Você está na página 1de 7

SYNOPSIS

NAME: .............................................................. ROLL NO.NAME: .............................................................. ROLL NO.NAME: .............................................................. ROLL NO.NAME: .............................................................. ROLL NO.BRANCH: B.E. (E&TC)
BATCH: SEM-VIIth, 2015
SUBJECT:

Audio Watermarking in Images using Wavelet Families


INTRODUCTION:
During the past decade, with the development of information
digitalization and internet, digital media increasingly predominate over
traditional analog media. However, as one of the concomitant side-effects, it is
also becoming easier for some individual or group to copy and transmit digital
products without the permission of the owner. The digital watermark is then
introduced to solve this problem. Covering many subjects such as signal
processing, communication theory and Encryption, the research in digital
watermark is to provide copyright protection to digital products, and to prevent
and track illegal copying and transmission of them.
Watermarking is embedding information, which is able to show the
ownership or track copyright intrusion, into the digital image, video or audio. Its
purpose determines that the watermark should be indivisible and robust to
common processing and attack.
Currently the digital watermarking technologies can be divided into two
categories by the embedding position--spatial domain and transform domain
watermark. Spatial domain techniques developed earlier and is easier to
implement, but is limited in robustness, while transform domain techniques,
which embed watermark in the hosts transform domain, is more sophisticated
and robust. With the development of digital watermarking, spatial techniques,
due to their weakness in robustness, are generally abandoned, and frequency
algorithm based on DCT or DWT becomes the research focus. Another
tendency in watermarking is blind extraction, which means the host is not need
when extracting the watermark; otherwise it is hard to avoid the multiple claims
of ownerships.

SCIENTIFIC CONTENT:
BACKGROUND
With the widespread distribution of digital information over the World
Wide Web (WWW), the protection of intellectual property rights has become
increasingly important. This information includes still images, video, audio, or
text are stored and transmitted in digital format. Information stored in digital
format can be easily copied without loss of quality and efficiently distributed by
pirate (a person or organisation) to violate the copyright of real owner.
Watermarking of multimedia data has become a hotspot for research in
recent years. Watermarking can be used to identify the owners, license
information, or other information related to the digital object carrying the
watermark. Watermarks can provide the mechanism for determining if a
particular work has been tampered with or copied illegally.
Digital watermarking has gained reputation due to its significance in
content authentication and copyright protection for digital multimedia data. It
hides information in the data in such a way that the basic appearance of the data
is not destroyed [1]. Watermarking problem can be mathematically represented
as
XN= KN (SN) +M
Where, M is the watermark to be embedded in S N with the embedding strength
using KN secret key function that operates on the host message to deliver
watermarked message XN that is sent from the transmitter. YN is the
watermarked data received at the receiver end from which M is extracted.
In figure 1, M is the secret message (watermark) to be embedded in host
message SN with an embedding strength , X N is the watermarked message sent
at the transmitter end, Y N is the message received at the receiver end, and M is
the watermark extracted from the transmitted message. The host medium and

secret message may be any of the image, audio or video depending on the
requirement of the application [2].

ENCODER

XN

TRANSMISSION

YN

M'
DECODER

MEDIA

SN
KN,
Fig.1. Graphical illustration of watermarking communication problem
OBJECTIVE:
Wavelet based image watermarking is gaining more popularity because
of its resemblance with the human visual system. This paper elaborates
suitability of wavelet families transform for image watermarking, wavelet
transform based image watermarking process, and analysis of wavelet families
based watermarking techniques.
In this thesis, a novel algorithm for robust audio watermarking in image
using wavelet families transform based on image entropy is used. The
motivation of choosing image as a cover is driven by the fact that human visual
system is less sensitive than human auditory system thus an image provides
better masking effect. The algorithm is based on decomposition of images using
Haar wavelet basis, Daubechies wavelet, Biorthogonal wavelet, Reverse
biorthogonal wavelet and Discrete approximation of Meyer wavelet.
In the later part, analyze the watermarking results of different waveletbased watermarking techniques on different images and audio samples, using
various quality assessment metrics and compare the performance. The secret
data used is audio and the input image is color image. The study emphasizes on
devising an algorithm that allows minimum audible distortion to the audio by

embedding watermark in the wavelet coefficients (decomposition of image


using wavelet basis) that belong to high textured area. The technique should
achieve reliable recovery of hidden data even if the watermarked image is
subjected to certain attacks. The property of texture is used as a criterion to
identify the target area for embedding the watermark. The hidden data should be
recovered reliably under certain attacks such as cropping, compression, noise
effect, geometrical attacks and contrast enhancement.

PROPOSED METHOD:
DWT has been employed in order to preserve the high-frequency
components of the image. DWT separates the image into different
sub-band images, namely, LL, LH, HL, and HH. A high-frequency
sub-band contains the high frequency component of the image.
Hide the audio in approximation coefficient of the image by using the
mathematical calculation, and then apply IDWT for reconstruct the
low and high frequency to watermarked image.

ADVANTAGES OF PROPOSED METHOD:


More accurate
High robustness

BLOCK DIAGRAM :
EMBEDDING:

EXTRACTION:

BLOCKDIAGRAM DESCRIPTION:
Read cover image and apply pre processing technique like as
enhancement, filtering technique. Then apply Discrete Wavelet Transform
(DWT), for that cover image it will generate four band of output like as (LL,
LH, HL, HH). Take the approximation band (LL) of cover image for hiding
audio; now convert the approximation band from 2D to 1D. Check the length of
LL band, if the LL band length is less then secret audio length, you cant hide
the data in cover image. If the LL band length is greater than secret audio, you
can hide the data in cover image.
Then hide the secret audio in approximation band by using the
mathematical equation, then convert the embedded pixel from 1D to 2D, and
apply inverse wavelet transform and save the image. Same procedure follows in
extraction in inverse.

HARDWARE SPECIFICATIONS:- Not required

SOFTWARE SPECIFICATIONS: The software tool used is MATLAB7.6.

APPLICATION OF WATERMARKING:
IPR Protection
Demonstration of rightful ownership

Authentication

Labeling for data retrieval

Covert communication

SIGNIFICANCE;
Protection of IRP- Intellectual Property Rights
Content authentication and copy right protection
Information hiding
To identify owners, License information and other digital object
To determine whether digital multimedia data tempered with or copied
illegally

Você também pode gostar