SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
AUDIO WATERMARKING AND
STEGANOGRAPHY
Anirudh Shekhawat
Manan Shah
Prateek Srivastava
Pratik Poddar



Guided by: Prof. Bernard Menezes
DIGITAL WATERMARKING
 Embedding perceptually transparent data in
  digital media
 Watermark can be detected and retrieved by a
  computer algorithm
 Applications include broadcast monitoring,
  fingerprinting, copyright protection and
  steganography
STEGANOGRAPHY
 Steganography literally means "secret writing”
 Hiding data in a digital media

 Avoids the suspicion and scrutiny an encrypted
  message would arouse
 Applications include "covert communication”

 Examples from history - Invisible ink, Scalp
  tattoo, Pinholes
APPLICATIONS
COPYRIGHT PROTECTION
 Ownership information can be embedded in the
  media
 Presence of the watermark can be demonstrated
  to prove ownership
 The watermark must survive compression
FINGERPRINTING
 Embedding a serial number in each copy of a
  media before distribution
 Can be used to trace down the originator of a
  particular illegal copy of media
 The watermark must be secure against attacks
BROADCAST MONITORING
 Programs and advertisements broadcasted can be
  monitored by an automated system
 Illegal broadcasts can be identified by monitoring
  satellite nodes
 High Bit rate and low complexity are required
COVERT COMMUNICATION
 Embedding data such that existence of a
  watermark cannot be detected
 Aimed at protecting the sender and receiver
  rather than the message
 Terrorists have been reported to hide messages
  in images to communicate
CHARACTERISTICS OF A
WATERMARKING ALGORITHM
PERCEPTUAL TRANSPARENCY
 Primary requirement in watermarking
 Watermark should be imperceptible to human
  auditory system
 Watermarking is more difficult for audio as
  compared to images
WATERMARK BIT RATE
 Represented in bits per second (bps)
 Required rates vary across applications (0.5 bps
  in copyright protection and 15 bps in broadcast
  monitoring)
 Attainable values depend upon level of
  compression of audio
ROBUSTNESS
 The ability of the watermark to survive common
  signal processing manipulations
 Required against a predefined set of
  manipulations
 Required in some applications (radio broadcast
  monitoring) but not at all required in some
  (tampering detection)
BLIND AND INFORMED DETECTION
 Informed: with access to original(host) audio
 Blind: without access to original audio

 Informed techniques are more secure

 Examples
     Blind: Tampering detection, Information Carrier
     Informed: Steganography
SECURITY
 Adversary must not be able to detect the
  existence of embedded data
 Not be able to extract or modify the data without
  the secret key
 In some cases the watermark is encrypted before
  being embedded
ALGORITHMS AND DEMO
1) LEAST SIGNIFICANT BIT ENCODING
 Watermark added in the least significant bit of
  amplitude
 Easy to embed and retrieve

 High bit rate

 Low robustness
WATERMARKING, COMPRESSION &
REDUNDANCY
 Lossy compression destroys watermark.
 To make watermark robust against compression,
  we need sufficient redundancy
 LSB encoding: Robustness vs Imperceptibility?



 LSB Watermarking in JPEG done 
 Possible for MP3?
2) PHASE MODULATION
 Embed watermark by modulating phase in host
  audio
 Robust against signal processing manipulations

 Extraction or detection of watermark needs
  original audio
 Suitable for applications where security and
  robustness are important, e.g. copyright
  protection
3) FREQUENCY DOMAIN STEGANOGRAPHY
 Shanon Sampling theorem
 Sampling rate for CD is 44.1KHz    the highest
  frequency is 18KHz
 Average peak frequency which a human can hear
  is 18Khz

       22 – 18 = 4KHz band goes unused
UNDERLYING PRINCIPLE
   Use the 18Khz - 22KHz frequency band to hide
    the message


    Message
    signal



                                           Base
                                           signal




                   Fig : Combined Signal
MERITS AND DEMERITS

   Merits
      Longer message can be hidden in a given base
     Less likely to be affected by errors during
      transmission


   Demerits
     Message signal has limited frequency range
     Low recovery quality
4) ECHO HIDING
   Embeds data by introducing “echo” in the original
    signal.




