Beruflich Dokumente
Kultur Dokumente
A/D
ANALOG TO DIGITAL
AAC
AWGN
BEP
BER
BPS
CD
Compact Disc
CSI
D/A
Digital to Analog
DC
Direct Current
DCT
DFT
DS
Direct Sequence
DSP
DVD
DWT
FFT
FH
Frequency Hopping
FIR
GTC
HAS
HVS
ID
Identity
IID
ISS
ISO
IWT
JND
LSB
MER
Minimum-Error Replacement
MPEG
mp3
MSE
Mean-Squared Error
NMR
PDA
PN
Pseudo Noise
PRN
PSNR
PSC
QIM
SDMI
SMR
SNR
SPL
SS
Spread Spectrum
SYNC
Synchronization
TCP
UDP
VHS
WMSE
WEP
WER
CHAPTER 1
INTRODUCTION
however, the malicious user has started to extract the watermark creating challenges for the
developers. Thus, developers have found another digital embedding source as audio and termed
such watermarking as Audio Watermarking. It is very difficult to make digital informationsecure
especially in the case of audio and audio watermarking has become a challenge to developers
because of the impact it has created in preventing copyrights of the music [12]. Note that it is
necessary to maintain the copyright of the digital media, which is one of the compulsory
requirement. Digital watermarking is a technique by which copyright information is embedded
into the host signal in a way that the embedded information is not recognized, and robust against
intentional and unintentional attacks [14].
1.2 STEGANOGRAPHY AND WATERMARKING
1.2.1 STEGANOGRAPHY
and
graphy = writing) [3]. Here the authorized party is only aware of the existence of the hidden
message. An ideal steganographic technique conceals large amount of information ensuring that
the modified object is not visually or audibly distinguishable from the original object.
The steganography technique needs a cover object and message that is to be
transmitted from medium. It also requires a stego (owner) keyto recover the embedded message.
Users having the stego(owner) key can be only access for the secret message. Another important
requirement for an efficient steganographic technique is the cover object is modified in a way
such that the quality is not degraded after embedding the message.
1.2.2 WATERMARKING
Although steganography and watermarking both techniques are used for coverting,
communication,
steganography
typically
relates
only
to
covert
point
to
point
communication between two parties [1]. Steganographic methods are not always robust against
malicious attacks or modification of data that might occur during transmission, storage or format
7
conversion [5]. Watermarking is one type of steganographic techniques whose primary objective
is to provide the security of the object rather than the invisibility of the hidden object. The major
difference
between
the
two
techniques
is
the
superior
robustness
capability
of
watermarking schemes [15]. To summarize this, an ideal steganographic system can embed a
large amount of information with no visible degradation to the cover object, but an ideal
watermarking system would embed an amount of information that cannot be altered or removed
without making the cover object entirely unusable. A watermarking system involves tradeoff
between capacity and security [16].
1.2.4 IMAGE AND AUDIO WATERMARKING
Watermarking technique has evolved considerably from its origin [21]. Due to
evolution of technology the medium of transmission has been changed. Watermarking is
preferred in digital media like image & audio. The watermarking technique in which the cover
objects as discussed in Section 1.2.2, is image then the process is termed as Image Watermarking.
Audio watermarking is quite challenging than image watermarking due to the dynamic
supremacy of human auditory system (HAS) over human visual system (HVS) [12].
The evaluation of image quality is very important in todays video broadcasting,
transmission control, and e-commerce, because quality is a key determinant of customer
satisfaction and a key indicator of transmission conditions. Meanwhile, quality is very useful in
the evaluation of the effectiveness or performance of image processing algorithms or systems.
Based on the dependence on a reference image, the image quality metrics can be divided into
three categories: the Full-Referencequality metrics, Reduced-Referencequality metrics& NoReference quality metrics. The Full-Reference quality metrics evaluate image quality by
comparing the differences between the distorted image and the original image [5],[7]. The widely
used quality metrics in this category are the PSNR, w-PSNR, Watson JND, SSIM, etc. The FullReference quality metrics provide more accurate quality evaluation results comparing to the
Reduced or No-Reference quality metrics. However, the Full-Reference quality metrics become
less practical when the original image is not available. The Reduced-Reference quality metrics
evaluate the quality of a distorted image using partial information of the original image. In
literature, such partial information can be some features extracted from the original image [8]
[10]. The Reduced-Reference quality metrics do not require the presence of the original image
for quality evaluation. However, the partial information of the original image need to be
transmitted to the receiver side either through an ancillary channel or by embedding into the
transmitted image. The sacrifice of bandwidth for transmitting the additional information needs
to be considered. The No-Reference quality metrics estimate image quality without accessing the
original image [11][16]. In practical applications, different quality metrics can measure the
image degradation from different angle. For example, PSNR measures image quality
mathematically in terms of MSE; JND and SSIM intend to measure image quality with more
emphasis on the perceptual experience. Multiple metrics are often used in practical applications
to give a full coverage of the image quality evaluation. In terms of applicability in signal
transmission, Reduced- or No-Reference metrics are more preferable over the Full-Reference
metrics. To this end, a Reduced- or No-Reference quality evaluation scheme which can evaluate
image quality in terms of different existing metrics would be really useful.
