Sie sind auf Seite 1von 8

Audio Watermarking Techniques

Megha Jain Fourth Year B.E.Student Dept. of Electronics &Communication Engineering Bahubali College Of Engineering Gommatanagar, Shravanbelgola-573135 Email-moksha_megha@yahoo.com Niveditha.S Fourth Year B.E.Student Dept. of Electronics &Communication Engineering Bahubali College Of Engineering Gommatanagar, Shravanbelgola-573135 Email-shrusti_njy@yahoo.co.in

Abstract

Quantization

technique,

Psycho-acoustic

Audio watermarking techniques are used to model, Echo hiding technique, spread embed extra information into host audio spectrum technique. Research in digital techniques watermarking technology has progressed in developed so far for audio watermarking two paths. The research on watermark attack compared to the digital watermarking for made it significant to develop the new images and video.Audio watermarking methods of digital watermarking which are signals.there are very few techniques generally used to embed the resilient to attacks. This paper also highlights copyright and copy control information tin to on some of the interesting research area into this, audio watermarking. watermarking techniques can also used be for KEYWORDS: Audio watermarking, Audio the audio signals.Apart from various other applications such as data signal watermark, pseudorandom sequence, authentication and broadband monitoring.In sequence generator. one more interesting application of audio 1.INTRODUCTION: watermarking ,the watermark is used for This paper surveys the current Digital Watermarking is a field that has stationarizing the characteristic of host audio. made tremendous advances in last ten years. audio It has become a hot research area because of watermarking along with techniques. there are Implementation the increasing media of digital media advantages discussed in and and video watermarking, the use of

scheme of audio watermarking schemes distribution through the internet. sin image disadvantages brief. perceptual models is an important component

Different audio watermarking techniques, in generating an effective and acceptable which are discussed here, are LSB coding, watermarking scheme for audio. Many of the

requirements for audio watermarking are the watermarked signal s the knowledge of similar to image watermarking such as the secret key is necessary. The security of a imperceptibility (inaudibility) robustness to system resides in the key of a system. The signal alterations such as compression, watermark detection technique in which the filtering and A/D and D/A conversions. knowledge of the key 'k' and the signal 'x' is Audio watermarking schemes rely on the used to detect the watermark is known as imperfections of the HAS is insensitive to non-blind watermarking scheme, where as small amplitude changes either in time the domain or frequency domain. Fig.1 gives an overview of the general the watermark watermark and detection in blind. scheme the knowledge of the key 'k' is enough to extract Non-blind

model of the audio watermarking. The watermarking schemes require double storage watermarking technique includes two process capacity watermark embedding procedure, double communication a bandwidth for watermark detection and are

watermark 'w' is embedded into the host useful in copyright verification. On the other audio signal, 'x' to produce the watermarked hand blind watermarking requires only half signal 's'.The embedding process is storage capacity with and half bandwidth dependent on the key k and must satisfy the compared perceptual transparency requirement. The scheme. subjective quality difference between 'x' and difference threshold.
w k Comp ress

non-blind

watermarking

Research in digital watermarking has watermarking developed,


s

's' must be below the just noticeable progressed along two paths. While new technologies researchers are are being also some

Uncomp ress

Embed Scheme

investing different ways of attacking digital watermarking which are resilient The remaining sections of the paper

a) Watermark embedding x k w

to attacks. are organized as follows. Section1 of the paper deals with general concept of audio watermarking in brief. Section2 highlights on some of the well known audio watermarking techniques. Section 3 highlights on some of applications. Finally the section4

Extraction scheme b)Non-blind watermark extraction k Extraction s w scheme c) Blind watermark extraction Fig.1 Model of audio watermarking

To reconstruct the watermark 'w' from the

concludes the paper and identifies some of low robustness is the big disadvantage of this the audio research problems. method, since the random changes of the Labs destroy the coded watermark. Another observation of this technique is that the embedded watermark will not survive D/A and A/D conversion. Because of less complexity of the algorithm this technique is useful in real time applications .This technique is a base for steganographic application.

