insensitive to
small level changes and insertion of low-amplitude echoes [3].
Frequency domain techniques, in particular, have been more effective than
time-domain techniques since watermarks are added to selected regions in
the transformed domain of the host audio signal, such that inaudibility an
robustness are maintained [18]
DIFFERENT ALGORITHMs FOR AUDIO WATERMARKING

THE MOST COMMON ALGORITHMS ARE
1 LSB CODING
2 ECHO WATERMARKING
3 PATCHWORK TECHNIQUE
4 QUANTIZATION INDEX MODULATION
5 PHASE CODING
6 SPREAD SPECTURM MODULATION
Further the wathermarking can be done in time domain as well as in
frequency domain
The commenly used time domain algorithms are
LSB Coding,
Echo hiding,
patchwork algorithms etc
Whereas frequency domain algorithms are
Phase coding
Cofficient quantization
Embedding the watermark by modifying the cofficients of the transform
outputs such as
F.F.T.
(Fast Fourier Transform) ,
S.T.F.T. (Sort time fourier Transform),
D.C.T. (Discrete fourier transform),
D.W.T. (Discreat wavelet transform) etc.
LSB CODING
This technique is one of the common techniques employed in signal
processing applications. It is based on the substitution of the LSB of the
carrier signal with the bit pattern from the watermark noise. The
robustness depends on the number of bits that are being replaced in the
host signal.

Fig L.S.B. CODING
ECHO WATERMARKING

Echo hiding schemes embed watermarks into a host signal by
adding echoes to produce watermarked signal. The nature of the
echo is to add resonance to the host audio.
After the echo has been added, watermarked signal retains the
same statistical and perceptual characteristics. The offset (or delay)
between the original and a watermarked signal is small enough
that the echo is perceived by the HAS as an added resonance.
PATCHWORK TECHNIQUE
The data to be watermarked is divided into two distinct
subsets. One feature of the data is selected and customized in opposite
directions in both subsets . For an example let the original signal is divided
into two parts A and B, then the part A is increased by a fraction Δ and the
part B is decreased by some amount Δ. The samples separation is the secret
key which is termed as watermarking key.
Let NA and NB indicate the size(s) of the individual A and B parts and Δ be
the total of the change made to the host signal. Suppose that a[i] and b[i]
represent the sample values at ith position in blocks A and B. The difference
of the sample values can be written as [72]

The expectation of the difference is used to extract the watermark which
is expressed as follo765ws .
QUANTIZATION INDEX MODULATION
The quantization index modulation (QIM) is a technique
which uses quantization of samples to embed watermark. The basic
principle of QIM is to find the maximum value of the samples and to divide
the range 0 to the maximum value into intervals of step size Δ. The intervals
are assigned a value of 0 or 1 depending on any pseudo random sequence.
Each sample has quantized value, thus, a polarity is assigned based on the
location of the interval. The watermark is embedded by changing the value
of the median for created interval and by the similarity of the polarity and
watermark bit.