The watermarking technique is one of the most promising methods to develop
Reduced or No-Reference quality metrics. In this case, usually a semi-fragile watermark is
embedded in the original (or cover) image. Both the embedded watermark and the cover image
will undergo the same distortion. The image quality can be estimated by evaluating the
watermark degradation. The watermarking based quality estimation schemes can be categorized
into the image-feature-dependent schemes and the image-feature-independent schemes. In the
image-feature-dependent schemes, normally, some features extracted from the original image are
embedded into the original image [9], [17], [18]. At the receiver side, the embedded features are
reconstructed and are used as the reference watermark. The features extracted from the distorted
image are used as the distorted watermark. The watermark degradation is assessed by comparing
the distorted watermark with the reference watermark. Instead of the original image features,
using the reconstructed image featuresas the reference watermark mayintroduce additional
inaccuracy to the quality estimation. Moreover, for these schemes, it is hard to examine which
kind of image features are suitable for providing accurate quality estimation. The image-featureindependent schemes simplify the situation [19][23]. In these schemes, the watermark is
independent of the image features and needs to be known at the receiver side. The watermark
degradation is evaluated using the distorted watermark and the original watermark. One
challenging task to develop the image-feature-independent watermarking based quality metric is
to enable the embedded watermark to accurately reflect the quality changes of cover image under
distortions. This requires the watermark being adaptively embedded in cover images according
to the characteristics of cover images, so that the embedded watermark degrades in a similar way
as the cover images under distortions. This is a critical part of the whole scheme and directly
affects the accuracy of quality estimation.
In [19], an image-feature-independent watermarking based quality estimation
scheme was proposed which attempts to achieve the quality estimation accuracy of the FullReference objective metrics. In the scheme, the watermark degradation is measured using the
True Detection Rates (TDR). Then the image quality is estimated by mapping the calculated
10
TDR to a quality value using an empirical mapping function which is experimentally generated
and is used as a priori at the receiver side. An iterative process is used to find the optimal
watermark embedding strength by experimentally testing the image degradation characteristics
so that the quality estimation error can be minimized. This iterative process provides high
accuracy to the quality estimation. However, it also introduces relatively high computational
complexity which makes it less suitable for certain applications. Meanwhile, in the scheme, the
human perception characteristics have not been taken into consideration during the watermark
embedding process and the quality of the watermarked image is about 40 dB in PSNR on
average. Thus, the goal of our research in this paper is to keep the accuracy of quality estimation
achieved in [19] while improving the computational efficiency and reducing the image quality
degradation caused by the watermark embedding process. Here, the term accuracy evaluates
the correlation of the estimated quality and the quality calculated using the existing objective
Full-Reference quality metrics, such as PSNR. The closer the estimated quality to the calculated
quality, the more accurate the quality estimation, and vice versa.
The watermark is a signature, embedded within the data of the original signal,
which in addition to being inaudible to the human ear, should also be statistically undetectable
and resistant to any malicious attempts to remove it. In addition, the watermark should be able
to resolve multiple ownership claims (known as the deadlock problem), by using the original
signal (i.e., the unmarked signal) in the signature detection process.
In order to meet the above demands, perceptual masking is used [1,2], both in the
frequency domain (using a psycho-acoustic model) and in the time domain. The added signature
is signal dependent, and thus is inaudible as well as robust enough to survive attempts to destroy
it.
11
The audio signal is divided into segments. For each segment a local key is
calculated and summed up with a general key (independent of the segment) to initiate a pseudorandom noise sequence for the segment. The noise is colored by a filter, whose coefficients are
calculated according to the psycho-acoustic model. After applying a temporal mask (in order to
reduce the pre-echo effect), the colored noise becomes a watermark.
12
mark on the audio. The usage history can be traced by extracting all the watermarks that were
embedded into the file [7].
