You are on page 1of 11

1.

Proposed project Design:

a) Block diagram specification:

Functionality:

Digital watermarking is the act of embedding a message (i.e. an image, song, and video). Its concept
is similar to steganography; they both hide a data inside a digital media. However, the difference
between them is their goal.
Watermarking hides a data related to the actual content of the digital signal where both data and
digital signal are important, while steganography has no relation between digital signal and data.

The audio signal used as a cover to hide the data i.e. the data is mainly important only. The
watermarking system consists of a watermark embedded and a watermark extraction.

The watermark embedded part hides the watermark image onto the audio file. The watermark
extraction part extracts the watermark image which has been embedded into the audio file during the
first stag .

Watermarking requires two main functions, embedding (hiding) the watermarks with the information
and extraction this information. The process of embedding watermark is done at the source end as
shown in Fig.1, while the process of extracting the watermark from the watermarked image by
reversing the embedding algorithm.

Features:

Watermarking techniques can be classified as Text Watermarking, Image


Watermarking, Audio Watermarking, and Video Watermarking. In other manner, the watermarks can
be divided into three different types they are given as visible watermark, Invisible-Robust watermark
and Invisible-Fragile watermark. In this Frequency domain watermarking method the values of
selected frequencies can be altered, it is similar to the spatial domain watermarking.

Because high frequencies will be lost by compression or scaling,


the watermark signal is applied to lower frequencies, or better yet, applied adaptively to frequencies
containing important elements of the original picture.

In this Spread Spectrum technique can be used for both spatial domain and frequency domain. The
spread spectrum method has the advantage that the watermark extraction is possible without using
the original unmarked image.
Technical feasibility:

Techniques in spatial domain class generally share the


following characteristics. The watermark is applied in the pixel domain. No transforms are applied to
the host signal during watermark embedding.

Combination with the host signal is based on simple operations, in the pixel domain. The watermark
can be detected by correlating the expected pattern with the received signal.

Requirement:

Some of the requirements of the digital watermarking are:

* It should be easy for the owner or a proper authority to embed and detect the watermark.
* It should not be necessary to refer to the original signal when extracting a watermark.

Proposed method:

The most common method of watermark embedding is to


embed the watermark into the least significant-bits of the cover object. Although it can survive
transformations like cropping, any addition of undesirable noise or lossy compression but a more
sophisticated attack that could simply set the LSB bits of each pixel to one can fully defeat the
Watermark with negligible impact on the cover object.
Security of the watermark would be enhanced greatly as the Watermark could now be no longer is
easily viewable to the hackers or any other unintended user. Although this algorithm is still vulnerable
to replacing the LSB’s with a constant value.

Algorithm:

There are many algorithms available for audio watermarking. The


simplest algorithm is Least Significant Bit (LSB) Insertion, 4in which each 8-bit pixel’s least significant
bit is overwritten with a bit from the watermark. Given the extraordinarily high channel capacity of
using the entire cover for transmission in this method, a smaller object may be embedded multiple
times.
In an audio file, information can be inserted directly into every bit of audio information or the busy
areas of an audio file can be calculated so as to hide such messages in less perceptible parts of an
audio. The methods were based on the pixel value’s Least Significant Bit (LSB) modifications.
The following algorithm describes the enveloping process of message image into audio signal. Input:

Message Image Output: Watermarked Audio Signal.


Step 1: Read the audio file you want to use for embedding.
Step 2: Read the message image you want to hide in the audio signal.
Step 3: Conversion of message image into double.
Step 4: Rounding of values after operation (message/256).
Step 5: Conversion into uint8 values.
Step 6: Determine the size of audio signal used for embedding.
Step 7: Determine the size of message object to embed.
Step 8: Set the MSB or 8st bit of cover object (ii,jj) to the value of the MSB of watermark (ii,jj).
Step 9: Write to file the two images. Step 10: Display watermarked

Flow chart:
Block diagram:

Comparison with different design methods:

Complete:

Audio watermarking is new domain in the area of watermarking. It is much bulky


as compared to the image watermarking. This is because of the fact that the Human ears are way
more sensitive as compared to the Human eyes. The level of watermarking increases robustness of
the secret information. The audio watermarking is new and has large scope for research.

In this context Wavelet algorithms provide decent performance. This survey concentrates on
developing an audio watermarking technique to detect convergence and robustness, improving
watermark imperceptiveness.

