SlideShare una empresa de Scribd logo
1 de 19
DATA HIDING IN AUDIO
     SIGNALS




INTERNAL GUIDE-   PRESENTED BY-
ARSHIYA NOORI     JAKERA PARVIN CHOUDHURY
                  HT NO:08H81A0417
INTRODUCTION
  With the rapid development of the speech, audio,
  image, and video compression methods, currently it
  is not a difficult task to spread digital multimedia
  over Internet. This makes the protections of digital
  intellectual property rights and content
  authentications have been a serious problem.
 By using watermarking technique we can hide the
  data in audio signal
BLOCK DIAGRAM




       Host signal

                     Watermarked signal
     Watermark                            Watermark   Detected
     embedder                             detector
                                                      watermark
                                                      ed
                                                      message
  Watermark message
SOFTWARE REQUIRED



   BASED ON MATLAB SOFTWARE
INTRODUCTION TO MATLAB
 WHAT IS MATLAB?
 HOW TO START AND QUIT MATLAB?

 USING HELP IN MATLAB

 MATRIX, VECTOR AND SCALAR

 SOME BASIC COMMANDS

 SOME BASIC PLOT COMMANDS

 ALGEBRIC OPERATIONS IN MATLAB

 READING AND WRITING SOUND FILES IN
  MATLAB
HIDING TECHNIQUE
WATERMARKING
 we can define watermarking systems as in which
  the hidden message is related to the host signal
  and non-watermarking systems in which the
  message is unrelated to the host signal. On the
  other hand, systems for embedding messages into
  host signals can be divided into stegnographic
  systems, in which the existence of the message is
  kept secret, and non-stegnographic systems, in
  which the presence of the embedded message
  does not have to be secret.
 APPLICATION AREAS
 OWNERSHIP PROTECTION

 PROOF OF OWNERSHIP

 AUTHENTICATION AND TAMPERING
  DETECTION
 BROADCAST MONITORING

 INFORMATION CARRIER

 PERCEPTUAL TRANSPARENCY

 WATERMARK BIT RATE

 ROBUSTNESS

 BLIND OR INFORMED WATERMARK
  DETECTION
 SECURITY

 THEORY
THEORY




Basic Watermarking system equivalent to a communication system
SPEECH PROCESSING
   SPEECH PRODUCTION
   WHAT IS SPEECH PROCESSING
   SPEECH CODING
   SPEECH SYNTHESIS
   SPECIAL TYPE OF VOICED AND UNVOICED SOUNDS
   VOWELS
   DIPHTHONGS
   SEMIVOWELS
   NASALS
   UNVOICED FRICATIVES
   VOICED FRICATIVES
   VOICED STOPS
   UNVOICED STOPS
   SPEECH RECOGNITION
   WHY ENCODE SPEECH
   FACTORS ASSOCIATED WITH SPEECH
•   Formants
•   Phonemes
INTRODUCTION TO WAVELET ANALYSIS
   INTRODUCING WAVELETS
   WAVELET VS FOURIER ANALYSIS
   TIME-FREQUENCY RESOLUTION
   EXAMPLES OF WAVELETS
   THE DISCRETE WAVELET TRANSFORM
   THE FAST WAVELET TRANSFORM ALGORITHM
   SIGNAL RECONSTRUCTION
   SPEECH WATER MARKING
   APPLCATIONS & ADVANTAGES
   AUTHENTICATION AND TAMPERING DETECTION
   BROADCAST MONITORING
   INFORMATION CARRIER
   PERCEPTUAL TRANSPARENCY
   WATERMARK BIT RATE
   ROBUSTNESS
   SECURITY SERVICES
RESULTS
Main GUI




     Step 1: Select the audio signal in for which you want to watermark
Step 2 Select the speech signal which you want to insert
Step 3: Select the watermarking button and hear the watermarked song and a audio
watermarked file will be written and stored in the current directory
ADVANTAGES and DISADVANTAGES

