You are on page 1of 24

Eslam Omar Mohamed

Faculty of Engineering, Alexandria university

Fourth-year student ,communication and


electronics department
eslamomarmoh@gmail.com
Tel : 011 11 95 98 39
Information Hiding

Steganography Cryptography Watermarking


After the theater, all clients keep a tab down at Wesley’s Nook.
A t t a c K at d a w N

Attack at dawn
Digital watermarking is a technology which
allows a secret message to be hidden in a
computer file.
Applications of Watermarking
 Rights management

 Contents management

 Access/copy control

 Authentication
Watermarking

Frequency
Spatial Domain
Domain
Watermarking
Watermarking

Discrete
Least SSM- Discrete Cosine
Wavelet
Significant Bit Modulation Transformation
Transformation
Imperceptibility Robustness Capacity Security
resist common -directly embedded
not affect bits that can be
signal processing in the signals
the quality embedded in
manipulations not in a header
of the original signal one second
such as : of the signal.
of the host signal
filtering -only be detected
Compression by authorized person
filtering
Cropping
Resampling
Embedding in Dual Channel – More Security

Left Channel

Audio Watermarked
Synchronization Code Selects the Channel
Sample Audio
Track

Right Channel
Circular Shifting of Original
Watermark

4 1 2 3

8 5 6 7
1 2 3 4
12 9 10 11
5 6 7 8
16 13 14 15
9 10 11 12
Circular Shifted Watermark- Type 1
13 14 15 16

13 14 15 16
Original Watermark
1 2 3 4

5 6 7 8

9 10 11 12

Circular Shifted Watermark- Type 2


Spatial domain
 Least Significant Bit
 Here watermark is embedded by shifting the DC level of the
audio signal.
 An input signal is divided into frames of fixed length.
 DC level of each frame =Mean of a frame-value in the frame
 After that a binary watermark sequence generated randomly
is introduced to the shifted signal. This is achieved by
introducing a DC offset level to each frame in the signal
according to the watermark bits.
 If the watermark bit is 0, the signal is shifted downward.
 If the watermark bit is 1, the signal is shifted upward.
level0=-DCBiasMultiplier x FramePower
level1=+DCBiasMultiplier x FramePower
where
level0 ->DC level introduced when a watermark bit is 0
level1 -> the DC level introduced when a watermark bit is 1.

 To extract a watermark, a watermarked signal is first divided


into frames. Then, the mean of each frame is calculated. If
the mean of a frame is positive, the corresponding
watermark bit is 1. Else, the watermark bit is 0.
 The original signal and watermark is not needed in the
extraction process. Therefore, DC level shifting is a blind
watermarking scheme
Audio Data

Block Block Block Block


1 2 3 … n

Discrete Cosine Transform Selecting Mid-Range of DCT Block

DCT
Data
DCT
Data
DCT
Data … DCT
Data

DCT’
Data
DCT’
Data
DCT’
Data … DCT’
Data
Mid Range

Inverse Discrete Cosine Transform

Watermark Embedded in Audio


Frequency Domain
 Watermarking signal to embed
X  x0 , x1 ,..., xN
 Host signal
V  v0 , v1 ,..., v N
 Frequency components(using DCT)
F  f 0 , f1 ,..., f N
 Embedding
fi  fi  xi f i = watermared singal
 Extraction
xi  fi  fi
Import audio :

Decode Encode

Embedded info :
PUBLISHER MODULE

Login Upload Enter Client


Panel Audio Details
Unique Watermark stored in
database for theft detection

Add Client
for Audio

Watermark generation for client (unique key)

Watermarked Audio is sent to client


DETECTION & TRACKING MODULE

Login Panel

KEY BASED

Upload
Watermark Extraction from audio
Audio

Fetching from
Database

Client Information Displayed

[ FOUND ]

You might also like