Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
With the rapid development of the speech, audio, image, and video compression methods, currently it is not a difficult task to spread digital multimedia over Internet. This makes the protections of digital intellectual property rights and content authentications have been a serious problem. By using watermarking technique we can hide the data in audio signal
BLOCK
DIAGRAM
Host signal
Watermarked signal
Watermark embedder Watermark detector
Watermark message
SOFTWARE REQUIRED
INTRODUCTION TO MATLAB
WHAT IS MATLAB? HOW TO START AND QUIT MATLAB? USING HELP IN MATLAB MATRIX, VECTOR AND SCALAR SOME BASIC COMMANDS SOME BASIC PLOT COMMANDS ALGEBRIC OPERATIONS IN MATLAB READING AND WRITING SOUND FILES IN MATLAB
HIDING TECHNIQUE
WATERMARKING
we can define watermarking systems as in which the hidden message is related to the host signal and non-watermarking systems in which the message is unrelated to the host signal. On the other hand, systems for embedding messages into host signals can be divided into stegnographic systems, in which the existence of the message is kept secret, and non-stegnographic systems, in which the presence of the embedded message does not have to be secret.
APPLICATION AREAS OWNERSHIP PROTECTION PROOF OF OWNERSHIP AUTHENTICATION AND TAMPERING DETECTION BROADCAST MONITORING INFORMATION CARRIER PERCEPTUAL TRANSPARENCY WATERMARK BIT RATE ROBUSTNESS BLIND OR INFORMED WATERMARK DETECTION SECURITY THEORY
THEORY
SPEECH PROCESSING
SPEECH PRODUCTION WHAT IS SPEECH PROCESSING SPEECH CODING SPEECH SYNTHESIS SPECIAL TYPE OF VOICED AND UNVOICED SOUNDS VOWELS DIPHTHONGS SEMIVOWELS NASALS UNVOICED FRICATIVES VOICED FRICATIVES VOICED STOPS UNVOICED STOPS SPEECH RECOGNITION WHY ENCODE SPEECH FACTORS ASSOCIATED WITH SPEECH Formants Phonemes
INTRODUCING WAVELETS WAVELET VS FOURIER ANALYSIS TIME-FREQUENCY RESOLUTION EXAMPLES OF WAVELETS THE DISCRETE WAVELET TRANSFORM THE FAST WAVELET TRANSFORM ALGORITHM SIGNAL RECONSTRUCTION SPEECH WATER MARKING
RESULTS
Main GUI
Step 1: Select the audio signal in for which you want to watermark
Step 3: Select the watermarking button and hear the watermarked song and a audio watermarked file will be written and stored in the current directory
DISADVANTAGES
1.Digital information can easily be disseminated and copied via global networks. Due to this ease, challenges regarding digital information have created a need for more copyright laws. However, laws cannot be the only entity required to protect digital works. 2.Terrorists can also use Audio data hiding to keep their communications secret and to coordinate attacks. 3.There is a narrow margin between hiding watermark information in ways which pass through perceptual encoders, and still cannot be perceived by listeners. 4.There is a chance of distortion which leads to add any unwanted signal.due to which listener cannot get the original signal. 5.The phase encoding watermarking technique offers higher data rates over the previous methods, averaging from 8 to 32 bits per second. This technique is increasingly effective in the presence of noise. 6. The robustness of the scheme can be increased somewhat with longer audio files, by inserting the watermark signal multiple times, which will aid in extraction, and also in error correction if the signal is manipulated.
APPLICATIONS
1. Audio data hiding can be used anytime you want to hide data. There are many reasons to hide data but most important is to prevent unauthorized persons from becoming aware of the existence of a message. 2. In the business world Audio data hiding can be used to hide a secret chemical formula or plans for a new invention. Audio data hiding can also be used in corporate world. 3.Audio data hiding can also be used in the noncommercial sector to hide information that someone wants to keep private. 4.Data hiding in video and audio, is of interest for the protection of copyrighted digital media, and to the government for information systems security and for covert communications. 5. It can also be used in forensic applications for inserting hidden data into audio files for the authentication of spoken words and other sounds, and in the music business for the monitoring of the songs over broadcast radio. 6. Terrorists can also use Audio data hiding to keep their communications secret and to coordinate attacks.
FUTURE SCOPE
An increase in high bandwidth internet connections has also prompted the motion picture industry to take note of possible revenue losses due to unauthorized movie distribution via the internet. Microsoft is currently developing new watermark technologies and is in the process of testing future operating systems equipped with DRM for all media types. The success of IP protection schemes over past years, including most current watermarking technology, is limited. Virtually all the technologies introduced to date have been cracked or have proven unsuitable due to the degradation and distortion they introduce for example, past watermarking schemes from Verance have proven audible when demonstrated for record companies. Watermarking digital audio becomes particularly difficult when the file is subject to a lossy compression schemes such as MP3 or WMA. These perceptual compression schemes, and current watermarking schemes, take advantage of many of the same limitations of the human auditory system creating a problem whereby watermark information can be distorted and lost.
CONCLUSION
In this paper we have introduced a robust method of imperceptible audio data hiding. This system is to provide a good, efficient method for hiding the data from hackers and sent to the destination in a safe manner. This proposed system will not change the size of the file even after encoding and also suitable for any type of audio file format. Thus we conclude that audio data hiding techniques can be used for a number of purposes other than covert communication or deniable data storage, information tracing and finger printing, tamper detection. As the sky is not limit so is not for the development. Man is now pushing away its own boundaries to make every thought possible. So similarly these operations described above can be further modified as it is in the world of information technology. After designing any operation every developer has a thought in his mind that he could develop it by adding more features to it.