1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Queen’s University, Kingston, Canada
Prepared for DA 201  Introduction to Digital Watermarking.
H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Watermarking Techniques Digital Rights Seminar © April 28, 2006 Mahmoud El-Gayyar.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Audio Watermarking Charalampos Laftsidis Artificial Intelligence and Information Analysis Lab Aristotle University of Thessaloniki February 2001.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
N-Secure Fingerprinting for Copyright Protection of Multimedia
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
N. Nikolaidis C. Kotropoulos I. Pitas Artificial Intelligence and Information Analysis (AIIA) Laboratory Department of Informatics Aristotle University.
Digital Signal Processing Final Project Proposal R 資工碩一 馬智釗 Reference : “Rotation, scale, and translation resilient digital watermarking based.
Digital Watermarking Parag Agarwal
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Effect of the Phase on Speech and Musical signals using DWT By: Hafiz, Malik ECE418,DSPIISpring,02.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Mesh Watermarking based on 2D Transferred Domain Jongyun Jun Tae-Joon Kim CS548 Term Project Presentation 2010/05/13.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Digital Watermarking
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Detection of Image Alterations Using Semi-fragile Watermarks
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
Outline Carrier design Embedding and extraction for single tile and Multi-tiles (improving the robustness) Parameter α selection and invisibility Moment.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
A Partial Survey of the Perfect Digital Watermark Problem.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Introduction to Audio Watermarking Schemes N. Lazic and P
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
DONE BY S.MURALIRAJAN M.NIRMAL
Image Watermarking Chu, Hsi-Cheng.
Affiliation of presenter
Parag Agarwal Digital Watermarking Parag Agarwal
Source: Pattern Recognition Letters, Article In Press, 2007
Novel Multiple Spatial Watermarking Technique in Color Images
Authors: J.J. Murillo-Fuentes
Audio Watermarking for Copyright Protection
Introduction to Multimedia Security Topics Covered in this Course
Digital Watermarking Lecture 2
Presentation transcript:

1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍

2 Outline Introduction to watermark Designing of watermarking system Discussion on new watermarking system

3 Introduction to watermark The outstanding progress of digital technology has increased the ease with while multimedia data are reproduced and retransmitted. The solution to this challenging task seems to lie in data hiding techniques, i.e., Methods for secretly and imperceptibly embedding signals of certain characteristics in the media of interest. Such signals are usually referred to as watermarks.

4 Designing of watermarking system (1) A watermarking system consists of three distinct modules: 1) The watermark signal generation module, 2) the watermark embedding module, and 3) the watermark detection module. The watermark signal is a low amplitude signal that is generated by a noninvertible function the takes as input a set of parameters(watermark key).

5 Designing of watermarking system (2) Watermark embedding is performed in the temporal, spatial, spatiotemporal domain, or a suitable transform domain using a properly selected embedding rule. Watermark detection is performed by some sort of correlation detector or statistical hypothesis testing, with or without resorting to the original signal.

6 Discussion on new watermarking system