Escolar Documentos
Profissional Documentos
Cultura Documentos
Introduction
O Easy availability of digital media and
information on internet has created a problem of copyright infringements. O One way to counter this problem lies in the information hiding process. O Information hiding is of two types: I. Steganography. II. Watermarking.
Steganography
Steganography
O It is a process of hiding information. O
The sender embeds a secret message into digital media (e.g. image) where only the receiver can extract this message. O The warden of communication channel will notice the transmitted media, but he/she will never perceive the buried secret message inside this media.
Embedder
Stego-object generation and is then discarded. O We use a key in embedding information Detection k. O On receiver side the buried message is extracted from Stego-object in detection process. Embedding message should be perceptually and statistically undetectable for the warden.
Watermarking
O It is a technique for ensuring data integrity
which combines the aspects of data hashing and digital water marking. O The purpose of a watermark is to identify the work and discourage its unauthorized use. O It is a technology of embedded overlay on a digital photo consisting of text, a logo, or a copyright notice.
Digital Watermarking
O A digital watermark is a digital signal or
pattern inserted into a digital document such as text, graphics or multimedia O Digital watermarking is the process of embedding information into a digital signal which may be used to verify its authenticity or the identity of its owners. O Mainly, Visible DW and Invisible DW.
First two form part of encoding and the last one does decoding
Watermark Encoding
Watermark design section; O generation of auxiliary data string. O Watermark generation technique-
depends on input audio, human auditory system(HAS) and data scrambling/spread spectrum technique. O Ultimate objective- to design a watermark i.e. perpetually inaudible and robust.
.
Watermark embedding algorithm O Hides the design watermark sequence(w), in the
audio bit stream(x). xw = (x,w) O Performed in frequency domain- exploit the frequency- and temporal masking properties of the human ear.
.
Three key features of human auditory systems used in audio watermarking O Louder sounds typically tend to mask out the quieter sounds. O Human ear perceives only relative phase associated with the sounds. O HAS fails to recognize minor reverberation and echoes.
Case I - when input audio is employed for decoding w = (xw, x) Case 2 - when input audio is not available for watermark detection. This results in blind water mark detection w = (xw)
Properties of DWM
Embedding Effectiveness: O The users are not able to detect the
embedded watermark by performing Statistical Signal Processing operation(e.g. correlation, autoregressive estimation, etc.) O Consider a set of audio signals, x, y, . . . , z O andawatermarksignal,w.Letthewatermarkedsi gnalsbedenotedasxw, yw, . . . , zw. O Watermarked signals must be statistically undetectable.
DAW Schemes-Attributes
Imperceptibility or Perceptual
Perceptually significant- must be kept inaudible. Perceptually insignificant- vulnerable to compression algorithms.
imperceptibility O Optimal energy of for efficient detection , high energy better detection and robust but increase could lead to audible artifacts.
O Statictical Transparency
Users should not able to detect the embedded watermark by performing some statistical signal processing operation (e.g., correlation, autoregressive estimation, etc.).
Manipulations Water marks are distributed into audio bit stream. They need to be robust to signal processing . Common signal processing : Linear and Nonlinear filtering, resampling , quantization, A-D and D-A conversion etc. Robustness can be increased by increasing number of nits
Limitations
Robustness Data Hiding
The robustness of the scheme can be increased somewhat with Longer audio files, by inserting the watermark signal multiple times, which will aid in extraction, and also in error correction if the signal is manipulated. To attain higher hidden data density , more advanced techniques must be used. A combination of schemes should be used allowing the software to capitalise on the strengths of each technique when processing the unmarked audio.
Conclusion
1. Watermarking system should be able to embed any set of data in to audio signal, and the detector should be able to retrieve the embedded data (i.e. not just report that watermark is presented or not) 2. Watermark embedded (detection) module should be independent of mode of operating. (e.g. the same watermark is embedded into multiple frames of audio signal or different watermark is embedded into each frame).
3. Watermarking key generation should be independent of watermark embedding and detection (e.g. embedding and detection will not be effected whether original signal is involved in key generation or not).
References
O www.google.com O www.ieee.org O Audio Signal Processing Andreas