   Resilient to lossy data compression algorithms.
ECHO ENCODING AND DECODING



                             Encoding




                             Decoding
THE END.. QUESTIONS?
REFERENCES
   Juergen Seitz, Digital Watermarking for Digital Media, ISBN
    159140519X, 2005, Information Resources Press, Arlington, VA,
    USA

   Nedeljko Cvejic, Algorithms for audio watermarking and
    steganography, ISBN 9514273834, 2004, Oulu University Press,
    Oulu

   C.H. Yeh & C.J Kuo, Digital watermarking through quasi m-arrays,
    Proceedings of the IEEE Workshop on Signal Processing Systems
    1999, 456-461

   Guy Belloch, Introduction to Data Compression, Draft version,
    Algorithms in the real world

   Kuo S, Johnston J, Turin W & Quackenbush S Covert audio-
    watermarking using perceptually tuned signal independent
    multiband phase modulation, IEEE International Conference on
    Acoustics, Speech, and Signal Processing 2002, 1753-1756
REFERENCES
    Foo, S.W., Yeo, T.H., & Huang, D.Y. (2001). An adaptive audio
    watermarking system. Proceedings of the IEEE Region 10
    International Conference on Electrical and Electronic Technology,
    509–513.


   Huang, D.Y., & Yeo, Y.H. (2002). Robust and inaudible multi-echo
    audio watermarking. Proceedings of the IEEE Pacific-Rim Conference
    on Multimedia, 615–622.


   Bender, W., Gruhl D. Echo Hiding, International Workshop on
    Information Hiding, 1996.

Contenu connexe

Tendances

Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Watermark
WatermarkWatermark
Watermarkravi33s
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarkingBharath
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data Sanjay Bhoyar
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking reportdivya sri
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . . digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . . Praneeth Kumar
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Ketan Patil
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 

Tendances (20)

Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Watermark
WatermarkWatermark
Watermark
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
CSE digital Watermarking report
CSE digital Watermarking reportCSE digital Watermarking report
CSE digital Watermarking report
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Multimedia compression
Multimedia compressionMultimedia compression
Multimedia compression
 
digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . . digital-watermarking-and-steganography syllabus . . . . . . .
digital-watermarking-and-steganography syllabus . . . . . . .
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)Graphical Based Authentication (S3PAS)
Graphical Based Authentication (S3PAS)
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

En vedette (13)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Steganography
SteganographySteganography
Steganography
 
File000133
File000133File000133
File000133
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
SteganographySteganography
Steganography
 

Similaire à Audio Watermarking and Steganography

Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals pptjackkhush
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applicationsIAEME Publication
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxAyushJaiswal781174
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumCSCJournals
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfKalyan Anugu
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcsandit
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYcscpconf
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingTELKOMNIKA JOURNAL
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...INFOGAIN PUBLICATION
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 

Similaire à Audio Watermarking and Steganography (20)

Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
 
40120130406010 2-3-4-5-6
40120130406010 2-3-4-5-640120130406010 2-3-4-5-6
40120130406010 2-3-4-5-6
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
 

Plus de Pratik Poddar

Guide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansGuide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansPratik Poddar
 
Art of Puzzle Solving
Art of Puzzle SolvingArt of Puzzle Solving
Art of Puzzle SolvingPratik Poddar
 
Clipr rodinhood openhouse
Clipr rodinhood openhouseClipr rodinhood openhouse
Clipr rodinhood openhousePratik Poddar
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based EncryptionPratik Poddar
 
Non-convex Optimization in Networks
Non-convex Optimization in NetworksNon-convex Optimization in Networks
Non-convex Optimization in NetworksPratik Poddar
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSAPratik Poddar
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony OptimizationPratik Poddar
 

Plus de Pratik Poddar (10)

Guide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansGuide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITians
 
Art of Puzzle Solving
Art of Puzzle SolvingArt of Puzzle Solving
Art of Puzzle Solving
 
Clipr Introduction
Clipr IntroductionClipr Introduction
Clipr Introduction
 
Clipr rodinhood openhouse
Clipr rodinhood openhouseClipr rodinhood openhouse
Clipr rodinhood openhouse
 
Grad School101
Grad School101Grad School101
Grad School101
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
Non-convex Optimization in Networks
Non-convex Optimization in NetworksNon-convex Optimization in Networks
Non-convex Optimization in Networks
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Audio Watermarking and Steganography

