SlideShare una empresa de Scribd logo
1 de 21
Bit Replacement Audio Watermarking
                     Using Stereo Signals


                                               Term Project

                               Muhammad Umer Kakli
                            Muhammad Naeem Tayyab




This Paper was presented in International Conference on
   New Trends in Information & Service Science 2009
         By Wei Cao, Yixin Yan, Shengming Li
Digital Watermarking involves embedding secret data
as an additional information to the digital signal such
          as Audio, Image or Video Signal.



        Copyright Protection
        Video Fingerprinting
        Broadcast Monitoring
For Digital Audio Watermarking, the approaches can be
                   Blind or Non-blind.

For Non-blind watermarking techniques, original signals
are required for watermark extraction while in Blind
technique original signals are not required to extract
watermark.
   Removal Attacks: Trying to remove the watermark
      signal without attempting to break the security of
      watermark algorithm.
   Geometric Attacks: Don’t remove the watermark itself,
      but intended to distort the watermark detector
      synchronization with the embedded information.
   Cryptographic Attacks: Aim at cracking the security
      methods in watermarking schemes and thus finding
      a way to remove the embedded watermark
      information
   Protocol Attacks: Aim at attacking the entire concept
      of watermarking application.
Figure 1: Classification of Watermark Attacks
   LSB Encoding

   Echo Hiding

   Spread Spectrum Watermarking

   Watermarking the phase of the host signal
   Watermark added to the Least Significant Bit
     (LSB)

   Easy to embed and retrieve

   High bit rate
De-merits of LSB Encoding Scheme
 Robustness of this method is very low
 Watermark bits can be easily detected and changed
 Addition of High level noise, re-sampling and MP3
  Compression may completely destroy the watermark
  information.

Proposed Scheme
   Instead of using LSB of mono-signal samples, it is
    perceived that by using higher bits of Stereo-Signal
    samples, it can be more robust.
   The proposed Audio Watermarking scheme improves
    mono-signal watermarking method by introducing
    watermarking threshold and making use of Stereo
    Signals.

Mono Signals Vs. Stereo Signals
   Mono means audio signals are mixed together and
    routed through a single channel while In Stereo two or
    more individual channels are using. left channel's o/p is
    connected to the left speakers and right channel's o/p is
    connected to the right speakers. It gives the effect of
    direction    and       the     depth       of     sound.
   Watermarking threshold is calculated using the following
    equation
                Watermarking Threshold = 1/2n-(w+4)
                   n=Number of bits per sample
                   w=Watermark embed bit layer

   Samples whose values are higher than threshold are
    considered as “Non-Silent” samples and they are used
    to embed watermark bits. Samples whose values are
    lower than threshold are considered as “Silent”
    samples and they are not used for watermark
    embedding.
After threshold calculation , let each “non-silent” sample
value of original stereo signal be represented in 16 bit
binary format.
              a16,a15,a14,………….a3,a2,a1

where a1 is the bit in the 1st bit layer, a2 is the bit in the
2nd bit layer and so on.

A watermark bit stream is first generated and ith bit layers
of “non-silent” samples are used as watermark
embedded bit layer.
If the first bit of the stream is bit “1”, and ai of the first “non-silent”
sample of left-channel signal is also bit “1”, no action is taken. If ai is
not “1”, watermark embedding process of left-channel signal is
performed according to the following procedures,
If the first bit of the stream is bit “0”, and ai of the first “non-silent”
sample of right-channel signal is also bit “0”, no action is taken. If ai
is not “0”, watermark embedding process of right channel signal is
performed according to the following procedures,
Effect of Watermarking on Bit Layers




  Figure 2: Percentage of Changed bits as embedding in the 5th bit layer
Signal to Noise Ration (SNR)




 Signal to Noise          Embedded Bit Layer of Watermark Signals
     Ratios
      (dB)          1st          2nd       3rd       4th            5th
Stereo Signals     72.09        70.15     67.38     59.36      46.25
Mono Signals       66.52        61.49     56.81     44.37      28.53



             SNR of Watermarked Stereo and Mono Signals
Robustness under Attack of Addition of Noise




Figure 3: Watermark Extraction Rate Under addition of White noise (for 20dB & 50dB)
Robustness under MP3 Compression Attack