 ADVANTAGES
1.Content preserving operations in the transmission channel should be
tolerated to facilitate flexible applications.
2. Low computational complexity both at the transmitter and receiver side is
important in real time media processing which can be possible
3. Localized malicious modification can be easily detected for he protected
digital data
4. Avoid ability of degradation and robustness for audio signals
5.Protection of intellectual digital works
6. It takes benefits from two State-Of-The-Art reference systems by exploiting
the receiver of the one for its low computational cost and the embedding
strategy of the other for its high transmission reliability.
7.Its receiver relies on an equalization Wiener Alter and its embedded uses a
local copy.
8.This watermarking technique relies on direct sequence spread spectrum
(DSSS) to spread the watermarked signal over the entire audible frequency
spectrum such that it approximates white noise, at a power level as to be
inaudible.
DISADVANTAGES
1.Digital information can easily be disseminated and copied via global
networks. Due to this ease, challenges regarding digital information have
created a need for more copyright laws. However, laws cannot be the only
entity required to protect digital works.
2.Terrorists can also use Audio data hiding to keep their communications
secret and to coordinate attacks.
3.There is a narrow margin between hiding watermark information in ways
which pass through perceptual encoders, and still cannot be perceived by
listeners.
4.There is a chance of distortion which leads to add any unwanted signal.due
to which listener cannot get the original signal.
5.The phase encoding watermarking technique offers higher data rates over
the previous methods, averaging from 8 to 32 bits per second. This technique
is increasingly effective in the presence of noise.
6. The robustness of the scheme can be increased somewhat with longer
audio files, by inserting the watermark signal multiple times, which will aid in
extraction, and also in error correction if the signal is manipulated.
APPLICATIONS
1. Audio data hiding can be used anytime you want to hide data. There are
many reasons to hide data but most important is to prevent unauthorized
persons from becoming aware of the existence of a message.
 2. In the business world Audio data hiding can be used to hide a secret
chemical formula or plans for a new invention. Audio data hiding can also be
used in
corporate world.
3.Audio data hiding can also be used in the noncommercial sector to hide
information that someone wants to keep private.
4.Data hiding in video and audio, is of interest for the protection of
copyrighted digital media, and to the government for information systems
security and for covert communications.
5. It can also be used in forensic applications for inserting hidden data into
audio files for the authentication of spoken words and other sounds, and in
the music business for the monitoring of the songs over broadcast radio.
6. Terrorists can also use Audio data hiding to keep their communications
secret and to coordinate attacks.
FUTURE SCOPE
     An increase in high bandwidth internet connections has also prompted
the motion picture industry to take note of possible revenue losses due to
unauthorized movie distribution via the internet. Microsoft is currently
developing new watermark technologies and is in the process of testing
future operating systems equipped with DRM for all media types.
     The success of IP protection schemes over past years, including most
current watermarking technology, is limited. Virtually all the technologies
introduced to date have been cracked or have proven unsuitable due to the
degradation and distortion they introduce – for example, past watermarking
schemes from Verance have proven audible when demonstrated for record
companies. Watermarking digital audio becomes particularly difficult when
the file is subject to a lossy compression schemes such as MP3 or
WMA. These perceptual compression schemes, and current watermarking
schemes, take advantage of many of the same limitations of the human
auditory system – creating a problem whereby watermark information can
be distorted and lost.
CONCLUSION
     In this paper we have introduced a robust method of imperceptible audio data
hiding. This system is to provide a good, efficient method for hiding the data from
hackers and sent to the destination in a safe manner. This proposed system will
not change the size of the file even after encoding and also suitable for any type
of audio file format. Thus we conclude that audio data hiding techniques can be
used for a number of purposes other than covert communication or deniable data
storage, information tracing and finger printing, tamper detection. As the sky is
not limit so is not for the development. Man is now pushing away its own
boundaries to make every thought possible. So similarly these operations
described above can be further modified as it is in the world of information
technology. After designing any operation every developer has a thought in his
mind that he could develop it by adding more features to it.
Data hiding in audio signals ppt

Más contenido relacionado

La actualidad más candente

Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Steganography basic
Steganography basicSteganography basic
Steganography basicSanoj Kumar
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Edureka!
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationLaili Aidi
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 

La actualidad más candente (20)

Steganography
SteganographySteganography
Steganography
 
Cryptography and Steganography
Cryptography and SteganographyCryptography and Steganography
Cryptography and Steganography
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Steganography
SteganographySteganography
Steganography
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography
SteganographySteganography
Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography basic
Steganography basicSteganography basic
Steganography basic
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Steganography.
Steganography.Steganography.
Steganography.
 

Destacado

AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Figures of speech ppt eductech2
Figures of speech ppt eductech2Figures of speech ppt eductech2
Figures of speech ppt eductech2James Daniel Bigaw
 
Audio authentication techniques
Audio authentication techniquesAudio authentication techniques
Audio authentication techniquespriyanka pandey
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and SteganographyPratik Poddar
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganographyARYA TM
 
Fingerprint identification technique
Fingerprint identification techniqueFingerprint identification technique
Fingerprint identification techniqueIAEME Publication
 
Android Malware Analysis
Android Malware AnalysisAndroid Malware Analysis
Android Malware AnalysisJongWon Kim
 
Audio Codec
Audio CodecAudio Codec
Audio Codeclesleyw
 
Semantics aware malware detection ppt
Semantics aware malware detection pptSemantics aware malware detection ppt
Semantics aware malware detection pptManish Yadav
 