1.3.4 Broadcast monitoring: Watermarking is used in code identification information for an
active broadcast monitoring. No separate broadcast channel is required as the data is embedded
in the host signal itself which is one of the main advantages of the technique [19].
1.3.5 Copy control and access control: A watermark detector is usually integrated in a
recording or playback system, like in the DVD copy control algorithm [8] or during the
development of Secure Digital Music Initiative (SDMI) [7]. The copy control and access control
policy detects the watermark and it enforces the operation of particular hardware or software in
the recording set [18].
1.3.6 Information carrier: The blind watermarking technique can be used in this sort of
applications. These applications can transfer a lot of information and the robustness of the
algorithm is traded with the size of content [15].
1.3.7 Medical applications: Watermarking can be used to write the unique name of the patient
on the X-ray reports or MRI scan reports. This application is important because it is highly
advisable to have the patients name entered on reports, and reduces the misplacements of reports
which are very important during treatment [19].
1.3.8Airline traffic monitoring: Watermarking is used in air traffic monitoring. The pilot
communicates with a ground monitoring system through voice at a particular frequency.
However, it can be easily trapped and attacked, and is one of the causes of miss communication.
To avoid such problems, the flight number is embedded into the voice communication between
the ground operator and the flight pilot. As the flight numbers are unique the tracking of flights
will become more secure and easy [31].
13
CHAPTER 2
LITERATURE SURVEY
[1] Sha Wang et-al, Adaptive Watermarking and Tree Structure Based Image Quality
Estimation, IEEE Transactions on Multimedia, Volume 16, Number 2, February 2014.
In this paper authors proposed a quality estimationmethod based on a novel semifragile and adaptive watermarkingscheme. The proposed scheme uses the embedded watermark
to estimate the degradation of cover image under different distortions.The watermarking process
is implemented in DWT domain of thecover image. The correlated DWT coefficients across the
DWT subbands are categorized into Set Partitioning in Hierarchical Trees(SPIHT). Those SPHIT
trees are further decomposed into a set ofbitplanes. The watermark is embedded into the selected
bitplanesof the selected DWT coefficients of the selected tree without causingsignificant fidelity
loss to the cover image. The accuracy of thequality estimation is made to approach that of FullReference metrics by referring to an "Ideal Mapping Curve" computed a priori.The experimental
results show that the proposed scheme can estimate image quality in terms of PSNR, wPSNR,
JND and SSIM withhigh accuracy under JPEG compression, JPEG2000 compression,Gaussian
low-pass filtering and Gaussian noise distortion.
14
techniquesused for digital audio watermarking.Spread spectrum scheme requires psychoacousticadaptation for inaudible noise embedding. This adaptationis rather time-consuming. Of
course, most of the audiowatermarking schemes need psychoacoustic modeling forinaudibility.
Another disadvantage of spread-spectrumschemes is its difficulty of synchronization.
15
subjective and objective quality tests including Similarity (SIM) and Signal to Noiseratio (SNR)
are conducted.
[5] B.K. Singh et-al, Digital Audio Watermarking: An Overview, International Journal of
Electronics and Computer Science Engineering(IJECSE), Volume4, Number 4, 2013.
In this paper digital watermarking overview has been given.Digital audio
watermarking is a method to embed or hide theWatermark (Information signal) into a digital
signal i.e. Image, audio, text or video data. The watermark is difficult to remove from theaudio
signal. If the signal is copied, the information or watermark is also carried in the copy. A signal
may carry several differentwatermarks at the same time. It is used to protecting multimedia data
from unauthorized copying, piracy, ownership, inventions,authentication etc. in this paper we
present the watermarking methods and applications.
16
[7]Ali Al-Haj et-al, DWTBased Audio Watermarking, The International Arab Journal of
Information Technology, Vol. 8, No. 3, July 2011.
In this paper authors describe an imperceptible and robust audiowatermarking
algorithm based on the discrete wavelet transform. Performance of the algorithm has been
evaluatedextensively, and simulation results are presented to demonstrate the imperceptibility
and robustness of the proposedalgorithm. Algorithms based on the discrete wavelets transform.
Thespectrum of the host audio signal was decomposed tolocate the most appropriate regions to
embed thewatermark bits, imperceptibly and robustly.
17
CHAPTER 3
OVERVIEW OF AUDIO WATERMARKING TECHNIQUES
This chapter provides the features of the human auditory system, which are
important while dealing with the audio watermarking technique. Further, this chapter considers
the requirement of an efficient watermarking strategy and different audio watermarking
techniques involving both time and frequency domain.
