Data Hiding within Audio Signals Matthew Wiedemer CSE691 November 20, 2001.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Fundamentals of Data & Signals (Part II) School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (February18, 2015)
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Fifth International Conference on Information
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Spread Spectrum Steganography
Audio Steganography Echo Data Hiding
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Applications of Signals and Systems Fall 2002 Application Areas Control Communications Signal Processing.
STEGANOGRPAHY [APPLICATION – I]
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
A Review on: Spread Spectrum Watermarking Techniques
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
King Fahd University of Petroleum & Minerals  Electrical Engineering Department EE 578 Simulation of Wireless Systems Code Division Multiple Access Transmission.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Applications of Signals and Systems Application Areas Control Communications Signal Processing (our concern)
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Watermarking Matt Elliott Brian Schuette. Overview Goals Methods Comparison Attacks References.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Digital watermarking: algorithms and applications
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Introduction to Audio Watermarking Schemes N. Lazic and P
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Welcome
Robust Data Hiding for MCLT Based Acoustic Data Transmission
Basic Concepts of Audio Watermarking
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
Digital Watermarking for Image Authentication with Localization
Novel Multiple Spatial Watermarking Technique in Color Images
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Secret image sharing with steganography and authentication
Presentation transcript:

Data Hiding within Audio Signals Matthew Wiedemer CSE691 November 20, 2001

Overview  Steganography systems and their goals  Audio stego systems  Autocorrelation modulation scheme

Stego Systems  Data hiding, covert communications  Evade detection Stego Object Transmission EmbeddorExtractor Cover Object Stego Key Embedded Data Stego Key Embedded Data

Basic Stego System Goals  Transparent  Robust Survive compression encoding/decoding Survive attack intended to remove/forge object  Simplicity of embeddor and extractor  High throughput  Low probability of false detection (if using watermarks)

Audio Stego Systems  Add small amount of distortion  Use audio masking: human ear can’t distinguish weak and strong signals at same time Direct sequence spread spectrum – uses audio masking, susceptible to time scale modification Tone insertion – easy to find through frequency analysis Echo insertion – complex extraction, low robustness LSB – low robustness Compression-based – only contains watermark when compressed

Autocorrelation Modulation Scheme  Attains goals of high robustness, high transparency  Complex  Highly configurable

Autocorrelation Modulation System Model Stego Object Transmission EmbeddorExtractor Cover Signal Stego Key Embedded Data Stego Key Embedded Data

Delay or Advance Variable Gain or Attenuation Filter Gain Calculator Cover Signal Filtered Cover Signal Embedded Data Stego Signal Stego Object Transmission EmbeddorExtractor Cover Signal Stego Key Embedded Data Stego Key Embedded Data Embeddor *multiple difference signal components may be used **stego key is set of coefficients, constants used in block equations

Stego Object Transmission EmbeddorExtractor Cover Signal Stego Key Embedded Data Stego Key Embedded Data System Model Continued

Extractor Short-Term Integrator Filter Normalization Filtered Signal Stego Signal Delay Short-Term Integrator |*|² Regenerator Embedded Data

Conclusion  Designing a robust, secure, transparent, lossless stego system is difficult and complex; requires significant signal processing  An ideal solution would satisfy the needs of the music industry  Autocorrelation modulation satisfies these requirements better than any other audio stego/watermarking system available today