Source: Pattern Recognition Letters, Article In Press, 2007

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

1 A Spectral-Temporal Method for Pitch Tracking Stephen A. Zahorian*, Princy Dikshit, Hongbing Hu* Department of Electrical and Computer Engineering Old.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
1. 2 u Copyright Protection u Authentication of multimedia data u Robust Data Hiding and Security issues.
MODULATION SPECTRUM EQUALIZATION FOR ROBUST SPEECH RECOGNITION Source: Automatic Speech Recognition & Understanding, ASRU. IEEE Workshop on Author.
Watermarking For Image Authentication Presented by San-Hao Wang.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Robust Motion Watermarking based on Multiresolution Analysis EUROGRAPHICS 2000 Speaker: 彭任右, GAME Lab Date: 4/18/2005.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Normalization of the Speech Modulation Spectra for Robust Speech Recognition Xiong Xiao, Eng Siong Chng, and Haizhou Li Wen-Yi Chu Department of Computer.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp Authors: Chun-Wei Yang and Jau-Ji.
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Authors: Sriram Ganapathy, Samuel Thomas, and Hynek Hermansky Temporal envelope compensation for robust phoneme recognition using modulation spectrum.
ELE 488 F06 ELE 488 Fall 2006 Image Processing and Transmission (12 – 7 – 06) Digital Watermarking What? Why? How? Attacks, Legal issues 12/7.
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
Hsin-Ju Hsieh 謝欣汝, Wen-hsiang Tu 杜文祥, Jeih-weih Hung 洪志偉 暨南國際大學電機工程學系 報告者:汪逸婷 2012/03/20.
1 Spectrum Estimation Dr. Hassanpour Payam Masoumi Mariam Zabihi Advanced Digital Signal Processing Seminar Department of Electronic Engineering Noushirvani.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Digital Watermarking Using Phase Dispersion --- Update SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu, Michael Su.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Doc.: IEEE /1398r0 Submission November 2014 Slide 1 Shiwen He, Haiming Wang Preamble Sequence for IEEE aj (45GHz) Authors/contributors:
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Outline Carrier design Embedding and extraction for single tile and Multi-tiles (improving the robustness) Parameter α selection and invisibility Moment.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
A DIGITAL IMAGE WATERMARKING PREPARED BY AMAR RAEED KHORSHıD ALHıLALı ıD : R.G. Schyndel, A. Tirkel, and C. Osborne, “A Digital Watermark”, Procedding.
DETECTION OF COPY MOVE FORGERY IN DIGITAL IMAGES.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
Watermarking Scheme Capable of Resisting Sensitivity Attack
DCT watermarking Speaker: Paul 1.
Introduction to Audio Watermarking Schemes N. Lazic and P
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
Spread Spectrum Audio Steganography using Sub-band Phase Shifting
Image Watermarking Chu, Hsi-Cheng.
Feature Space Based Watermarking in Multi-Images
朝陽科技大學 資訊工程系 謝政勳 Application of GM(1,1) Model to Speech Enhancement and Voice Activity Detection 朝陽科技大學 資訊工程系 謝政勳
Preamble Sequence for aj(45GHz)
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
DCT-based Processing of Dynamic Features for Robust Speech Recognition Wen-Chi LIN, Hao-Teng FAN, Jeih-Weih HUNG Wen-Yi Chu Department of Computer Science.
Govt. Polytechnic Dhangar(Fatehabad)
Authors:Tae-Yun Chung; Min-Suk Hong; Young-Nam Oh;
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Author: Minoru Kuribayashi, Hatsukazu Tanaka
Digital Watermarking for Image Authentication with Localization
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Blind Reversible Authentication Based on PEE and CS Reconstruction
An imperceptible spatial domain color image watermarking scheme
Authors: J.J. Murillo-Fuentes
Digital Watermarking (cont.)
High-Capacity Data Hiding in Halftone Images Using Minimal-Error Bit Searching and Least-Mean Square Filter Author: Soo-Chang Pei and Jing-Ming Guo Source:
Presentation transcript:

Source: Pattern Recognition Letters, Article In Press, 2007 Speech authentication system using digital watermarking and pattern recovery Author: Chang-Mok Park, Devinder Thapa, Gi-Nam Wang, AJOU University, South Korea Source: Pattern Recognition Letters, Article In Press, 2007 Speaker: Yu-Che Hsieh

Outline Introduction Embedding watermark Extraction and pattern recovery Results Conclusions

Introduction Proposed approach Record device Three type Audio data Two process Avoid re-embedding Cross-correlation Cyclic pattern Audio data Store format MP3,WMA,…,etc

Embedding watermark Spread spectrum in DFT (discrete Fourier transform) domain Magnitude vector: y = m + w w = △b b: Random bit sequence b (i), where i = 1, 2,…,N △: Embedding strength Embedding schema

Embedding watermark Structure of a watermark pattern Cyclic pattern Watermark information(0,1,2,3 and 4) is fromed by shifting the random bit sequence Tradeoff Robustness and precision Between length and information

Embedding watermark In this paper: Length of T: 0.6s Watermark information: 0, 1, 2, 3, 4

Extraction and pattern recovery Detection of watermark information using cross-correlation cross-correlation function A larger correlation value must be expected in the specific position Speech signal DCT process

Extraction and pattern recovery Peak ranging from 0 to N – 1 Watermark information: Index of peak Watermark information can be extracted using the index of the peak

Extraction and pattern recovery Extracting the temporal pattern: two preprocessing steps Estimation with near right information: v (t) should be 0 ~ 4 Curve optimization (smoothing)

Extraction and pattern recovery Extracted pattern and recovered pattern Dash line: Original pattern Dot line: smoothed pattern

Results Normal recovered pattern and some modified patterns Normal Pattern (1) Type-I, Insertion of non-watermarked speech signals. (2) Type-II, Insertion of watermarked speech signals. (3) Type-III, Removal of speech signals.

Results

Results

Results

Conclusions Speech authentication approach Cyclic pattern embedding Pattern recovery Preprocessing and curve fitting Detect the various forgeries