2.AUDIO

WATERMARKING

TECHNIQUES:
Watermarking algorithms were primarily developed for digital images and video sequences, Interest and research in audio watermarking started later. Comparatively very few techniques are developed for audio watermarking. The overview of different

audio watermarking algorithms is given in 2.2.QUANTIZATION METHOD: this section. A scalar quantization scheme 2.1. LSB CODING: quantizes a sample value x based on the The earliest methods of information quantized sample values is represented as hiding and watermarking uses than LSB follows: coding. A natural approach of the audio sequences is to embed watermark data by alteration of the
q (x,D) -D/4

digital

audio

otherwise

having

y =

q (x,D)+D/4 (2)

if b=1

amplitude resolution of 16 bits persample.it usually does not use all available audio samples of 'x' chosen by secret key 'k'.The substitution operation is
Si=Xi+Wi. (1)

where q(.) is a quantization function and D is a quantization step. A unitization function q(x) is given as follows: q (x) = |_ x/D_|.D
(3)

where |_x_| rounds to the nearest integer of x .Detection is the process of embedding. The

The

extraction

process

simply detection process is summarized as follows:


y = 1 if 0<s-q(x, D)<D/4 0 if D/4<s-q(x, D)<0 (4)

retrieves the watermark by reading the value of these bits. Therefore, the decoder needs all the samples of the watermarked audio that This were used during the embedding process.

scheme is simple to implement and is robust

The main advantage of this method is against noise attack if the noise margin is very high watermarking capacity. Extremely below D/4.In other words if noise margin is

above D/4 then detector misinterprets the sound that does masking is called masker and watermarking bit. The robustness can be the sound that is masked is called the masker. enhanced if dither modulation [3] is used. The psycho-acoustic model analyzes the I/p Extension of this construction so that signal x in order to calculate the minimum geometric attacks can be handled with threshold T. The audible watermarking signal acceptable loss in detection performance with can be transformed into in audible signal by reasonable and computational cost is a applying watermark shaping based on the current research area. 2.3.PSYCHO-ACOUSTIC MODEL: The added pseudorandom sequence or noise to audio signal can cause unpleasant audible sound whatever watermarking scheme is used. The reducing the strength of of watermark sequence in equation (2) cannot be the final solution. Because human ears are very sensitive especially when the sound energy is very low, even a very little noise with small value of makes the scheme not robust. Psycho-acoustic models for audio compression exploit frequency and temporal masking effects to ensure inaudibility by shaping the quantized noise according to masking threshold. Psycho-acoustic model depicts the human auditory system as frequency analyzer with a set of 25 band pass filters. The required intensity of a single sound expressed in unit of decibel to be heard in the absence of another sound affects the characteristics of the neighboring sound. This phenomenon is known as masking. The psycho-acoustic model. The frequency masking procedure is given as follows. 1) Calculate the power spectrum. 2) Locate the tonal (sinusoidal like) and non tonal (noise-like) component. 3) Decimate the maskers to eliminate all irrelevant maskers. 4) Compute the individual masking thresholds. 5) Determine the minimum-masking threshold in each sub band. This minimum-masking threshold defines the frequency response of the shaping filter, which shapes the watermark. The filtered watermark signal is scaled in order to embed the watermark noise below the masking threshold T. The noise is inaudible as far as noise power is below the masking threshold. Watermark shaping is the time consuming task when we work in real-time because watermark-shaping filter coefficients are computed based on the psycho-acoustic model. since this filter exploits the minimum noise level, it is not optimal in terms of watermark strength . This results in a strong

reduction

of

robustness.

Instead

of

maximizing the masking threshold we can increase the length of the pseudo-random sequence for robustness. However this method reduces the embedding message capacity.

2.4. ECHO HIDING: Echo hiding techniques embeds data into original audio signal by introducing an echo in the time domain such that s(n) = x(n)+ x(n-d).

d1

d2

Fig.2. Echo hiding technique

The extraction of the embedded information is to detect the spacing between

The nature of the echo is to add resonance to the echoes. The magnitude of the autothe host audio. After the echo has been correlation of the encoded signals cepstrum added, watermarked signal retains the same can offset between the original and be examined at two locations, statistical and perceptual characteristics. The corresponding to the delays of the one and a zero. If autocepstrum is greater at d1 than watermarked signal is small enough that the at d2 an embedded bit is decoded as one. echo is perceived by the HAS as an added Disadvantage of echo hiding is its high resonance. Binary message are embedded by complexity due to autocepstrum computation echoing the original signal with one of two during detection. On the other hand any body delays either a d1 sample delay or a d2 can detect the echo without any prior sample delay(see fig.2.). knowledge. In other words it provides clues for the malicious attacks. Double echo scheme can enhance detection rate due to higher peak or enhance imperceptibility by reducing . 2.5. SPREAD SPECTRUM TECHNOLOGY:

Spread spectrum scheme is the most and r(n). Based on the hypothesis test using popular scheme. This method is easy to correlation value c and the predefined implement, but has serious disadvantage: it threshold T, the detector output w=1 if c>T requires shaping This time-consuming to reduce psycho-acoustic and m=0 if c<=t. Typical value of T is 0. The noise, and detection threshold has a direct effect both on false in positive which a and false negative incorrectly audible

susceptible to time scale modification attack. the scheme spreads sequence across the audio signal. The wide error

pseudo-random probabilities. False positive means a type of detector

band noise can be spread into either time- determines that a watermark is present in a domain signal or transformed domain signal watermarked audio. On the other hand, false no matter what transform is used. Frequently negative is a type of error in which a detector used transforms include DCT,DFT and fails to detect a watermark in a watermarked DWT. The binary watermark message audio. Some of the researchers also publish v={0,1} or its equivalent bipolar variable their works on watermark attack. The b={-1,+1} is modulated by a pseudorandom development of a strong technique which is sequence r(n) generated by means of a secret resilient to various attacks is required. key. Then the modulated watermark

2.6. WATERMARKING TECHNIQUES DEVELOPED required energy of the audio signal x(n0.the RECENTLY:
w(n)=br(n) is scaled according to the scaling factor controls the trade-off between robustness and inaudibility of the watermark. The modulated signal is then added to the original audio to produce the watermark. The modulated signal is then added to the original audio to produce the watermarked audio s(n) = x(n)+w(n). The detection scheme uses linear correlation. Because the pseudo-random sequence r(n) is known and can be generated by means of secret key, watermarks are detected by using correlation between s(n) An asymmetric watermarking method is developed by Furon et al to provide a better security compared to DSSS and Costa schemes. The asymmetric detectors need more complexity and more money and they accumulate a bigger amount of content in order to take a reliable decision. The invention of asymmetric schemes with better performance can also be a best area for the researchers. An audio watermarking is usually used as a multimedia copyright protection tool or as a system that embeds Meta data in audio

signals. Sonia et al developed a technique in

The well-known audio watermarking

which water marking is viewed as a techniques such as LSB coding, Quantization preprocessing a step for further audio technique, Psycho-acoustics model, Echo processing. The embedded watermarking is hiding technique, SS techniques are added to stationeries the host audio signal. discussed with their disadvantages. Finally The technique is a new development in a this paper concludes with suggesting some watermarking and can be viewed as a way to the areas in which interested audio watermark modify a signal statistics to enhance their researchers have to concentrate. There is a performances. need to explore novel mechanisms for effective encoding and and decoding of watermark using DSSS to improve detection In this convergence watermark possibility robustness, improve Preventive covert imperceptiveness. of establishing

3. APPLICATIONS:
1. Ownership a protection: watermark

application

containing

ownership information is embedded to the multimedia host signal which enable the owner to demonstrate his ownership in case of dispute. 2. Authentication & tampering detection: In this application a set of secondary data is embedded in the host multimedia signal and is later used to determine whether host signal was tampered. 3. Broadcast monitoring: In this case we put a unique watermark in each video or sound clip prior to broadcast. 4. Fingerprinting: This allows a content owner or a content distributor to identify the source of an illegal copy of multimedia file.

attacks such as resynchronization attack and communication over a public audio channel. The invention of asymmetric schemes with better performance can also be a better area for the researchers to provide a better security compared to DSSS. Suggesting a new malicious attacks and counter attack for available watermark techniques is also a good field. Improvement to in watermarking statistical technique investigated. signal to stationarizing The noise audio ratio.

characteristics of host audio can also be watermarking The algorithms techniques in wavelet domain provide well developed so far in wavelet domain are not much robust against low pass filtering, resembling A\D and D\A conversion, cropping and equalization and requantization

4. CONCLUSION:

attacks. So there is a need to develop a modified algorithm in wavelet domain, which is robust against all kinds of signal manipulation attacks.

5. REFERENCES:
[1] Teddy Furon and Pierre Duhamel, An asymmetric watermarking method, IEEE Transactions on signal Processing, Vol 51, No.4, April 2003, pp 981-995. [2] L.Boney,A.Twefik and H.Hamdy,Digital watermarking for audio signals,IEEE Proc.Multimedia 1996,pp.473-480.

Das könnte Ihnen auch gefallen