3.1 FEATURES OF HUMAN AUDITORY SYSTEM (HAS)
Note that audio watermarking is more challenging than an image watermarking technique due to
wider dynamic range of the HAS in comparison with human visual system (HVS) [12]. Human
ear can perceive the power range greater than 10 9: 1 and range frequencies of 10 3:1 [18]. In
addition, human ear can hear the low ambient Gaussian noise in the order of 70dB [18].
However, there are some useful features such as the louder sounds mask the corresponding slow
sounds. This feature can be used to embed additional information like a watermark. Further,
HAS is insensitive to a constant relative phase shift in a stationary audio signal, and, some
spectral distortions are interpreted as natural, perceptually non-annoying ones [12]. Two
properties of the HAS dominantly used in watermarking algorithms are frequency (simultaneous)
masking and temporal masking[13]:
3.1.1 FREQUENCY MASKING
18
is not audible. Thus, frequency domain is a good region to check for the possible areas that have
imperceptibility.
3.1.2 TEMPORAL MASKING
In addition to frequency masking, two phenomena of the HAS in the time domain
also play an important role in human auditory perception. Those are premasking and postmasking in time [13]. However, considering the scope of analysis in frequency masking over
temporal masking, prior is chosen for this thesis. Temporal masking is used in application where
the robustness is not of primary concentration.
3.2 REQUIREMENTS OF THE EFFICIENT WATERMARK TECHNIQUE
The IFPI (International Federation of the Phonographic Industry) [29], digital
audio watermarking algorithms should meet certain requirements. The most significant
requirements are as follows:
3.2.1 Perceptibility: One of the important features of the watermarking technique is that the
watermarked signal should not lose the quality of the original signal. The signal to noise ratio
(SNR) of the watermarked signal to the original signal should be maintained greater than 20dB
[19]. In addition, the technique should make the modified signal not perceivable by human ear.
3.2.2 Reliability: Reliability covers the features like the robustness of the signal against the
malicious attacks and signal processing techniques. The watermark should be made in a way that
they provide high robustness against attacks. In addition, the watermark detection rate should be
high under any types of attacks in the situations of proving ownership. Some of the other attacks
summarized by Secure Digital Music Initiative (SDMI), an online forum for digital music
copyright protection, are digital-to-analog and analog-to-digital conversions, noise addition,
band-pass filtering, time-scale modification, echo addition, and sample rate conversion [10].
19
3.2.3 Capacity: The efficient watermarking technique should be able to carry more information
but should not degrade the quality of the audio signal. It is also important to know if the
watermark is completely distributed over the host signal because, it is possible that near the
extraction process a part of the signal is only available. Hence, capacity is also a primary concern
in the real time situations [19].
3.2.4 Speed:Speed of embedding is one of the criteria for efficient watermarking technique.The
speed of embedding of watermark is important in real time applications where the embedding is
done on continuous signals such as, speech of an official or conversation between airplane pilot
and ground control staff. Some of the possible applications where speed is a constraint are audio
streaming and airline traffic monitoring. Both embedding and extraction process need to be made
as fast as possible with greater efficiency [19].
3.2.5 Asymmetry: If for the entire set of cover objects the watermark remains same; then,
extracting for one file will cause damage watermark of all the files. Thus, asymmetry is also a
noticeable concern. It is recommended to have unique watermarks to different files to help make
the technique more useful [19].
20
most common types of processes an audio signal undergoes when transmitted through a medium
are as follows [11]:
3.3.1 Dynamics: The amplitude modification and attenuation provide the dynamics of the
attacks. Limiting, expansion and compressions are some sort of more complicated applications
which are the non-linear modifications. Some of these types of attacks are re-quantization [20].
3.3.2 Filtering: Filtering is common practice, which is used to amplify or attenuate some part of
the signal. The basic low pass and high pass filters can be used to achieve these types of attacks.
3.3.3 Ambience: In some situations the audio signal gets delayed or there are situations where in
people record signal from a source and claim that the track is theirs. Those situations can be
simulated in a room, which is of great importance to check the performance of an audio signal.
3.3.4 Conversion and lossy compression: Audio generation is done at a particular sampling
frequency and bit rate; however, the created audio track will undergo so many different types of
compression and conversion techniques. Some of the most common compression techniques are
audio compression techniques based on psychoacoustic effect (MPEG and Advanced Audio
Codec (AAC)). In addition to that, it is common process that the original audio signal will
change its sampling frequencies like from 128Kbps to 64Kpbs or 48 Kbps. There are some
programs that can achieve these conversions and perform compression operation. However, for
testing purposes we have used MATLAB to implement these applications. Attacks like resampling and mp3 compression provide some typical examples.