                                 Embedded Bit Layer of Watermark
  Extraction Rate (%) for MP3
        Compression
                                            Signals
                                 1st     2nd     3rd     4th     5th
  Extraction Rate (%)           49.80   49.82   49.83   50.06   50.11




    Watermark Extraction Rate Under Attack of MP3 Compression
Robustness under Re-Sampling Attack
        Watermark        Embedded Bit Layer of Watermark Signals
      Extraction Rate
            (%)            1st    2nd      3rd     4th     5th

                    14.70 48.99 49.54 49.83 49.71 50.11
      Re-sampling
       Frequency




                    22.05 49.61 49.73 50.17 50.66 50.70
         (KHz)




                    66.15 49.17 49.84 49.96 50.30 50.43
                    88.20 50.03 53.29 55.64 58.52 60.79


      Watermark Extraction Rate Under Attack of Re-sampling
The noise level due to embedding watermark is
significantly reduced. This schemes is robust against
addition of white noise, even if the noise level is high.
The proposed scheme is not robust against MP3
Compression and re-sampling unless frequency is
integer multiple of original sampling frequency.
Bit replacement audio watermarking

Más contenido relacionado

La actualidad más candente

Communication Networks II
Communication Networks IICommunication Networks II
Communication Networks IIanishgoel
 
Adaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signalAdaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signalSai Malleswar
 
Pulse code modulation and Quantization
Pulse code modulation and QuantizationPulse code modulation and Quantization
Pulse code modulation and QuantizationMuhamamd Awaissaleem
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulationramalakshmi54
 
Wireless digital communication and coding techniques new
Wireless digital communication and coding techniques newWireless digital communication and coding techniques new
Wireless digital communication and coding techniques newClyde Lettsome
 
Digital communications 1
Digital communications 1Digital communications 1
Digital communications 1Jojie Cepeda
 
Slides2 The Communication System midterm Slides
Slides2  The Communication System midterm SlidesSlides2  The Communication System midterm Slides
Slides2 The Communication System midterm SlidesNoctorous Jamal
 
Companding and DPCM and ADPCM
Companding and DPCM and ADPCMCompanding and DPCM and ADPCM
Companding and DPCM and ADPCMnaimish12
 
Wireless quality of services
Wireless quality of servicesWireless quality of services
Wireless quality of servicesUtkarsh Vashistha
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulationGec bharuch
 
Digital Signal Processing-Digital Filters
Digital Signal Processing-Digital FiltersDigital Signal Processing-Digital Filters
Digital Signal Processing-Digital FiltersNelson Anand
 

La actualidad más candente (20)

Communication Networks II
Communication Networks IICommunication Networks II
Communication Networks II
 
Adaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signalAdaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signal
 
Analog to-digital conversion
Analog to-digital conversionAnalog to-digital conversion
Analog to-digital conversion
 
DPCM
DPCMDPCM
DPCM
 
30 CHL PCM PDH SDH BY SKG
30 CHL PCM PDH SDH BY SKG30 CHL PCM PDH SDH BY SKG
30 CHL PCM PDH SDH BY SKG
 
Digital communication unit 1
Digital communication unit 1Digital communication unit 1
Digital communication unit 1
 
Pulse code modulation and Quantization
Pulse code modulation and QuantizationPulse code modulation and Quantization
Pulse code modulation and Quantization
 
NI Presenation Delta
NI Presenation DeltaNI Presenation Delta
NI Presenation Delta
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
 
Wireless digital communication and coding techniques new
Wireless digital communication and coding techniques newWireless digital communication and coding techniques new
Wireless digital communication and coding techniques new
 
Digital communications 1
Digital communications 1Digital communications 1
Digital communications 1
 
Presentation ct
Presentation ctPresentation ct
Presentation ct
 
Slides2 The Communication System midterm Slides
Slides2  The Communication System midterm SlidesSlides2  The Communication System midterm Slides
Slides2 The Communication System midterm Slides
 
00699b
00699b00699b
00699b
 
Companding and DPCM and ADPCM
Companding and DPCM and ADPCMCompanding and DPCM and ADPCM
Companding and DPCM and ADPCM
 
Digital signal processing part1
Digital signal processing part1Digital signal processing part1
Digital signal processing part1
 
Pcm
PcmPcm
Pcm
 
Wireless quality of services
Wireless quality of servicesWireless quality of services
Wireless quality of services
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
 
