Professional Documents
Culture Documents
Functionality:
Digital watermarking is the act of embedding a message (i.e. an image, song, and video). Its concept
is similar to steganography; they both hide a data inside a digital media. However, the difference
between them is their goal.
Watermarking hides a data related to the actual content of the digital signal where both data and
digital signal are important, while steganography has no relation between digital signal and data.
The audio signal used as a cover to hide the data i.e. the data is mainly important only. The
watermarking system consists of a watermark embedded and a watermark extraction.
The watermark embedded part hides the watermark image onto the audio file. The watermark
extraction part extracts the watermark image which has been embedded into the audio file during the
first stag .
Watermarking requires two main functions, embedding (hiding) the watermarks with the information
and extraction this information. The process of embedding watermark is done at the source end as
shown in Fig.1, while the process of extracting the watermark from the watermarked image by
reversing the embedding algorithm.
Features:
In this Spread Spectrum technique can be used for both spatial domain and frequency domain. The
spread spectrum method has the advantage that the watermark extraction is possible without using
the original unmarked image.
Technical feasibility:
Combination with the host signal is based on simple operations, in the pixel domain. The watermark
can be detected by correlating the expected pattern with the received signal.
Requirement:
* It should be easy for the owner or a proper authority to embed and detect the watermark.
* It should not be necessary to refer to the original signal when extracting a watermark.
Proposed method:
Algorithm:
Flow chart:
Block diagram:
Complete:
In this context Wavelet algorithms provide decent performance. This survey concentrates on
developing an audio watermarking technique to detect convergence and robustness, improving
watermark imperceptiveness.
Concise:
The significant progress of the technology gives the full access to the digital
data for retransmitting and reproduction with comfort. Since the benefits of such progress is easily
available, they equally immune to some illegal manipulation of data. So there is necessity arises for
the protection of digital data from unauthorized users.
The digital audio watermarking technique is new technology among different watermarking
techniques which provides successful solutions to problems occurred from some digital attacks.
Basically watermarking is the scheme in which binary information is embedded into the original signal.
The major concern of the audio watermarking scheme is to provide the proof of ownership to the
owner and to provide protection for embedded data. This paper provides concise analysis of different
existing audio water.
Complexity:
Correctness:
Since the robustness of a watermarked signal is dependent on the embedded amplitude of the
watermark, a trade-off between robustness and imperceptibility exists [4]. By embedding the
watermark with a high amplitude, the watermark might be very robust, but there might also be the
possibility for the listener of perceiving the embedded watermark as signal artifacts. Since the auditory
perception and evaluation of audio signal components is subjective and therefore dependent on every
individual listener [25], there might also be listeners perceiving watermarked signals as annoying.
Efficiency:
A) Program:
clear all;
file_name='lena.bmp';
cover_object=imread(file_name);
% read the message image you want to hide in the cover image
file_name='baboon.bmp';
message=imread(file_name);
%y = uint8(wgn(Mm,Nm,1));
% title the message object out to cover object size to generate watermark
for ii = 1:Mc
for jj = 1:Nc
watermark(ii,jj)=message(mod(ii,Mm)+1,mod(jj,Nm)+1);
end
end
watermarked_image(ii,jj)=bitset(watermarked_image(ii,jj),1,watermark(ii,jj));
end
end
clear all;
file_name='lsb_watermarked.bmp';
watermarked_image=imread(file_name);
b) shows the audio signal. In this audio signal the two images have to be hidden.
simulated output :
Explanation:
The two images watermarked into the audio signal using the Least
Significant Bit technique. In watermarking two processes are done namely Embedding and
Extraction. During the embedded process the two secret images are hidden into the host audio
signal. And the noise is also added to the host audio signal.
In the extraction process the host audio signal is converted into the decimal and the secret
images are retrieved. The advantage of LSB embedding is well reliant on its simplicity as many
techniques use such methods.
There are many weaknesses when robustness, tamper resistance and other security issues are
measured. LSB encoding is sensitive to any kind of filtering or manipulation of the image.
Scaling, rotation, cropping, addition of noise or lossy compression to the image is very likely
to destroy the message.
The major advantages of LSB algorithm are (1) it is rapid and easy to implement, (2) it works
very well with the gray-scale image. Therefore using the proposed algorithm the results has
been achieved.