Audio Watermarking Charalampos Laftsidis Artificial Intelligence and Information Analysis Lab Aristotle University of Thessaloniki February 2001.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Department of Informatics, Aristotle University of Thessaloniki Information Hiding Content Verification Anastasios Tefas Digital Days.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
AUDIO COMPRESSION TOOLS & TECHNIQUES Gautam Bhattacharya.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital watermarking technique for protecting digital images
1 Audio Compression Techniques MUMT 611, January 2005 Assignment 2 Paul Kolesnik.
Fifth International Conference on Information
1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍.
Department of Informatics, Aristotle University of Thessaloniki1 Transform Based Watermarking Solachidis Vassilios Department of Informatics Aristotle.
MPEG Audio Compression by V. Loumos. Introduction Motion Picture Experts Group (MPEG) International Standards Organization (ISO) First High Fidelity Audio.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Audio Steganography Echo Data Hiding
Fundamentals of Perceptual Audio Encoding Craig Lewiston HST.723 Lab II 3/23/06.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Digital Audio Watermarking: Properties, characteristics of audio signals, and measuring the performance of a watermarking system نيما خادمي کلانتري
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Audio Compression Usha Sree CMSC 691M 10/12/04. Motivation Efficient Storage Streaming Interactive Multimedia Applications.
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 Audio Compression. 2 Digital Audio  Human auditory system is much more sensitive to quality degradation then is the human visual system  redundancy.
Digital watermarking: algorithms and applications
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
DEPARTMENT OF ECE, BEC, BAGALKOT
Introduction to Audio Watermarking Schemes N. Lazic and P
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
IMAGE PROCESSING IMAGE WATERMARKING
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Basic Concepts of Audio Watermarking
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
Govt. Polytechnic Dhangar(Fatehabad)
Information Theoretical Analysis of Digital Watermarking
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Audio Watermarking for Copyright Protection
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Audio Watermarking Charalampos Laftsidis Artificial Intelligence and Information Analysis Lab Aristotle University of Thessaloniki February 2001

The technique’s motiv Due to contemporary technology, there are broadly available tools in order to reproduce and retransmit multimedia data. Potential of both legal and unauthorized manipulation The objective of the watermarking technique Protection against data piracy. (Unauthorized copying and redistribution of data).

Rightful ownership authentication A watermarking system provides owner authentication. It processes the claim of whether the person under consideration is the owner of the digital data (hypothesis testing). The output of the system is therefore binary: Rightful owner or not. Probabilities of false detection and of false alarm (pfd, pfa). Watermarking: a data hiding technique (method for secretly and imperceptibly embedding signals into digital data)

Watermarking system’s requirements Inaudible watermarks Statistically invisible watermarks Similarity of the watermark’s compression characteristics as those of the original signal Reliable detection scheme Robustness to deliberate attacks Robustness to signal manipulation (filtering, compression, resampling, requantization, cropping, noise corruption, D/A - A/ etc.) The system’s algorithm should be available to users The system’s performance should be independent from the signal

Audio masking The effect of a stronger sound on the loudness and hearing threshold of a weaker one, when the latter lies in the frequency or temporal neighborhood of the former one. –Masker (host signal) –Maskee (embedded signal) The human auditory system is a frequency analyzer consisting of a set of 24 bandpass filters. Frequency masking Temporal masking

Different watermarking methods Watermark embedding in the time domain Watermark embedding in the frequency domain (temporal masking is unavoidable) Watermarking MPEG audio streams Echo-hiding techniques (also used for multi-bit information embedding) Phase coding method

Modules of a watermarking system Watermark-signal generation module Watermark embedding module Watermark detection module

Watermark generation Use of a chaotic map (recursive calls of a function). Thresholding the produced values. Formulation of a vector of 1 and –1 (actual watermark). The use of a chaotic map is significant in order to prevent the inverse calculation of the watermark.

Watermark embedding Segmentation of the original sound data in blocks of N samples. Generation of a watermark w(i) of length N using a seed (starting point). Modulation of the watermark, thus producing a signal dependent watermark w’(i): or where denotes a superposition law, which can be addition, multiplication, exponential law.