Fig

Modification of samples using QIM
PHASE CODING [Watermarking the phase of the host signal]
Algorithms that embed watermark into the phase
of the host audio signal do not use masking properties of the HAS, but the
fact that the HAS is insensitive to a constant relative phase shift in a
stationary audio signal [71].
SPREAD-SPECTRUM WATERMARKING ALGORITHM
Spread-spectrum watermarking scheme is an example of the correlation
method which embeds pseudorandom sequence and detects watermark
by calculating correlation between pseudo-random noise sequence and
watermarked audio signal.
BASIC IDEA
The modulated signal is then added to the original audio to produce the
watermarked audio x(n) such as
x(n) = s(n) + αw(n)
The detection scheme uses linear correlation. Because the pseudorandom sequence r(n) is known and can be regenerated generated by
means of a secret key, watermarks are detected by using correlation
between x(n) and r(n) such as
where N denotes the length of signal. Equation yields the
correlation sum of two components as follows:
DOMAIN OF WATERMARKING
The audio watermarking can be classified as
1.TIME DOMAIN WATERMARKING (Temporal watermarking).
Temporal watermarking hides watermarks directly into digital audio signals in
the time domain, time-domain audio watermarking is relatively easy to
implement, and requires few computing resources, low cost, fast speed
however, it is weak against signal processing attacks such as compression
and filtering.
2.FREQUENCY DOMAIN WATERMARKING (spectral watermarking).
whereas spectral watermarking methods hides watermarks in the transform
domain. FFT, DCT, DWT,are commonly used transform.Frequency domain
watermarking is very roubst again various signal processing attacks.
TIME DOMAIN AUDIO WATERMARKING
In time domain watermarking techniques, watermark is directly embedded
into audio signal. No domain transform is required in this process.
Watermark signal is shaped before embedding operation to ensure its
inaudibility .
FREQUENCY DOMAIN AUDIO WATERMARKING
The input signal is first transformed to frequency domain where the
watermark is embedded, the resulting signal then goes through inverse
frequency transform to get the watermarked signal as output as shown
in Figure . Watermark can be embedded into frequency
THANKS

More Related Content

What's hot

Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Wavelet based image compression technique
Wavelet based image compression techniqueWavelet based image compression technique
Wavelet based image compression techniquePriyanka Pachori
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Huffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisHuffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisRamakant Soni
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganographyMahmut Yildiz
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementationAkash Jadhav
 

What's hot (20)

Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Wavelet based image compression technique
Wavelet based image compression techniqueWavelet based image compression technique
Wavelet based image compression technique
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Convolutional codes
Convolutional codesConvolutional codes
Convolutional codes
 
Huffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysisHuffman and Arithmetic coding - Performance analysis
Huffman and Arithmetic coding - Performance analysis
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Watermark
WatermarkWatermark
Watermark
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Similar to The Audio watermarking

Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals pptjackkhush
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applicationsIAEME Publication
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking TechniquesNazeera Sheth
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...ijma
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...ijma
 
Speech processing and recognition
Speech processing and recognition Speech processing and recognition
Speech processing and recognition Manvi Priya
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesEditor IJMTER
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxAyushJaiswal781174
 

Similar to The Audio watermarking (20)

Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
 
40120130406010 2-3-4-5-6
40120130406010 2-3-4-5-640120130406010 2-3-4-5-6
40120130406010 2-3-4-5-6
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Digital watermarking Techniques
Digital watermarking TechniquesDigital watermarking Techniques
Digital watermarking Techniques
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
 
Speech processing and recognition
Speech processing and recognition Speech processing and recognition
Speech processing and recognition
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
50120140504020 2
50120140504020 250120140504020 2
50120140504020 2
 
Iw2415551560
Iw2415551560Iw2415551560
Iw2415551560
 
E04122330
E04122330E04122330
E04122330
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniquesA review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
 
B010510613
B010510613B010510613
B010510613
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 

More from Department of Technical Education, Ministry of Education (8)

presentation skill
presentation skillpresentation skill
presentation skill
 
Book wavelets
Book waveletsBook wavelets
Book wavelets
 
Fourier transform
Fourier transformFourier transform
Fourier transform
 
Difference between wavelet transform and fourier transform
Difference between wavelet transform and fourier transformDifference between wavelet transform and fourier transform
Difference between wavelet transform and fourier transform
 
Wavelet transform
Wavelet transformWavelet transform
Wavelet transform
 
Half wave rectifier
Half wave rectifierHalf wave rectifier
Half wave rectifier
 
Bridge rectifier
Bridge rectifierBridge rectifier
Bridge rectifier
 
Rectifier
RectifierRectifier
Rectifier
 

Recently uploaded

ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Recently uploaded (20)

LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

The Audio watermarking

  • 2. Digital audio watermarking is a technique for embedding additional data(for example image) along with audio signal so that it will not effect its perceptual quality of an audio signal Embedded data is used for copyright owner identification . the watermark (for example image , data, random sequence)should be robust against various signal processing attacks Audio watermarking is a technique used to hide certain copyright information (for example image, data, random sequence etc) with audio signal in such a way that This is not be hearable to human ear and it should robust against all kind of intentional and non intentional attacks , and can be used for the purpose of Intellectual Property Rights.
  • 3. In the process of watermarking there are two signals [1] Host signal (for example audio, video, image, text) which is to be protected from unauthorized distribution. [2]Watermark: may be a binary data sequence or an image which is to be embedded as a proof of ownership with host signal. “Watermarking is the process of embedding information into a signal (e.g audio, video or pictures) in a way that is difficult to remove. If the signal is copied, then the information is also carried in the copy.”
  • 4. NEED OF WATERMARKING With the growth of the Internet, unauthorized copying and distribution of digital media has never been easier. As a result, the music industry claims a multibillion dollar annual revenue loss due to piracy, Normally an application is developed by a person or a small group of people and used by many. Hackers are the people who tend to change the original application by modifying it or use the same application to make profits without giving credit to the owner. So we do require a technique which can protect our data from unauthorized copying and distribution and can provide copyright owner identification For our digital data over internet.
  • 5. OTHER TECHNIQUE WHICH CAN PROTACT UNAUTHORIZED ACCESS OF DATA  1. STNEOGRAPHY steganography is a technique to send information by writing on the cover object invisibly. Steganography comes from the Greek word that means covered writing (Stego = covered and Graphy = writing). Here the authorized party is only aware of the existence of the hidden message.  2. CRYPTOGRAPHY In cryptographic techniques significant information is encrypted so that only the key holder has access to that information, once the information is decrypted the security is lost. Cryptography protects the contents of the message.
  • 6. DIFFERENCES BETWEEN STEGANOGRAPHY AND WATERMARKING Although steganography and watermarking both describe techniques used for covert communication, steganography typically relates only to covert point to point communication between two parties. The main purpose of steganography is to hide the fact of communication. The sender embeds a secret message into digital media (e.g. image) where only the receiver can extract this message Steganographic methods are not robust against attacks or modification of data that might occur during transmission, storage or format conversion Watermarking is techniques whose primary objective is the security of the object rather than the invisibility of the object. The significant difference between the two techniques is the superior robustness capability of watermarking schemes.
  • 7. DIFFERENCE BETWEEN CRYPTOGRAPHY AND WATERMARKING:IN Cryptography technique message is encrypted and only intented receiver(Key holder) can decrypt the message . It is mainly useful for point to point communication.In cryptography once message is decrypted then security lost. In watermarking technique message is not encrypted but an another secreat information is inserted with host signal in such a way that it will not effect Its perceptual quality and can be used as Copyright.
  • 8. APPLICATIONS OF WATERMARKING Ownership protection and proof of ownership: Authentication and tampering detection Copy control and access control Information carrier Finger printing Broadcast monitoring Medical applications Airline traffic monitoring
  • 9. REQUIREMENTS OF WATERMARKING According to IFPI (International Federation of the Phonographic Industry) audio watermarking algorithms should meet certain requirements. The most significant requirements are perceptibility,roubstness,security, reliability, capacity, and speed performance. [1]PERCEPTIBILITY:One of the important features of the watermarking technique is that the watermarked signal should not lose the quality of the original signal. The signal to noise ratio (SNR) of the watermarked signal to the original signal should be maintained greater than 20dB . In addition, the technique should make the modified signal not perceivable by human ear. [2]ROUBSTNESS TO SIGNAL PROCESSING ATTACKS: Watermark should be roubst against common signal processing attacks such as lossy compression ,linear filtering,Resampling,Requantization,cropping, jittering, D/A and A/D conversion, Normal correlation (N.C.)is used for the measurement of roubstness. [3] CAPACITY: The efficient watermarking technique should be able to carry more information but should not degrade the quality of the audio signal.