3.3.5 Noise: It is common practice to notice the presence of noise in a signal when transmitted.
Hence, watermarking algorithm should make the technique robust against the noise attacks. It is
recommended to check the algorithm for this type of noise by adding the host signal by an
additive white Gaussian noise (AWGN) to check its robustness.
21
3.3.6 Time stretch and pitch shift: These attacks change either the length of the signal without
changing its pitch and vice versa. These are some de-synchronization attacks which are quite
common in the data transmission. Jittering is one type of such attack.
3.4 PERFORMANCE EVALUATION OF WATERMARKING METHODS
Several Functions are used to qualify the watermarking algorithm, examining
tests on the resulted watermarked image.
3.4.1 Imperceptibility: The imperceptibility of the watermark is tested through comparing the
watermarked image with the original one. Several tests are usually used in this regard.
3.4.2 MSE: Mean Squared Error (MSE) is one of the earliest tests that were performed to test if
two pictures are similar. A function could be simply written according to equation given as:
3.1
3.4.3 PSNR: Peak Signal to Noise Ratio (PSNR) is a better test since it takes the signal strength
into consideration (not only the error). Given equation describes how this value is obtained:
3.2
3.4.4 SSIM: The main problem about the previous two criteria is that they are not similar to
what similarity means to human visual system (HVS). Structural Similarity (SSIM) is a function
defined as equation given below:
3.3
Where: , , & xy are mean, variance, and covariance of the images, and c 1, c2 are the
stabilizing constants.
22
In general, the time domain techniques provide least robustness as a simple low
pass filtering can remove the watermark [20]. Hence time domain techniques are not advisable
for the applications such as copyright protection and airline traffic monitoring; however, it can be
used in applications like proving ownership and medical applications.
Watermarking techniques can be distinguished as visible or non-blind
watermarking and blind watermarking as described in Section 1.2.2. In the following, we
present typical watermarking strategies such as LSB coding, spread spectrum technique,
patchwork technique, and quantization index modulation (QIM). We provide a detailed
description of transformation methods later in this Chapter.
24
These techniques are derived from the concepts used in spread spectrum
communication [21]. The basic approach is that a narrow band signal is transmitted over the
large bandwidth signal which makes them undetectable as the energy of the signal is overlapped.
In the similar way the watermark is spread over multiple frequency bins so that the energy in any
one bin is very small and certainly undetectable [22].
In spread spectrum technique, the original signal is first transformed to another
domain using domain transformation techniques [21]. The embedding technique can use any
type of approach for example quantization. Zhou et al. proposed an algorithm embedding
watermark in 0th DCT coefficient and 4th DCT coefficients which are obtained by applying DCT
on the original signal [23]. Both embedding and extraction procedure can be interpreted using
Figure 2.2. The original signal is transformed into frequency domain using DCT. Then
watermark is embedded to the sample values in that domain. Reverse procedure is followed to
obtain the watermarked signal. This process of generating embedded signal is shown as
embedding procedure in Figure 2.2.
25
Embedded signal will undergo some attacks, thus, noise is added to the signal. To extract the
watermark the attacked signal is fed through extraction procedure. The procedure for extractions
follows the same steps as that in embedding procedure as shown in Figure 3.2. The extraction
process involves taking the attacked signal and applying DCT, framing the obtained components.
And the obtained frames are used to obtain the watermark. Care is taken to replicate the
procedure used for embedding process.
The data to be watermarked is separated into two distinct subsets. One feature of
the data is chosen and modified in opposite directions in both subsets [21]. For an example let
the original signal is divided into two parts A and B, then the part A is increased by a fraction
and the part B is decreased by some amount . The samples separation is the secret key which is
termed as watermarking key. Detection of watermark is done by following the statistical
properties of the audio signal. Let NA and NB denote the size(s) of the individual A and B parts
26
and be the amount of the change made to the host signal. Suppose that a[i] and b[i] represent
the sample values at ith position in blocks A and B. The difference of the sample values can be
written as [21]:
3.4
The expectation of the difference is used to extract the watermark which is expressed as
follows:
3.5
3.6
27
Where: x is the original sample value of the audio signal and Q(x) is the quantized value, hence
the quantization error is .