Digital Signal Processing-Digital Filters
Digital Signal Processing-Digital FiltersDigital Signal Processing-Digital Filters
Digital Signal Processing-Digital Filters
 

Similar a Bit replacement audio watermarking

Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxAyushJaiswal781174
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalEvaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalIJRES Journal
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study ijcisjournal
 
Speech processing and recognition
Speech processing and recognition Speech processing and recognition
Speech processing and recognition Manvi Priya
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approachijsrd.com
 
Chapter 2- Digital Data Acquistion.ppt
Chapter 2- Digital Data Acquistion.pptChapter 2- Digital Data Acquistion.ppt
Chapter 2- Digital Data Acquistion.pptVasanthiMuniasamy2
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compressionMr SMAK
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compressionMr SMAK
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applicationsIAEME Publication
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumCSCJournals
 
Audio compression 1
Audio compression 1Audio compression 1
Audio compression 1Rajat Kumar
 
DSP Based Speech Operated Home Appliances UsingZero Crossing Features
DSP Based Speech Operated Home Appliances UsingZero Crossing FeaturesDSP Based Speech Operated Home Appliances UsingZero Crossing Features
DSP Based Speech Operated Home Appliances UsingZero Crossing FeaturesCSCJournals
 
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)Masayuki Tanaka
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarkingSaurabh Kaushik
 
IIR Filter Design for De Nosing Speech Signal using Matlab
IIR Filter Design for De Nosing Speech Signal using MatlabIIR Filter Design for De Nosing Speech Signal using Matlab
IIR Filter Design for De Nosing Speech Signal using Matlabijtsrd
 
0A-01-ACA-Fundamentals-Digitization.pdf
0A-01-ACA-Fundamentals-Digitization.pdf0A-01-ACA-Fundamentals-Digitization.pdf
0A-01-ACA-Fundamentals-Digitization.pdfAlexanderLerch4
 

Similar a Bit replacement audio watermarking (20)

Digital Audio
Digital AudioDigital Audio
Digital Audio
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalEvaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
Speech processing and recognition
Speech processing and recognition Speech processing and recognition
Speech processing and recognition
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
 
Chapter 2- Digital Data Acquistion.ppt
Chapter 2- Digital Data Acquistion.pptChapter 2- Digital Data Acquistion.ppt
Chapter 2- Digital Data Acquistion.ppt
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
 
Coding
CodingCoding
Coding
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
Audio compression 1
Audio compression 1Audio compression 1
Audio compression 1
 
DSP Based Speech Operated Home Appliances UsingZero Crossing Features
DSP Based Speech Operated Home Appliances UsingZero Crossing FeaturesDSP Based Speech Operated Home Appliances UsingZero Crossing Features
DSP Based Speech Operated Home Appliances UsingZero Crossing Features
 
Speaker recognition.
Speaker recognition.Speaker recognition.
Speaker recognition.
 
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
IIR Filter Design for De Nosing Speech Signal using Matlab
IIR Filter Design for De Nosing Speech Signal using MatlabIIR Filter Design for De Nosing Speech Signal using Matlab
IIR Filter Design for De Nosing Speech Signal using Matlab
 
0A-01-ACA-Fundamentals-Digitization.pdf
0A-01-ACA-Fundamentals-Digitization.pdf0A-01-ACA-Fundamentals-Digitization.pdf
0A-01-ACA-Fundamentals-Digitization.pdf
 

Último

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Bit replacement audio watermarking

