Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Data hiding in audio signals ppt
1. DATA HIDING IN AUDIO
SIGNALS
INTERNAL GUIDE- PRESENTED BY-
ARSHIYA NOORI JAKERA PARVIN CHOUDHURY
HT NO:08H81A0417
2. INTRODUCTION
With the rapid development of the speech, audio,
image, and video compression methods, currently it
is not a difficult task to spread digital multimedia
over Internet. This makes the protections of digital
intellectual property rights and content
authentications have been a serious problem.
By using watermarking technique we can hide the
data in audio signal
3. BLOCK DIAGRAM
Host signal
Watermarked signal
Watermark Watermark Detected
embedder detector
watermark
ed
message
Watermark message
5. INTRODUCTION TO MATLAB
WHAT IS MATLAB?
HOW TO START AND QUIT MATLAB?
USING HELP IN MATLAB
MATRIX, VECTOR AND SCALAR
SOME BASIC COMMANDS
SOME BASIC PLOT COMMANDS
ALGEBRIC OPERATIONS IN MATLAB
READING AND WRITING SOUND FILES IN
MATLAB
6. HIDING TECHNIQUE
WATERMARKING
we can define watermarking systems as in which
the hidden message is related to the host signal
and non-watermarking systems in which the
message is unrelated to the host signal. On the
other hand, systems for embedding messages into
host signals can be divided into stegnographic
systems, in which the existence of the message is
kept secret, and non-stegnographic systems, in
which the presence of the embedded message
does not have to be secret.
7. APPLICATION AREAS
OWNERSHIP PROTECTION
PROOF OF OWNERSHIP
AUTHENTICATION AND TAMPERING
DETECTION
BROADCAST MONITORING
INFORMATION CARRIER
PERCEPTUAL TRANSPARENCY
WATERMARK BIT RATE
ROBUSTNESS
BLIND OR INFORMED WATERMARK
DETECTION
SECURITY
THEORY
9. SPEECH PROCESSING
SPEECH PRODUCTION
WHAT IS SPEECH PROCESSING
SPEECH CODING
SPEECH SYNTHESIS
SPECIAL TYPE OF VOICED AND UNVOICED SOUNDS
VOWELS
DIPHTHONGS
SEMIVOWELS
NASALS
UNVOICED FRICATIVES
VOICED FRICATIVES
VOICED STOPS
UNVOICED STOPS
SPEECH RECOGNITION
WHY ENCODE SPEECH
FACTORS ASSOCIATED WITH SPEECH
• Formants
• Phonemes
10. INTRODUCTION TO WAVELET ANALYSIS
INTRODUCING WAVELETS
WAVELET VS FOURIER ANALYSIS
TIME-FREQUENCY RESOLUTION
EXAMPLES OF WAVELETS
THE DISCRETE WAVELET TRANSFORM
THE FAST WAVELET TRANSFORM ALGORITHM
SIGNAL RECONSTRUCTION
SPEECH WATER MARKING
APPLCATIONS & ADVANTAGES
AUTHENTICATION AND TAMPERING DETECTION
BROADCAST MONITORING
INFORMATION CARRIER
PERCEPTUAL TRANSPARENCY
WATERMARK BIT RATE
ROBUSTNESS
SECURITY SERVICES
11. RESULTS
Main GUI
Step 1: Select the audio signal in for which you want to watermark
12. Step 2 Select the speech signal which you want to insert
13. Step 3: Select the watermarking button and hear the watermarked song and a audio
watermarked file will be written and stored in the current directory
14. ADVANTAGES and DISADVANTAGES
ADVANTAGES
1.Content preserving operations in the transmission channel should be
tolerated to facilitate flexible applications.
2. Low computational complexity both at the transmitter and receiver side is
important in real time media processing which can be possible
3. Localized malicious modification can be easily detected for he protected
digital data
4. Avoid ability of degradation and robustness for audio signals
5.Protection of intellectual digital works
6. It takes benefits from two State-Of-The-Art reference systems by exploiting
the receiver of the one for its low computational cost and the embedding
strategy of the other for its high transmission reliability.
7.Its receiver relies on an equalization Wiener Alter and its embedded uses a
local copy.
8.This watermarking technique relies on direct sequence spread spectrum
(DSSS) to spread the watermarked signal over the entire audible frequency
spectrum such that it approximates white noise, at a power level as to be
inaudible.
15. DISADVANTAGES
1.Digital information can easily be disseminated and copied via global
networks. Due to this ease, challenges regarding digital information have
created a need for more copyright laws. However, laws cannot be the only
entity required to protect digital works.
2.Terrorists can also use Audio data hiding to keep their communications
secret and to coordinate attacks.
3.There is a narrow margin between hiding watermark information in ways
which pass through perceptual encoders, and still cannot be perceived by
listeners.
4.There is a chance of distortion which leads to add any unwanted signal.due
to which listener cannot get the original signal.
5.The phase encoding watermarking technique offers higher data rates over
the previous methods, averaging from 8 to 32 bits per second. This technique
is increasingly effective in the presence of noise.
6. The robustness of the scheme can be increased somewhat with longer
audio files, by inserting the watermark signal multiple times, which will aid in
extraction, and also in error correction if the signal is manipulated.
16. APPLICATIONS
1. Audio data hiding can be used anytime you want to hide data. There are
many reasons to hide data but most important is to prevent unauthorized
persons from becoming aware of the existence of a message.
2. In the business world Audio data hiding can be used to hide a secret
chemical formula or plans for a new invention. Audio data hiding can also be
used in
corporate world.
3.Audio data hiding can also be used in the noncommercial sector to hide
information that someone wants to keep private.
4.Data hiding in video and audio, is of interest for the protection of
copyrighted digital media, and to the government for information systems
security and for covert communications.
5. It can also be used in forensic applications for inserting hidden data into
audio files for the authentication of spoken words and other sounds, and in
the music business for the monitoring of the songs over broadcast radio.
6. Terrorists can also use Audio data hiding to keep their communications
secret and to coordinate attacks.
17. FUTURE SCOPE
An increase in high bandwidth internet connections has also prompted
the motion picture industry to take note of possible revenue losses due to
unauthorized movie distribution via the internet. Microsoft is currently
developing new watermark technologies and is in the process of testing
future operating systems equipped with DRM for all media types.
The success of IP protection schemes over past years, including most
current watermarking technology, is limited. Virtually all the technologies
introduced to date have been cracked or have proven unsuitable due to the
degradation and distortion they introduce – for example, past watermarking
schemes from Verance have proven audible when demonstrated for record
companies. Watermarking digital audio becomes particularly difficult when
the file is subject to a lossy compression schemes such as MP3 or
WMA. These perceptual compression schemes, and current watermarking
schemes, take advantage of many of the same limitations of the human
auditory system – creating a problem whereby watermark information can
be distorted and lost.
18. CONCLUSION
In this paper we have introduced a robust method of imperceptible audio data
hiding. This system is to provide a good, efficient method for hiding the data from
hackers and sent to the destination in a safe manner. This proposed system will
not change the size of the file even after encoding and also suitable for any type
of audio file format. Thus we conclude that audio data hiding techniques can be
used for a number of purposes other than covert communication or deniable data
storage, information tracing and finger printing, tamper detection. As the sky is
not limit so is not for the development. Man is now pushing away its own
boundaries to make every thought possible. So similarly these operations
described above can be further modified as it is in the world of information
technology. After designing any operation every developer has a thought in his
mind that he could develop it by adding more features to it.