  • 10. REQUIREMENTS OF WATERMARKING [4]SPEED: Speed of embedding is one of the criteria for efficient watermarking technique. The speed of embedding of watermark is important in real time applications where the embedding is done on continuous signals such as, speech of an official or conversation between airplane pilot and ground control staff. Security and Cost [5]COMPUTATIONAL COMPLEXITY:Computational complexity refers to the processing required to embed watermark data into a host signal, and /or to extract the data from the signal.
  • 11. TRADE OFF BETWEEN THE VARIOUS REQUIREMENT OF WATERMARKING The Imperceptibility, Roubustness and Capacity are the three most important characteristics of a watermarking algorithm. However, there is a trade-off between these three characteristics As seen from Figure imperceptibility, robustness and capacity are conflicting characteristics of a watermarking system . ie at the same time one can not fullfill all the requirement of watermarking simultaneously.
  • 12. PROBLEMS AND ATTACKS ON WATERMARKING COMPRESSION: To reduce the size of watermarked audio signal Is called compression. RESAMPLING: During Analog to digital conversion a signal can be Resampled at different different sampling frequencies. REQUANTIZATION: A signal can be Requantized with different quantization Level as we change the quantization level the quantization error also changed And no of bits used to represent per sample also changed. FILTERING:filtering is used to filter certain frequency componants of any signal or we can say that it attenuate certain frequency componant of any signal. ADDITIVE WHITE GAUSSION NOISE ATTACKS :A.W.G.N. can be added to watermark signal during attack. CROPPING: Cropping means to remove the certain part from the watermarked signal.
  • 13. THE HUMEN AUDIORATORY SYSTEM [H.A.S.] Watermarking of audio signals is more challenging compared to the watermarking of images or video , due to wider dynamic range of the HAS in comparison with human visual system (HVS) . The HAS perceives sounds over a range of power greater than 109:1 and a range of frequencies greater than 103:1. The sensitivity of the HAS to the additive white Gaussian noise (AWGN) is high as well noise in a sound file can be detected as low as 70 dB below ambient level.
  • 14. Most audio watermarking schemes rely on the imperfections of the human auditory system (HAS). HAS is insensitive to small amplitude changes in the time and frequency domains, allowing the addition of weak noise signals (watermarks) to the host audio signal such that the changes are inaudible. In the time domain, it has been demonstrated that the HAS is insensitive to small level changes and insertion of low-amplitude echoes [3]. Data hiding in the frequency domain takes advantage of the insensitivity of the HAS to small spectral magnitude changes [3]. Further, HAS is insensitive to a constant relative phase shift in a stationary audio signal and some spectral distortions are interpreted as natural, perceptually non-annoying ones [39].
  • 15. Two Properties of the HAS dominantly used in watermarking algorithms are 1. frequency (simultaneous) masking 2.temporal masking FREQUENCY(SIMULTANEOUS) MASKING: Frequency (simultaneous) masking is a frequency domain observable fact where low levels signal (the maskee) can be made inaudible (masked) by a simultaneously appearing stronger signal (the masker), if the masker and maskee are close enough to each other in frequency [5]. TEMPORAL MASKING: .In the time domain, it has been demonstrated that the HAS is insensitive to small level changes and insertion of low-amplitude echoes [3]. Frequency domain techniques, in particular, have been more effective than time-domain techniques since watermarks are added to selected regions in the transformed domain of the host audio signal, such that inaudibility an robustness are maintained [18]
  • 16. DIFFERENT ALGORITHMs FOR AUDIO WATERMARKING THE MOST COMMON ALGORITHMS ARE 1 LSB CODING 2 ECHO WATERMARKING 3 PATCHWORK TECHNIQUE 4 QUANTIZATION INDEX MODULATION 5 PHASE CODING 6 SPREAD SPECTURM MODULATION