  • 1. AUDIO WATERMARKING AND STEGANOGRAPHY Anirudh Shekhawat Manan Shah Prateek Srivastava Pratik Poddar Guided by: Prof. Bernard Menezes
  • 2. DIGITAL WATERMARKING  Embedding perceptually transparent data in digital media  Watermark can be detected and retrieved by a computer algorithm  Applications include broadcast monitoring, fingerprinting, copyright protection and steganography
  • 3. STEGANOGRAPHY  Steganography literally means "secret writing”  Hiding data in a digital media  Avoids the suspicion and scrutiny an encrypted message would arouse  Applications include "covert communication”  Examples from history - Invisible ink, Scalp tattoo, Pinholes
  • 5. COPYRIGHT PROTECTION  Ownership information can be embedded in the media  Presence of the watermark can be demonstrated to prove ownership  The watermark must survive compression
  • 6. FINGERPRINTING  Embedding a serial number in each copy of a media before distribution  Can be used to trace down the originator of a particular illegal copy of media  The watermark must be secure against attacks
  • 7. BROADCAST MONITORING  Programs and advertisements broadcasted can be monitored by an automated system  Illegal broadcasts can be identified by monitoring satellite nodes  High Bit rate and low complexity are required
  • 8. COVERT COMMUNICATION  Embedding data such that existence of a watermark cannot be detected  Aimed at protecting the sender and receiver rather than the message  Terrorists have been reported to hide messages in images to communicate
  • 10. PERCEPTUAL TRANSPARENCY  Primary requirement in watermarking  Watermark should be imperceptible to human auditory system  Watermarking is more difficult for audio as compared to images
  • 11. WATERMARK BIT RATE  Represented in bits per second (bps)  Required rates vary across applications (0.5 bps in copyright protection and 15 bps in broadcast monitoring)  Attainable values depend upon level of compression of audio
  • 12. ROBUSTNESS  The ability of the watermark to survive common signal processing manipulations  Required against a predefined set of manipulations  Required in some applications (radio broadcast monitoring) but not at all required in some (tampering detection)
  • 13. BLIND AND INFORMED DETECTION  Informed: with access to original(host) audio  Blind: without access to original audio  Informed techniques are more secure  Examples  Blind: Tampering detection, Information Carrier  Informed: Steganography
  • 14. SECURITY  Adversary must not be able to detect the existence of embedded data  Not be able to extract or modify the data without the secret key  In some cases the watermark is encrypted before being embedded
  • 16. 1) LEAST SIGNIFICANT BIT ENCODING  Watermark added in the least significant bit of amplitude  Easy to embed and retrieve  High bit rate  Low robustness
  • 17. WATERMARKING, COMPRESSION & REDUNDANCY  Lossy compression destroys watermark.  To make watermark robust against compression, we need sufficient redundancy  LSB encoding: Robustness vs Imperceptibility?  LSB Watermarking in JPEG done   Possible for MP3?
  • 18. 2) PHASE MODULATION  Embed watermark by modulating phase in host audio  Robust against signal processing manipulations  Extraction or detection of watermark needs original audio  Suitable for applications where security and robustness are important, e.g. copyright protection
  • 19. 3) FREQUENCY DOMAIN STEGANOGRAPHY  Shanon Sampling theorem  Sampling rate for CD is 44.1KHz the highest frequency is 18KHz  Average peak frequency which a human can hear is 18Khz 22 – 18 = 4KHz band goes unused
  • 20. UNDERLYING PRINCIPLE  Use the 18Khz - 22KHz frequency band to hide the message Message signal Base signal Fig : Combined Signal
  • 21. MERITS AND DEMERITS  Merits  Longer message can be hidden in a given base  Less likely to be affected by errors during transmission  Demerits  Message signal has limited frequency range  Low recovery quality
  • 22. 4) ECHO HIDING  Embeds data by introducing “echo” in the original signal.  Resilient to lossy data compression algorithms.
  • 23. ECHO ENCODING AND DECODING Encoding Decoding
  • 25. REFERENCES  Juergen Seitz, Digital Watermarking for Digital Media, ISBN 159140519X, 2005, Information Resources Press, Arlington, VA, USA  Nedeljko Cvejic, Algorithms for audio watermarking and steganography, ISBN 9514273834, 2004, Oulu University Press, Oulu  C.H. Yeh & C.J Kuo, Digital watermarking through quasi m-arrays, Proceedings of the IEEE Workshop on Signal Processing Systems 1999, 456-461  Guy Belloch, Introduction to Data Compression, Draft version, Algorithms in the real world  Kuo S, Johnston J, Turin W & Quackenbush S Covert audio- watermarking using perceptually tuned signal independent multiband phase modulation, IEEE International Conference on Acoustics, Speech, and Signal Processing 2002, 1753-1756
  • 26. REFERENCES  Foo, S.W., Yeo, T.H., & Huang, D.Y. (2001). An adaptive audio watermarking system. Proceedings of the IEEE Region 10 International Conference on Electrical and Electronic Technology, 509–513.  Huang, D.Y., & Yeo, Y.H. (2002). Robust and inaudible multi-echo audio watermarking. Proceedings of the IEEE Pacific-Rim Conference on Multimedia, 615–622.  Bender, W., Gruhl D. Echo Hiding, International Workshop on Information Hiding, 1996.