  • 1. Bit Replacement Audio Watermarking Using Stereo Signals Term Project Muhammad Umer Kakli Muhammad Naeem Tayyab This Paper was presented in International Conference on New Trends in Information & Service Science 2009 By Wei Cao, Yixin Yan, Shengming Li
  • 2. Digital Watermarking involves embedding secret data as an additional information to the digital signal such as Audio, Image or Video Signal.  Copyright Protection  Video Fingerprinting  Broadcast Monitoring
  • 3.
  • 4. For Digital Audio Watermarking, the approaches can be Blind or Non-blind. For Non-blind watermarking techniques, original signals are required for watermark extraction while in Blind technique original signals are not required to extract watermark.
  • 5. Removal Attacks: Trying to remove the watermark signal without attempting to break the security of watermark algorithm.  Geometric Attacks: Don’t remove the watermark itself, but intended to distort the watermark detector synchronization with the embedded information.  Cryptographic Attacks: Aim at cracking the security methods in watermarking schemes and thus finding a way to remove the embedded watermark information  Protocol Attacks: Aim at attacking the entire concept of watermarking application.
  • 6. Figure 1: Classification of Watermark Attacks
  • 7. LSB Encoding  Echo Hiding  Spread Spectrum Watermarking  Watermarking the phase of the host signal
  • 8. Watermark added to the Least Significant Bit (LSB)  Easy to embed and retrieve  High bit rate
  • 9. De-merits of LSB Encoding Scheme  Robustness of this method is very low  Watermark bits can be easily detected and changed  Addition of High level noise, re-sampling and MP3 Compression may completely destroy the watermark information. Proposed Scheme  Instead of using LSB of mono-signal samples, it is perceived that by using higher bits of Stereo-Signal samples, it can be more robust.
  • 10. The proposed Audio Watermarking scheme improves mono-signal watermarking method by introducing watermarking threshold and making use of Stereo Signals. Mono Signals Vs. Stereo Signals  Mono means audio signals are mixed together and routed through a single channel while In Stereo two or more individual channels are using. left channel's o/p is connected to the left speakers and right channel's o/p is connected to the right speakers. It gives the effect of direction and the depth of sound.
  • 11. Watermarking threshold is calculated using the following equation Watermarking Threshold = 1/2n-(w+4) n=Number of bits per sample w=Watermark embed bit layer  Samples whose values are higher than threshold are considered as “Non-Silent” samples and they are used to embed watermark bits. Samples whose values are lower than threshold are considered as “Silent” samples and they are not used for watermark embedding.
  • 12. After threshold calculation , let each “non-silent” sample value of original stereo signal be represented in 16 bit binary format. a16,a15,a14,………….a3,a2,a1 where a1 is the bit in the 1st bit layer, a2 is the bit in the 2nd bit layer and so on. A watermark bit stream is first generated and ith bit layers of “non-silent” samples are used as watermark embedded bit layer.
  • 13. If the first bit of the stream is bit “1”, and ai of the first “non-silent” sample of left-channel signal is also bit “1”, no action is taken. If ai is not “1”, watermark embedding process of left-channel signal is performed according to the following procedures,
  • 14. If the first bit of the stream is bit “0”, and ai of the first “non-silent” sample of right-channel signal is also bit “0”, no action is taken. If ai is not “0”, watermark embedding process of right channel signal is performed according to the following procedures,
  • 15. Effect of Watermarking on Bit Layers Figure 2: Percentage of Changed bits as embedding in the 5th bit layer
  • 16. Signal to Noise Ration (SNR) Signal to Noise Embedded Bit Layer of Watermark Signals Ratios (dB) 1st 2nd 3rd 4th 5th Stereo Signals 72.09 70.15 67.38 59.36 46.25 Mono Signals 66.52 61.49 56.81 44.37 28.53 SNR of Watermarked Stereo and Mono Signals
  • 17. Robustness under Attack of Addition of Noise Figure 3: Watermark Extraction Rate Under addition of White noise (for 20dB & 50dB)
  • 18. Robustness under MP3 Compression Attack Embedded Bit Layer of Watermark Extraction Rate (%) for MP3 Compression Signals 1st 2nd 3rd 4th 5th Extraction Rate (%) 49.80 49.82 49.83 50.06 50.11 Watermark Extraction Rate Under Attack of MP3 Compression
  • 19. Robustness under Re-Sampling Attack Watermark Embedded Bit Layer of Watermark Signals Extraction Rate (%) 1st 2nd 3rd 4th 5th 14.70 48.99 49.54 49.83 49.71 50.11 Re-sampling Frequency 22.05 49.61 49.73 50.17 50.66 50.70 (KHz) 66.15 49.17 49.84 49.96 50.30 50.43 88.20 50.03 53.29 55.64 58.52 60.79 Watermark Extraction Rate Under Attack of Re-sampling
  • 20. The noise level due to embedding watermark is significantly reduced. This schemes is robust against addition of white noise, even if the noise level is high. The proposed scheme is not robust against MP3 Compression and re-sampling unless frequency is integer multiple of original sampling frequency.