Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Robust Invisible Watermarking of Volume Data Y. Wu 1, X. Guan 2, M. S. Kankanhalli 1, Z. Huang 1 NUS Logo 12.
Steganography and Watermarks Trust and Reputation.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
N-Secure Fingerprinting for Copyright Protection of Multimedia
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Fifth International Conference on Information
1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Spread Spectrum Steganography
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Digital Watermarking Parag Agarwal
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Media Protection Media Encryption Media Watermark Media Protection Media Encryption Media Watermark Lesson 10.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Watermarking Text Document Images Using Edge Direction Histograms Young-Won Kim and Il-Seok Oh Pattern Recognition Letters, Vol. 25, 2004, pp – 1251.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Robust Undetectable Interference Watermarks Ryszard Grząślewicz.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
3D mesh watermarking Wu Dan Introduction Spatial domain (00 EG) Transformed domain (02 EG) K=D-A; (D ii is a degree of vertex v i, A is an.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Introduction to Audio Watermarking Schemes N. Lazic and P
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
A review of audio fingerprinting (Cano et al. 2005)
Robust Data Hiding for MCLT Based Acoustic Data Transmission
DONE BY S.MURALIRAJAN M.NIRMAL
QR Code Authentication with Embedded Message Authentication Code
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Source: Pattern Recognition Letters, Article In Press, 2007
Authors: J.J. Murillo-Fuentes
Audio Watermarking for Copyright Protection
Digital Watermarking Lecture 2
Presentation transcript:

Audio Watermarking Denis Lebel presented by

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction Introduction Systems Systems Techniques Techniques Applications Applications Discussion Discussion References References

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 3 / 13 Introduction Idea: Embedding an inaudible mark into an audio signal Idea: Embedding an inaudible mark into an audio signal Originally proposed as a technique to counter music piracy Originally proposed as a technique to counter music piracy Analogical to the technique used for paper (e.g., money) Analogical to the technique used for paper (e.g., money) First audio watermarking techniques were directly inspired from previous research on image watermarking First audio watermarking techniques were directly inspired from previous research on image watermarking

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 4 / 13 Introduction Fingerprinting vs Watermarking Fingerprinting vs Watermarking Fingerprinting analyzes the signal and constructs a unique signature Fingerprinting analyzes the signal and constructs a unique signature  Signal is not modified  Requires a repository  No preprocessing required Watermarking hides information in the audio signal Watermarking hides information in the audio signal  Signal is altered  Self-contained  Signal must be preprocessed

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 5 / 13 Watermarking Systems Devices or systems should check for watermark before proceeding with operations Devices or systems should check for watermark before proceeding with operations A detection mechanism is required A detection mechanism is required A key (as in cryptography) is generally used during construction and detection A key (as in cryptography) is generally used during construction and detection Symmetric (same key) Symmetric (same key)  Both construction and detection use a private key Asymmetric (different keys) Asymmetric (different keys)  Construction uses a private key and detection uses a public key Watermark is permanent. Audio data can still be used. Watermark is permanent. Audio data can still be used. Contrasts with encryption: temporary and content only usable when decrypted Contrasts with encryption: temporary and content only usable when decrypted

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 6 / 13 Watermarking Systems Properties Properties Inaudibility:No sound quality degradation Inaudibility:No sound quality degradation Robustness:Resistance to ANY signal transformation Robustness:Resistance to ANY signal transformation Capacity:Bit rate Capacity:Bit rate Reliability:Error rate during detection Reliability:Error rate during detection Low Complexity:Efficiency Low Complexity:Efficiency

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 7 / 13 Watermarking Systems Psychoacoustic models are often used to ensure inaudibility Psychoacoustic models are often used to ensure inaudibility Figure 2: Watermarking shaping example. (Kim 2003)Figure 1: Masking curve example. (Kim 2003)

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 8 / 13 Techniques Spread-Spectrum Spread-Spectrum Spreads pseudo-random sequence across time-domain signal or transform signal Spreads pseudo-random sequence across time-domain signal or transform signal Pseudo-random sequence is generated using a secret key Pseudo-random sequence is generated using a secret key Watermark is embedded as a modulation of pseudo-random sequence Watermark is embedded as a modulation of pseudo-random sequence Watermark is scaled according to a psychoacoustic model Watermark is scaled according to a psychoacoustic model Figure 4: Spread-spectrum scheme. (Kim 2003)

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 9 / 13 Techniques Replica Replica Uses the original signal itself to create the watermark Uses the original signal itself to create the watermark Example:Echo Hiding Example:Echo Hiding  Introduce echo in time domain  Watermark bit values are embedded using 2 different delay values  Detection finds delay length used to determine watermark  Masking is used Could also be done in frequency domain Could also be done in frequency domain  Example: Frequency shifting

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 10 / 13 Techniques Self-Marking Self-Marking Embed special signal in the audio Embed special signal in the audio Example:Embedding a peak in frequency domain Example:Embedding a peak in frequency domain Two-Set Two-Set Statistical method based on hypothesis testing and relying on large data sets Statistical method based on hypothesis testing and relying on large data sets Pseudo-random process to insert a certain statistic into the audio signal Pseudo-random process to insert a certain statistic into the audio signal Usually applied in frequency domain Usually applied in frequency domain Example:Patchwork Algorithm Example:Patchwork Algorithm

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 11 / 13 Applications Copyrights Copyrights Proof of ownership Proof of ownership Enforcement of usage policy Enforcement of usage policy Forensic watermarking Forensic watermarking Fragile watermarking Fragile watermarking Fingerprint watermarking Fingerprint watermarking Information hiding Information hiding Added value Added value Annotation Annotation

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 12 / 13 Discussion Is watermarking really useful? What could it be used for? Is watermarking really useful? What could it be used for? What could be done for copyright protection? What could be done for copyright protection?

MUMT-611: Music Information Acquisition, Preservation, and Retrieval 13 / 13 References Gomes, L., P. Cano, E. Gomez, M. Bonnet, and E. Battle Audio watermarking and fingerprinting: For which applications? Journal of New Music Research 32 (1): 65–81. Gomes, L., P. Cano, E. Gomez, M. Bonnet, and E. Battle Audio watermarking and fingerprinting: For which applications? Journal of New Music Research 32 (1): 65–81. Craver, S., M. Wu, and B. Liu What can we reasonably expect from watermarks? IEEE Workshop on the Applications of Signal Processing to Audio and Acoustics. 223–6. Craver, S., M. Wu, and B. Liu What can we reasonably expect from watermarks? IEEE Workshop on the Applications of Signal Processing to Audio and Acoustics. 223–6. Kim, H, Y. Choi, J. Seok, and J. Hong Audio watermarking techniques. In Intelligent watermarking techniques, edited by J. Pan, H. Huang, and L. Jain, 185–219. River Edge, N.J.: World Scientific. Kim, H, Y. Choi, J. Seok, and J. Hong Audio watermarking techniques. In Intelligent watermarking techniques, edited by J. Pan, H. Huang, and L. Jain, 185–219. River Edge, N.J.: World Scientific.