You are on page 1of 19

Audio Watermarking

INTRODUCTION
 Digital Data can be shared by multiple users, distributed
over network, and managed for long period time without
any damage.
 In contrast to these, the copyright protection problem
arises, since unauthorized copying and distribution of
digital data are simplified, too.
 As a result, a technique called digital watermarking is
introduced to protect the ownership of these contents.
AUDIO WATERMARKING

Whatwecandefine

Digital Audio Watermarking is a technology to hide


information in an audio file without the information being
audible to the listener, and without affecting in any way the
audio quality of the original file.

AIMS AT
•Copy control of digital music
•Ownership identification
•Enforcement of usage policy
•Fingerprinting
AUDIO WATERMARKING
CHARACTERISTICS
 Transparency: watermark is not detectable

 Robustness: survives digital processing (e.g.,


compression) and malicious analytical attacks.

 Efficiency: low cost implementation using minimal


resources

 Independence: of both the type and format of multimedia


data (e.g., music, speech, video, sample rates, coding
scheme, ...)
CLASSIFICATION OF AUDIO WATERMARKING

Temporal watermarking
Temporal watermarking hides watermarks directly into
digital audio signals in the time domain.
Spectral water-marking
The spectral audio watermarking applies certain
frequency transform, such as FFT, DCT, and DWT, etc, to
the data block of the audio signal, and hides the watermark
information Into the transformed data block.
AUDIO WATERMARKING SCHEMES

 DC level shifting

 QMF bank band division

 Frequency masking

 Spread spectrum
DC LEVEL SHIFTING
 Here watermark is embedded by shifting the DC level of the
audio signal.
 An input signal is divided into frames of fixed length.
 DC level of each frame =Mean of a frame-value in the
frame
 After that a binary watermark sequence generated randomly
is introduced to the shifted signal. This is achieved by
introducing a DC offset level to each frame in the signal
according to the watermark bits.
 If the watermark bit is 0, the signal is shifted downward.
 If the watermark bit is 1, the signal is shifted upward.
Cont..
DC LEVEL SHIFTING
level0=-DCBiasMultiplier x FramePower
level1=+DCBiasMultiplier x FramePower
where
level0 ->DC level introduced when a watermark bit is 0
level1 -> the DC level introduced when a watermark bit is 1.

 To extract a watermark, a watermarked signal is first


divided into frames. Then, the mean of each frame is
calculated. If the mean of a frame is positive, the
corresponding watermark bit is 1. Else, the watermark bit is
0.
 The original signal and watermark is not needed in the
extraction process. Therefore, DC level shifting is a blind
watermarking scheme
BandDivisionBasedonQuadratureMirrorFilter(QMF)Bank

Cont..
Cont..
WATERMARKED SIGNAL EXTRACTION USING QMF
 Watermarked signal is filtered by the analysis filter bank and
the low frequency watermarked band is extracted out.
 The modified MDCT coefficients are calculated out and
watermark can be determined by rounding the coefficients and
observe whether coefficients are even or odd.
Watermark is 1 when coefficients are odd.
Watermark is 0 when coefficients are even.

This technique has a


 High signal to noise ratio
 The rate of detection or bit error rate is very high
FREQUENCY MASKING
 Watermarkinginvolves hidingafaint but audiblesoundunder another

louder sound(original sound), sothe faint soundbecomes inaudible

anditactsasawatermarkfortheoriginal sound.

 Watermark is generated firstly by creating a pseudo-noise sequence

(PNsequence)fromashift register. Theshift registerconsistsof m flip-

flopswithamaximumperiodof(2 m)–1.

 PNsequence is filtered along with the filter that approximates the

frequency characteristics of the human auditory system (HAS).

Consequently, it is put through to the time domain for temporal


Cont..
masking.
 The frequency masking algorithm is robust to coding, multiple
watermarking, and resampling.
 Different watermark can be embedded by this algorithm into
the same signal and is easy to detect by the owner.
 The detection scheme for this algorithm needs the original
input signal, which is not flexible
 From the extraction scheme, frequency masking is a private
watermarking.
SPREAD SPECTRUM

Where
wi is element of watermark
y is the watermarked signal
A correlation detector is carried out to detect the presence of the
watermark and is described by Eqn

where N is vector cardinality


Cont..
SPREAD SPECTRUM
While x can be modelled as Gaussian random vector, the
normalised correlation test is described as Eqn

C 1
Q= = p+ N ( 0, σNx/ )
N∆^2 ∆

If p = 1, watermark is present
If p=0, watermark is not present
DC level shifting algorithm
ANALYSIS OF VARIOUS TECHNIQUES
Therobustnesslevel for theDClevel shiftingispoor, the watermark

can be easily removed by altering the DClevels of the signal and the watermark is

destroyed.

FrequencyMasking
This methodis not robust tofilteringbecausewatermarkis embedded

toall frequencybands.

AttackbyhighpassfilterMPEGcanerasethewatermark.

SpreadSpectrum&BandDivisionBasedOnQMF
Boththebanddivisionmethodandthespreadspectrummethodare

capable of defendingagainst the MP3compression, but the spread Cospnectru


t.. m
hasabetterdetectionratethanthebanddivisionmethod.
The implementation steps for spread spectrumare more complicated. This

makesithardtohackandbreakdownthealgorithm.

BandDivisionBasedOnQMF

Band division technology performs extraction scheme with no original

signal require attacksarestill not upgradedtohackdown thisaudiowatermarking

technology.
CONCLUSION
 Watermark can be embedded in an audio signal without
being recognized by hearing and the perceptibility
requirement is fulfilled .
 Extraction can be done without the presence of the original
signal and the watermark itself, so can be classified as blind
or public watermarking.

Thank You !!!


QUESTIONS??

You might also like