Destacado (20)

AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Figures of speech ppt eductech2
Figures of speech ppt eductech2Figures of speech ppt eductech2
Figures of speech ppt eductech2
 
Audio authentication techniques
Audio authentication techniquesAudio authentication techniques
Audio authentication techniques
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
Fingerprint identification technique
Fingerprint identification techniqueFingerprint identification technique
Fingerprint identification technique
 
Android Malware Analysis
Android Malware AnalysisAndroid Malware Analysis
Android Malware Analysis
 
Audio Codec
Audio CodecAudio Codec
Audio Codec
 
Mini Project- Audio Enhancement
Mini Project-  Audio EnhancementMini Project-  Audio Enhancement
Mini Project- Audio Enhancement
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Semantics aware malware detection ppt
Semantics aware malware detection pptSemantics aware malware detection ppt
Semantics aware malware detection ppt
 

Similar a Data hiding in audio signals ppt

A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applicationsIAEME Publication
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...Ece Rljit
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...AIRCC Publishing Corporation
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ijcsit
 
Secure communication
Secure communicationSecure communication
Secure communicationTushar Swami
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxAyushJaiswal781174
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...ijma
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...ijma
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 

Similar a Data hiding in audio signals ppt (20)

A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
The Audio watermarking
The Audio watermarkingThe Audio watermarking
The Audio watermarking
 
40120130406010 2-3-4-5-6
40120130406010 2-3-4-5-640120130406010 2-3-4-5-6
40120130406010 2-3-4-5-6
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...A robust fsm watermarking scheme for ip protection of sequential circuit desi...
A robust fsm watermarking scheme for ip protection of sequential circuit desi...
 
1.pdf
1.pdf1.pdf
1.pdf
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
 
Secure communication
Secure communicationSecure communication
Secure communication
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 

Último

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Último (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Data hiding in audio signals ppt