  • 17. Further the wathermarking can be done in time domain as well as in frequency domain The commenly used time domain algorithms are LSB Coding, Echo hiding, patchwork algorithms etc Whereas frequency domain algorithms are Phase coding Cofficient quantization Embedding the watermark by modifying the cofficients of the transform outputs such as F.F.T. (Fast Fourier Transform) , S.T.F.T. (Sort time fourier Transform), D.C.T. (Discrete fourier transform), D.W.T. (Discreat wavelet transform) etc.
  • 18. LSB CODING This technique is one of the common techniques employed in signal processing applications. It is based on the substitution of the LSB of the carrier signal with the bit pattern from the watermark noise. The robustness depends on the number of bits that are being replaced in the host signal. Fig L.S.B. CODING
  • 19. ECHO WATERMARKING Echo hiding schemes embed watermarks into a host signal by adding echoes to produce watermarked signal. The nature of the echo is to add resonance to the host audio. After the echo has been added, watermarked signal retains the same statistical and perceptual characteristics. The offset (or delay) between the original and a watermarked signal is small enough that the echo is perceived by the HAS as an added resonance.
  • 20. PATCHWORK TECHNIQUE The data to be watermarked is divided into two distinct subsets. One feature of the data is selected and customized in opposite directions in both subsets . For an example let the original signal is divided into two parts A and B, then the part A is increased by a fraction Δ and the part B is decreased by some amount Δ. The samples separation is the secret key which is termed as watermarking key. Let NA and NB indicate the size(s) of the individual A and B parts and Δ be the total of the change made to the host signal. Suppose that a[i] and b[i] represent the sample values at ith position in blocks A and B. The difference of the sample values can be written as [72] The expectation of the difference is used to extract the watermark which is expressed as follo765ws .
  • 21. QUANTIZATION INDEX MODULATION The quantization index modulation (QIM) is a technique which uses quantization of samples to embed watermark. The basic principle of QIM is to find the maximum value of the samples and to divide the range 0 to the maximum value into intervals of step size Δ. The intervals are assigned a value of 0 or 1 depending on any pseudo random sequence. Each sample has quantized value, thus, a polarity is assigned based on the location of the interval. The watermark is embedded by changing the value of the median for created interval and by the similarity of the polarity and watermark bit. Fig Modification of samples using QIM
  • 22. PHASE CODING [Watermarking the phase of the host signal] Algorithms that embed watermark into the phase of the host audio signal do not use masking properties of the HAS, but the fact that the HAS is insensitive to a constant relative phase shift in a stationary audio signal [71].
  • 23. SPREAD-SPECTRUM WATERMARKING ALGORITHM Spread-spectrum watermarking scheme is an example of the correlation method which embeds pseudorandom sequence and detects watermark by calculating correlation between pseudo-random noise sequence and watermarked audio signal. BASIC IDEA The modulated signal is then added to the original audio to produce the watermarked audio x(n) such as x(n) = s(n) + αw(n) The detection scheme uses linear correlation. Because the pseudorandom sequence r(n) is known and can be regenerated generated by means of a secret key, watermarks are detected by using correlation between x(n) and r(n) such as
  • 24. where N denotes the length of signal. Equation yields the correlation sum of two components as follows:
  • 25. DOMAIN OF WATERMARKING The audio watermarking can be classified as 1.TIME DOMAIN WATERMARKING (Temporal watermarking). Temporal watermarking hides watermarks directly into digital audio signals in the time domain, time-domain audio watermarking is relatively easy to implement, and requires few computing resources, low cost, fast speed however, it is weak against signal processing attacks such as compression and filtering. 2.FREQUENCY DOMAIN WATERMARKING (spectral watermarking). whereas spectral watermarking methods hides watermarks in the transform domain. FFT, DCT, DWT,are commonly used transform.Frequency domain watermarking is very roubst again various signal processing attacks.
  • 26. TIME DOMAIN AUDIO WATERMARKING In time domain watermarking techniques, watermark is directly embedded into audio signal. No domain transform is required in this process. Watermark signal is shaped before embedding operation to ensure its inaudibility .
  • 27. FREQUENCY DOMAIN AUDIO WATERMARKING The input signal is first transformed to frequency domain where the watermark is embedded, the resulting signal then goes through inverse frequency transform to get the watermarked signal as output as shown in Figure . Watermark can be embedded into frequency