You are on page 1of 24

Digital Audio Watermarking

By: SABA SAURABH SYED TAUHEED

Introduction
O Easy availability of digital media and

information on internet has created a problem of copyright infringements. O One way to counter this problem lies in the information hiding process. O Information hiding is of two types: I. Steganography. II. Watermarking.

Steganography

Steganography
O It is a process of hiding information. O

The sender embeds a secret message into digital media (e.g. image) where only the receiver can extract this message. O The warden of communication channel will notice the transmitted media, but he/she will never perceive the buried secret message inside this media.
Embedder

O The Cover-Object is only used for the

Stego-object generation and is then discarded. O We use a key in embedding information Detection k. O On receiver side the buried message is extracted from Stego-object in detection process. Embedding message should be perceptually and statistically undetectable for the warden.

Watermarking
O It is a technique for ensuring data integrity

which combines the aspects of data hashing and digital water marking. O The purpose of a watermark is to identify the work and discourage its unauthorized use. O It is a technology of embedded overlay on a digital photo consisting of text, a logo, or a copyright notice.

Digital Watermarking
O A digital watermark is a digital signal or

pattern inserted into a digital document such as text, graphics or multimedia O Digital watermarking is the process of embedding information into a digital signal which may be used to verify its authenticity or the identity of its owners. O Mainly, Visible DW and Invisible DW.

Digital Audio Watermark System


Audio watermark system consists of three modules: O Watermark Design. O Watermark embedding algorithm . O Watermark retrieval.

First two form part of encoding and the last one does decoding

Watermark Encoding
Watermark design section; O generation of auxiliary data string. O Watermark generation technique-

depends on input audio, human auditory system(HAS) and data scrambling/spread spectrum technique. O Ultimate objective- to design a watermark i.e. perpetually inaudible and robust.

.
Watermark embedding algorithm O Hides the design watermark sequence(w), in the

audio bit stream(x). xw = (x,w) O Performed in frequency domain- exploit the frequency- and temporal masking properties of the human ear.

.
Three key features of human auditory systems used in audio watermarking O Louder sounds typically tend to mask out the quieter sounds. O Human ear perceives only relative phase associated with the sounds. O HAS fails to recognize minor reverberation and echoes.

Watermark encoding procedure (watermark design & embedding)

Watermark Decoding Watermark Retrieval


O Two common scenarios

Case I - when input audio is employed for decoding w = (xw, x) Case 2 - when input audio is not available for watermark detection. This results in blind water mark detection w = (xw)

Watermark Decoding (Watermark Retrieval)

Properties of DWM
Embedding Effectiveness: O The users are not able to detect the

embedded watermark by performing Statistical Signal Processing operation(e.g. correlation, autoregressive estimation, etc.) O Consider a set of audio signals, x, y, . . . , z O andawatermarksignal,w.Letthewatermarkedsi gnalsbedenotedasxw, yw, . . . , zw. O Watermarked signals must be statistically undetectable.

DAW Schemes-Attributes
Imperceptibility or Perceptual

Transparency O Inserted in perceptually significant or insignificant regions ~ application


I. II.

Perceptually significant- must be kept inaudible. Perceptually insignificant- vulnerable to compression algorithms.

O Trade off between robustness and

imperceptibility O Optimal energy of for efficient detection , high energy better detection and robust but increase could lead to audible artifacts.

O Statictical Transparency

Users should not able to detect the embedded watermark by performing some statistical signal processing operation (e.g., correlation, autoregressive estimation, etc.).

Robustness to Signal Processing O O O

Manipulations Water marks are distributed into audio bit stream. They need to be robust to signal processing . Common signal processing : Linear and Nonlinear filtering, resampling , quantization, A-D and D-A conversion etc. Robustness can be increased by increasing number of nits

Applications & advantages


O Copyright protection O Fingerprinting O Content Authentication O Copy Protection O Broadcast Monitoring

Limitations
Robustness Data Hiding
The robustness of the scheme can be increased somewhat with Longer audio files, by inserting the watermark signal multiple times, which will aid in extraction, and also in error correction if the signal is manipulated. To attain higher hidden data density , more advanced techniques must be used. A combination of schemes should be used allowing the software to capitalise on the strengths of each technique when processing the unmarked audio.

Conclusion
1. Watermarking system should be able to embed any set of data in to audio signal, and the detector should be able to retrieve the embedded data (i.e. not just report that watermark is presented or not) 2. Watermark embedded (detection) module should be independent of mode of operating. (e.g. the same watermark is embedded into multiple frames of audio signal or different watermark is embedded into each frame).

3. Watermarking key generation should be independent of watermark embedding and detection (e.g. embedding and detection will not be effected whether original signal is involved in key generation or not).

References
O www.google.com O www.ieee.org O Audio Signal Processing Andreas

Spanias, Ted Painter,Venkatraman Atti.


O

You might also like