3.6TRANSFORMATION TECHNIQUES
Here we discuss the background about discrete cosine transform (DCT) and
discrete wavelet transform (DWT). Also different DWT types such as orthogonal, bi-orthogonal
and frame based filters.
3.6.1 DISCRETE COSINE TRANSFORM
3.7
3.8
From the equation for it can be inferred that for u = 0, the component is the
average of the signal also termed as dc coefficient in literature [28]. And all the other 19
transformation coefficients are called as ac coefficients. Some of the important applications of
DCT are image compression and signal compression. The most useful applications of twodimensional (2-d) DCT are the image compression and encryption [25]. The 1 -d DCT equations,
discussed above, can be used to find the 2-d DCT by considering every row as an individual 1 -d
signal. Thus, DCT coefficients of an MN twodimensional signals C DCT2(u,v) and their
reconstruction f DCT2(x,y) can be calculated by the equations below.
3.9
3.10
3.11
29
30
information for both analysis and synthesis signal and is easier to implement as compared to
CWT [26].
A complete structure of wavelet contains domain processing analysis block and a
synthesis block. Analysis or decomposition block decomposes the signal into wavelet
coefficients. The reconstruction process is the inverse of decomposition process. Here, the block
takes the decomposed signal and synthesizes (near) original signal. A view of the wavelet
process is shown in Figure 3.4. From the figure the original signal is decomposed in the analysis
block and the signal is reconstructed using the synthesis block. Filters used in the analysis and
synthesis block
31
32
3.7CONCLUSION
In this chapter, we presented the features of human auditory system and the
requirements of the efficient watermarking techniques. Problems and possible attacks on the
audio signal are also provided. Different audio watermarking techniques in the literature such as
LSB coding, spread spectrum technique, patchwork technique, and quantization index
modulation are presented. Also detailed information about the transformation techniques such as
discrete cosine transformation and discrete wavelet transformation (DWT) are provided. It also
presents different types of DWT transformations.
33
CHAPTER 4
PROPOSED METHODOLOGY
some
spectral distortions are interpreted as natural, perceptually non-annoying ones [2]. Two
properties of the HAS dominantly used in watermarking algorithms are frequency (simultaneous)
masking and temporal masking [3].
Frequency Masking: Frequency (simultaneous) masking is a frequency domain observable
fact where low levels signal (the maskee) can be made inaudible (masked) by a simultaneously
appearing stronger signal (the masker), if the masker and maskee are close enough to each
other in frequency [5]. A masking threshold can be found and is the level below which the
audio signal is not audible. Thus, frequency domain is a good region to check for the possible
areas that have imperceptibility.
Temporal Masking: In frequency masking, two phenomena of the HAS in the time domain also
play an important role in human auditory perception. Those are pre-masking and post masking in
time [5]. Temporal masking is used in those applications where the robustness is not of primary
consideration.
34
In this proposed blind frequency masking algorithm entire unwatermarked host signal is
not needed at the detector. Instead, a password is required (Co) usually a data reducing function,
is used by the watermark detector to nullify "noise" effects represented by the addition the host
signal in the embedder. In a blind watermark detector, the un-watermarked host signal is
unknown, and cannot be removed before a watermark extraction. Under these conditions, the
analogy with Figure 6 can be made, where the added watermark is corrupted by the combination
of impacts of the cover work and the noise signal. The received watermarked signal cwn, is now
viewed as a corrupted version of the added pattern wa and the entire watermarked detector is
viewed as the channel decoder.
Fig 4.1: Proposed Frequency Masking Watermarking system with blind detection
35
Output
Temporal Masking
Original
Signal
FFT
Calculate
local key
Frequency Masking
( psychoacoustic model
)
Noise Filtering
Pseudo Random
Noise Generator
Owner's
Key
36
37
Minimize +
Distortions
Tested
Signal
Original
Signal
+
-
Correlation &
Thresholding
Result
Calculate
Signature
Owner's
Key
38
39
CHAPTER 7
CONCLUSION
FUTURE SCOPE
In future work, the proposed scheme will be further developed to estimate the
quality of an image distorted by multiple distortions. Meanwhile, experiments about image
quality estimation in terms of subjective quality scores will be conducted. Since the proposed
scheme has good computational efficiency, it is feasible to further develop the proposed scheme
40
for video quality evaluation. In this work image is taken as data and audio has been taken as host
or carrier, in other work one can use color image instead of grey scale image. Also an audio can
be used as data or information. Further one can implement digital video watermarking if bigger
size data has to be hidden.
41