Sie sind auf Seite 1von 19

DATA HIDING IN AUDIO SIGNALS

INTERNAL GUIDEARSHIYA NOORI

PRESENTED BYJAKERA PARVIN CHOUDHURY HT NO:08H81A0417

INTRODUCTION
With the rapid development of the speech, audio, image, and video compression methods, currently it is not a difficult task to spread digital multimedia over Internet. This makes the protections of digital intellectual property rights and content authentications have been a serious problem. By using watermarking technique we can hide the data in audio signal

BLOCK

DIAGRAM

Host signal
Watermarked signal
Watermark embedder Watermark detector

Detected watermark ed message

Watermark message

SOFTWARE REQUIRED

BASED ON MATLAB SOFTWARE

INTRODUCTION TO MATLAB
WHAT IS MATLAB? HOW TO START AND QUIT MATLAB? USING HELP IN MATLAB MATRIX, VECTOR AND SCALAR SOME BASIC COMMANDS SOME BASIC PLOT COMMANDS ALGEBRIC OPERATIONS IN MATLAB READING AND WRITING SOUND FILES IN MATLAB

HIDING TECHNIQUE
WATERMARKING

we can define watermarking systems as in which the hidden message is related to the host signal and non-watermarking systems in which the message is unrelated to the host signal. On the other hand, systems for embedding messages into host signals can be divided into stegnographic systems, in which the existence of the message is kept secret, and non-stegnographic systems, in which the presence of the embedded message does not have to be secret.

APPLICATION AREAS OWNERSHIP PROTECTION PROOF OF OWNERSHIP AUTHENTICATION AND TAMPERING DETECTION BROADCAST MONITORING INFORMATION CARRIER PERCEPTUAL TRANSPARENCY WATERMARK BIT RATE ROBUSTNESS BLIND OR INFORMED WATERMARK DETECTION SECURITY THEORY

THEORY

Basic Watermarking system equivalent to a communication system

SPEECH PROCESSING

SPEECH PRODUCTION WHAT IS SPEECH PROCESSING SPEECH CODING SPEECH SYNTHESIS SPECIAL TYPE OF VOICED AND UNVOICED SOUNDS VOWELS DIPHTHONGS SEMIVOWELS NASALS UNVOICED FRICATIVES VOICED FRICATIVES VOICED STOPS UNVOICED STOPS SPEECH RECOGNITION WHY ENCODE SPEECH FACTORS ASSOCIATED WITH SPEECH Formants Phonemes

INTRODUCTION TO WAVELET ANALYSIS


INTRODUCING WAVELETS WAVELET VS FOURIER ANALYSIS TIME-FREQUENCY RESOLUTION EXAMPLES OF WAVELETS THE DISCRETE WAVELET TRANSFORM THE FAST WAVELET TRANSFORM ALGORITHM SIGNAL RECONSTRUCTION SPEECH WATER MARKING

APPLCATIONS & ADVANTAGES


AUTHENTICATION AND TAMPERING DETECTION BROADCAST MONITORING INFORMATION CARRIER PERCEPTUAL TRANSPARENCY WATERMARK BIT RATE ROBUSTNESS SECURITY SERVICES

RESULTS
Main GUI

Step 1: Select the audio signal in for which you want to watermark

Step 2 Select the speech signal which you want to insert

Step 3: Select the watermarking button and hear the watermarked song and a audio watermarked file will be written and stored in the current directory

ADVANTAGES and DISADVANTAGES


ADVANTAGES 1.Content preserving operations in the transmission channel should be tolerated to facilitate flexible applications. 2. Low computational complexity both at the transmitter and receiver side is important in real time media processing which can be possible 3. Localized malicious modification can be easily detected for he protected digital data 4. Avoid ability of degradation and robustness for audio signals 5.Protection of intellectual digital works 6. It takes benefits from two State-Of-The-Art reference systems by exploiting the receiver of the one for its low computational cost and the embedding strategy of the other for its high transmission reliability. 7.Its receiver relies on an equalization Wiener Alter and its embedded uses a local copy. 8.This watermarking technique relies on direct sequence spread spectrum (DSSS) to spread the watermarked signal over the entire audible frequency spectrum such that it approximates white noise, at a power level as to be inaudible.

DISADVANTAGES
1.Digital information can easily be disseminated and copied via global networks. Due to this ease, challenges regarding digital information have created a need for more copyright laws. However, laws cannot be the only entity required to protect digital works. 2.Terrorists can also use Audio data hiding to keep their communications secret and to coordinate attacks. 3.There is a narrow margin between hiding watermark information in ways which pass through perceptual encoders, and still cannot be perceived by listeners. 4.There is a chance of distortion which leads to add any unwanted signal.due to which listener cannot get the original signal. 5.The phase encoding watermarking technique offers higher data rates over the previous methods, averaging from 8 to 32 bits per second. This technique is increasingly effective in the presence of noise. 6. The robustness of the scheme can be increased somewhat with longer audio files, by inserting the watermark signal multiple times, which will aid in extraction, and also in error correction if the signal is manipulated.

APPLICATIONS
1. Audio data hiding can be used anytime you want to hide data. There are many reasons to hide data but most important is to prevent unauthorized persons from becoming aware of the existence of a message. 2. In the business world Audio data hiding can be used to hide a secret chemical formula or plans for a new invention. Audio data hiding can also be used in corporate world. 3.Audio data hiding can also be used in the noncommercial sector to hide information that someone wants to keep private. 4.Data hiding in video and audio, is of interest for the protection of copyrighted digital media, and to the government for information systems security and for covert communications. 5. It can also be used in forensic applications for inserting hidden data into audio files for the authentication of spoken words and other sounds, and in the music business for the monitoring of the songs over broadcast radio. 6. Terrorists can also use Audio data hiding to keep their communications secret and to coordinate attacks.

FUTURE SCOPE
An increase in high bandwidth internet connections has also prompted the motion picture industry to take note of possible revenue losses due to unauthorized movie distribution via the internet. Microsoft is currently developing new watermark technologies and is in the process of testing future operating systems equipped with DRM for all media types. The success of IP protection schemes over past years, including most current watermarking technology, is limited. Virtually all the technologies introduced to date have been cracked or have proven unsuitable due to the degradation and distortion they introduce for example, past watermarking schemes from Verance have proven audible when demonstrated for record companies. Watermarking digital audio becomes particularly difficult when the file is subject to a lossy compression schemes such as MP3 or WMA. These perceptual compression schemes, and current watermarking schemes, take advantage of many of the same limitations of the human auditory system creating a problem whereby watermark information can be distorted and lost.

CONCLUSION
In this paper we have introduced a robust method of imperceptible audio data hiding. This system is to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safe manner. This proposed system will not change the size of the file even after encoding and also suitable for any type of audio file format. Thus we conclude that audio data hiding techniques can be used for a number of purposes other than covert communication or deniable data storage, information tracing and finger printing, tamper detection. As the sky is not limit so is not for the development. Man is now pushing away its own boundaries to make every thought possible. So similarly these operations described above can be further modified as it is in the world of information technology. After designing any operation every developer has a thought in his mind that he could develop it by adding more features to it.

Das könnte Ihnen auch gefallen