Concise:

The significant progress of the technology gives the full access to the digital
data for retransmitting and reproduction with comfort. Since the benefits of such progress is easily
available, they equally immune to some illegal manipulation of data. So there is necessity arises for
the protection of digital data from unauthorized users.
The digital audio watermarking technique is new technology among different watermarking
techniques which provides successful solutions to problems occurred from some digital attacks.
Basically watermarking is the scheme in which binary information is embedded into the original signal.

The major concern of the audio watermarking scheme is to provide the proof of ownership to the
owner and to provide protection for embedded data. This paper provides concise analysis of different
existing audio water.

Complexity:

The highest challenge for all presented watermarking techniques is the


robustness against time-scale modifications, resulting in synchronization errors and therefore
decoding errors, which is why several counter-measures have been developed to date. A removal of
the watermark might also be possible in very robust watermarking algorithms, but it will result in
massive quality degradation.

Correctness:

Since the robustness of a watermarked signal is dependent on the embedded amplitude of the
watermark, a trade-off between robustness and imperceptibility exists [4]. By embedding the
watermark with a high amplitude, the watermark might be very robust, but there might also be the
possibility for the listener of perceiving the embedded watermark as signal artifacts. Since the auditory
perception and evaluation of audio signal components is subjective and therefore dependent on every
individual listener [25], there might also be listeners perceiving watermarked signals as annoying.

Efficiency:

Compared to the previously described time spread echo method by the


proposed dual channel time spread echo method showed overall higher robustness against signal
manipulation attacks. Nevertheless, both methods are less robust against pitch scaling.
Simulation result:

A) Program:

LSB watermarking code:

clear all;

% read in the cover object you want to use for embedding

file_name='lena.bmp';
cover_object=imread(file_name);

% read the message image you want to hide in the cover image
file_name='baboon.bmp';
message=imread(file_name);

% conversions needed to spread the image values on a 256 gray-scale


message=double(message);
message=round(message./256);
message=uint8(message);

% determine the size of cover image used for embedding


Mc=size(cover_object,1); %Height
Nc=size(cover_object,2); %Width

% determine the size of message object to embed


Mm=size(message,1); %Height
Nm=size(message,2); %Width

%y = uint8(wgn(Mm,Nm,1));

% title the message object out to cover object size to generate watermark
for ii = 1:Mc
for jj = 1:Nc
watermark(ii,jj)=message(mod(ii,Mm)+1,mod(jj,Nm)+1);
end
end

% set the LSB of cover_object(ii,jj) to the value of the MSB of watermark(ii,jj)


watermarked_image=cover_object;
for ii = 1:Mc
for jj = 1:Nc

watermarked_image(ii,jj)=bitset(watermarked_image(ii,jj),1,watermark(ii,jj));
end
end

% add noise to watermarked image


noisy = imnoise(watermarked_image,'gaussian');

% write to file the two images


imwrite(watermarked_image,'lsb_watermarked.bmp','bmpite(noisy,'lsb_watermarked_nois
e.bmp','bmpisplay watermarked image
figure(1)
imshow(watermarked_image,[])
title('Watermarked Image')

% display watermarked and noised image


figure(2)
imshow(noisy,[])
title('Watermarked and noised Image')

Recover the watermark:

clear all;

% read in watermarked image

file_name='lsb_watermarked.bmp';
watermarked_image=imread(file_name);

% determine size of watermarked image


Mw=size(watermarked_image,1); %Height
Nw=size(watermarked_image,2); %Width

% use lsb of watermarked image to recover watermark


for ii = 1:Mw
for jj = 1:Nw
watermark(ii,jj)=bitget(watermarked_image(ii,jj),1);
end
end

% scale the recovered watermark


watermark=256*double(watermark);

% scale and display recovered watermark


figure(1)
imshow(watermark,[])
title('Recovered Watermark'

b) shows the audio signal. In this audio signal the two images have to be hidden.
simulated output :

Explanation:

The two images watermarked into the audio signal using the Least
Significant Bit technique. In watermarking two processes are done namely Embedding and
Extraction. During the embedded process the two secret images are hidden into the host audio
signal. And the noise is also added to the host audio signal.

In the extraction process the host audio signal is converted into the decimal and the secret
images are retrieved. The advantage of LSB embedding is well reliant on its simplicity as many
techniques use such methods.
There are many weaknesses when robustness, tamper resistance and other security issues are
measured. LSB encoding is sensitive to any kind of filtering or manipulation of the image.
Scaling, rotation, cropping, addition of noise or lossy compression to the image is very likely
to destroy the message.

The major advantages of LSB algorithm are (1) it is rapid and easy to implement, (2) it works
very well with the gray-scale image. Therefore using the proposed algorithm the results has
been achieved.

You might also like