Watermark embedding Filtering of w’(i) through a lowpass filter (a Hamming filter of order L with b l coefficients for example): Adding the resulting watermark to the original data:

Test signal: segment from Vivaldi’s “L’amoroso” concerto for violin. Signal to Noise Ratio (SNR)=22dB

Watermark detection Correlation Simple correlation Circular correlation The latter case can be calculated through the Fourier transform:

Watermark detection Calculation of the filtered watermark vector w’(i) (filtering just the series of 1 and -1) Calculation of the circular correlation between the test signal and the watermark: If the signal is watermarked, then:

Watermark detection Definition of a scaling factor: Calculation of the detection ratio: If E(w’(i)) is not equal to 0, then where:

Watermark detection Fusion (average) of the detection ratios for all periods: Calculation of the final detection value: Comparison of R to a predefined threshold

Detection results Receiver operating characteristics (ROC): Choice of threshold’s position Probability of False Acceptance (Pfa) Probability of False Rejection (Pfr) Plotting Pfa versus Pfr (in logarithmic scale) Definition of the Equal Error Rate (EER)

Parameters Segment’s size N. Smallest number of segments permitted. Power of the watermark (SNR). Watermark generation map. Watermark’s filtering. Type of embedding: Multiplicative: Additive: Fusion among periods. Detection threshold.

Subjective quality evaluation Presentation of the original and watermarked versions to a set of listeners. 1st test: try to find the watermarked version among 3 presentations: original, watermarked, original or original, original, watermarked 2nd test: mark the quality of the watermarked version as: 5.Imperceptible 4.Perceptible, but not annoying 3.Slightly annoying 2.Annoying 1.Very annoying. Present versions that contain multiple watermarks.

Frequency masking (MPEG-1 psychoacoustic model) Modification of the watermark according to the spectral characteristics of the original signal. Calculation of the spectrum and normalization by a constant value. (s(n): original signal, w(n): predefined window)

Frequency masking (MPEG-1 psychoacoustic model) Identification of tonal components: where j defines a neighborhood around k and can be up to 6, depending on the value of k. Division of the frequency axis into 24 critical bands, according to the perceptual model of the human ear. The bandwidth of each of those critical bands is defined as 1 Bark.

Frequency masking (MPEG-1 psychoacoustic model) Calculation of non-tonal components for every critical band from the remaining signal energy. Calculation of the absolute hearing threshold. Removal of components that fall below the absolute hearing threshold or of those that are separated by more than 0.5 Barks. Calculation of individual and global masking thresholds.

Topics to be investigated The deadlock problem: the method cannot easily distinguish which watermark was embedded first, if a pirate embeds his own one on watermarked data. Special attacks on the watermark. Watermarking of short segments of sounds that may be used. Inability to use the full properties of a high-pass (especially) chaotic generators, because of filtering the watermark during the embedding procedure.

Bibliography P. Bassia, I. Pitas, N. Nikolaidis “Robust audio watermarking in the time domain”, Dept. of Informatics, University of Thessaloniki, November L. Boney, A. H. Tewfik, K. N. Hamdy, “Digital watermarks for audio signals”, in Proc. of EUSIPCO ’96, September 1996, vol. III, pp M. D. Swanson, B. Zhu, A. H. Tewfik, L. Boney, “Robust audio watermarking using perceptual masking”, Elsevier Signal Processing, Sp. Issue on Copyright Protection and Access control, vol. 66, no. 3, pp , W. Kim, J. Lee, W. Lee, “An audio watermarking scheme robust to mpeg audio compression”, in Proceedings NSIP ’99, Antalya, Turkey, June 1999, vol. I, pp I. J. Cox, J. Kilian, F. T. Leighton, T. Shammon, “Secure spread spectrum watermarking for multimedia”, IEEE Transactions on Image Processing, vol. 6, no. 12, pp , K. Nahrsted, “Non-invertible watermarking methods for mpeg video and audio”, in Multimedia and Security Workshop, ACM Multimedia ’98, Bristol, UK, September D. Gruhl, A. Lu, W. Bender, “Echo Hiding”, in Proceedings of 1 st Information Hiding Workshop, Cambridge, U.K., May 1996, pp W. Bender, D. Gruhl, N. Morimoto,, A. Lu, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no. 3 and 4, pp , F. A. Peticolas, R. J. Anderson, “Weaknesses of Copyright Marking Systems”, in Multimedia and Security Workshop, ACM Multimedia ’98, pp , Bristol, UK, September 1998.