  • 1. DATA HIDING IN AUDIO SIGNALS INTERNAL GUIDE- PRESENTED BY- ARSHIYA NOORI JAKERA PARVIN CHOUDHURY HT NO:08H81A0417
  • 2. INTRODUCTION  With the rapid development of the speech, audio, image, and video compression methods, currently it is not a difficult task to spread digital multimedia over Internet. This makes the protections of digital intellectual property rights and content authentications have been a serious problem.  By using watermarking technique we can hide the data in audio signal
  • 3. BLOCK DIAGRAM Host signal Watermarked signal Watermark Watermark Detected embedder detector watermark ed message Watermark message
  • 4. SOFTWARE REQUIRED  BASED ON MATLAB SOFTWARE
  • 5. INTRODUCTION TO MATLAB  WHAT IS MATLAB?  HOW TO START AND QUIT MATLAB?  USING HELP IN MATLAB  MATRIX, VECTOR AND SCALAR  SOME BASIC COMMANDS  SOME BASIC PLOT COMMANDS  ALGEBRIC OPERATIONS IN MATLAB  READING AND WRITING SOUND FILES IN MATLAB
  • 6. HIDING TECHNIQUE WATERMARKING  we can define watermarking systems as in which the hidden message is related to the host signal and non-watermarking systems in which the message is unrelated to the host signal. On the other hand, systems for embedding messages into host signals can be divided into stegnographic systems, in which the existence of the message is kept secret, and non-stegnographic systems, in which the presence of the embedded message does not have to be secret.
  • 7.  APPLICATION AREAS  OWNERSHIP PROTECTION  PROOF OF OWNERSHIP  AUTHENTICATION AND TAMPERING DETECTION  BROADCAST MONITORING  INFORMATION CARRIER  PERCEPTUAL TRANSPARENCY  WATERMARK BIT RATE  ROBUSTNESS  BLIND OR INFORMED WATERMARK DETECTION  SECURITY  THEORY
  • 8. THEORY Basic Watermarking system equivalent to a communication system
  • 9. SPEECH PROCESSING  SPEECH PRODUCTION  WHAT IS SPEECH PROCESSING  SPEECH CODING  SPEECH SYNTHESIS  SPECIAL TYPE OF VOICED AND UNVOICED SOUNDS  VOWELS  DIPHTHONGS  SEMIVOWELS  NASALS  UNVOICED FRICATIVES  VOICED FRICATIVES  VOICED STOPS  UNVOICED STOPS  SPEECH RECOGNITION  WHY ENCODE SPEECH  FACTORS ASSOCIATED WITH SPEECH • Formants • Phonemes
  • 10. INTRODUCTION TO WAVELET ANALYSIS  INTRODUCING WAVELETS  WAVELET VS FOURIER ANALYSIS  TIME-FREQUENCY RESOLUTION  EXAMPLES OF WAVELETS  THE DISCRETE WAVELET TRANSFORM  THE FAST WAVELET TRANSFORM ALGORITHM  SIGNAL RECONSTRUCTION  SPEECH WATER MARKING  APPLCATIONS & ADVANTAGES  AUTHENTICATION AND TAMPERING DETECTION  BROADCAST MONITORING  INFORMATION CARRIER  PERCEPTUAL TRANSPARENCY  WATERMARK BIT RATE  ROBUSTNESS  SECURITY SERVICES
  • 11. RESULTS Main GUI Step 1: Select the audio signal in for which you want to watermark
  • 12. Step 2 Select the speech signal which you want to insert
  • 13. Step 3: Select the watermarking button and hear the watermarked song and a audio watermarked file will be written and stored in the current directory
  • 14. ADVANTAGES and DISADVANTAGES ADVANTAGES 1.Content preserving operations in the transmission channel should be tolerated to facilitate flexible applications. 2. Low computational complexity both at the transmitter and receiver side is important in real time media processing which can be possible 3. Localized malicious modification can be easily detected for he protected digital data 4. Avoid ability of degradation and robustness for audio signals 5.Protection of intellectual digital works 6. It takes benefits from two State-Of-The-Art reference systems by exploiting the receiver of the one for its low computational cost and the embedding strategy of the other for its high transmission reliability. 7.Its receiver relies on an equalization Wiener Alter and its embedded uses a local copy. 8.This watermarking technique relies on direct sequence spread spectrum (DSSS) to spread the watermarked signal over the entire audible frequency spectrum such that it approximates white noise, at a power level as to be inaudible.
  • 15. DISADVANTAGES 1.Digital information can easily be disseminated and copied via global networks. Due to this ease, challenges regarding digital information have created a need for more copyright laws. However, laws cannot be the only entity required to protect digital works. 2.Terrorists can also use Audio data hiding to keep their communications secret and to coordinate attacks. 3.There is a narrow margin between hiding watermark information in ways which pass through perceptual encoders, and still cannot be perceived by listeners. 4.There is a chance of distortion which leads to add any unwanted signal.due to which listener cannot get the original signal. 5.The phase encoding watermarking technique offers higher data rates over the previous methods, averaging from 8 to 32 bits per second. This technique is increasingly effective in the presence of noise. 6. The robustness of the scheme can be increased somewhat with longer audio files, by inserting the watermark signal multiple times, which will aid in extraction, and also in error correction if the signal is manipulated.
  • 16. APPLICATIONS 1. Audio data hiding can be used anytime you want to hide data. There are many reasons to hide data but most important is to prevent unauthorized persons from becoming aware of the existence of a message. 2. In the business world Audio data hiding can be used to hide a secret chemical formula or plans for a new invention. Audio data hiding can also be used in corporate world. 3.Audio data hiding can also be used in the noncommercial sector to hide information that someone wants to keep private. 4.Data hiding in video and audio, is of interest for the protection of copyrighted digital media, and to the government for information systems security and for covert communications. 5. It can also be used in forensic applications for inserting hidden data into audio files for the authentication of spoken words and other sounds, and in the music business for the monitoring of the songs over broadcast radio. 6. Terrorists can also use Audio data hiding to keep their communications secret and to coordinate attacks.
  • 17. FUTURE SCOPE An increase in high bandwidth internet connections has also prompted the motion picture industry to take note of possible revenue losses due to unauthorized movie distribution via the internet. Microsoft is currently developing new watermark technologies and is in the process of testing future operating systems equipped with DRM for all media types. The success of IP protection schemes over past years, including most current watermarking technology, is limited. Virtually all the technologies introduced to date have been cracked or have proven unsuitable due to the degradation and distortion they introduce – for example, past watermarking schemes from Verance have proven audible when demonstrated for record companies. Watermarking digital audio becomes particularly difficult when the file is subject to a lossy compression schemes such as MP3 or WMA. These perceptual compression schemes, and current watermarking schemes, take advantage of many of the same limitations of the human auditory system – creating a problem whereby watermark information can be distorted and lost.
  • 18. CONCLUSION In this paper we have introduced a robust method of imperceptible audio data hiding. This system is to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safe manner. This proposed system will not change the size of the file even after encoding and also suitable for any type of audio file format. Thus we conclude that audio data hiding techniques can be used for a number of purposes other than covert communication or deniable data storage, information tracing and finger printing, tamper detection. As the sky is not limit so is not for the development. Man is now pushing away its own boundaries to make every thought possible. So similarly these operations described above can be further modified as it is in the world of information technology. After designing any operation every developer has a thought in his mind that he could develop it by adding more features to it.