SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
        INTERNATIONAL JOURNAL OF ELECTRONICS AND
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 4, Issue 2, March – April, 2013, pp. 109-115
                                                                           IJECET
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2013): 5.8896 (Calculated by GISI)               ©IAEME
www.jifactor.com




              DIGITAL AUDIO WATERMARKING APPLICATIONS
                           AND TECHNIQUES

                                   G. B. Khatri1, D. S. Chaudhari2
                         1
                             (Department of EXTC, GCOE, Amravati, India)
                         2
                             (Department of EXTC, GCOE, Amravati, India)


   ABSTRACT

           Digital audio watermarking is nowadays gaining popularity among the original audio
   content producers. It provides a way to the owner to prove ownership by using watermark
   which forms integral part of audio. An approach is made in this paper to collectively
   introduce applications and techniques up till developed for audio watermarking.The
   proposedalgorithm is based on wavelet transform which has efficient computational load and
   also on cosine transform for increasing the watermark embedding capacity.

   Keywords: Watermark, audio, DFT, DCT, DWT, and DSSS.

   I. INTRODUCTION

           Production, storage, distribution of digital multimedia data is very easy. Hence
   itcreates the problem of protecting the intellectual copyrights. The copyrighted digital
   multimedia data is pirated without notification to the owner. Digital watermarking is a
   technique to embed the owner information as a copyright material in the digital data as a
   proof of ownership.Watermark as the name suggest is as transparent as water when
   watermark data is embedded in the original audio .Watermarking performance can be judged
   on parameters like imperceptibility, robustness, efficiency, and embedding capacity. A
   watermarking technique must achieve high performance without degrading the cover signal
   [1].
           Digital watermarking can be applied to image, audio or video and the watermark data
   can be an image, audio and text.Generally there is less attention towards audio watermarking
   because HAS (human auditory system) is more sensitive than HVS (human visual system)
   and human ears can easily detect the presence of the watermark as low as one part in ten
   million [2].


                                                109
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

          This paper presents an overview on applications and techniques of digital audio
  watermarking. Section II describes the digital audio watermarking, section III briefly describes
  four areas of applications whereas in section IV watermarking techniques are discussed with the
  performances of each and in section V new algorithm is proposed.

  II. DIGITAL AUDIO WATERMARKING

          Digital audio watermarking is a technique of embedding watermark data such as image,
  audio and text in the original audio stream to create copyrighted watermarked audio. Audio
  watermarking application areas include such as vendor identification, evidence of proprietorship,
  validation of genuineness, copy protection, etc. [3]
          Audio watermarking techniques can be grouped as; time-domain, frequency (transform)
  domain, spread-spectrum, patchwork [1,4]. The performances of the techniques are judged with
  respect to the robustness and imperceptibility (inaudibility) of audio watermarking. Inaudibility
  means the watermarked audio and original audio must be identical in nature to listen. Robustness
  means the resistance of the watermark against removal or degradation. The watermark should
  survive intentional attacks such as random cropping,noise addition, requantization, resampling,
  compression, filtering and its removal should degrade original audio.

  III. AUDIO WATERMARKING APPLICATIONS

          Watermarking serves various applications and each application puts desirable feature
  necessity on the watermarking technique. Hence the watermarking technique to be used depends
  on the area of application [3]. Thus a variety of applications are discussed below,

  1) Vendor Identification –
          Text form of copyright notices occurs on the packaging of copyrighted materials. This
  type of protection does not prove sufficient as it would be easily removed. Digital audio
  watermarking can be used to embed copyright notice in the audio signal itself. As notice forms an
  integrated part of audio one can determine the vendor of the copyrighted audio.

  2) Evidence of Proprietorship –
          One can prove its proprietorship in the case of copyright dispute.The original owner can
  prove its proprietorship by extracting the watermark copyright information from the watermarked
  audio, in the case when another person tries to sell the copyrighted material on behalf of his name
  by pirating it.

  3) Validation of Genuineness –
          The copyrighted audio is genuine or not, can be proved very easily by the use of
  watermarking. A signature or copyright watermark is embedded in the audiothus anyone trying to
  modify the watermarked audio, modification also applies to the watermark because watermark
  forms integral part of audio. Hence one can prove genuineness of copyrighted audio by extracting
  exact copy of the watermark.

  4) Copy Protection –
           The above mentioned applications do not putrestrictionson the illegal copying. Owner can
  restrict the illegal copying or the numbers of copies permitted by the use of special watermarking
  algorithms. One such method is modified patchwork algorithm (MPA) developed by Yeo and
  Kim [4].


                                                 110
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

  IV. AUDIO WATERMARKING TECHNIQUES

         Though audio watermarking techniques are few in numbers they can be categorised
  majorly into four groups viz. time domain, frequency domain, spread spectrum and
  patchwork. These techniques are discussed one by one along with their performances.

  1) Time-domain techniques –
          It includes the least significant bit (LSB) substitution, echo hiding and quantization
  techniques. In time-domain techniques parameters of signal samples like amplitude, masking
  of samples with lower amplitude by higher amplitude samples, samples LSB are varied to
  attain embedding of watermark.The time-domain audio watermarking is relatively easy to
  implement, and requires few computing resources, however, it is weak against signal
  processing attacks such as compression and filtering.This type of techniques suffers from
  problems like low watermark data embedding capacity, easily detectable by the attacker, easy
  to decode watermark from cover audio.
          LSB technique is the simplest technique in which watermark datais embedded in the
  least significant bits of the audio sample values. It provides easy data embedding and
  extracting algorithms. As the information contained in the LSB is less, it is replaced by the
  data of the watermark without producing the noticeable effect in the cover audio signal. The
  cover audio signal degrades as the number of watermark bits is increased. A maximum of 3
  watermark bits per 16 bits of audio sample is allowed for imperceptibility. If above 3 bits per
  audio sample is embedded distortions like noise are introduced and human auditory system
  begins to detect the noise introduced by the watermark. Cvejic N. and Seppanen T. have tried
  to increase the capacity from 3bits/sample to 4bits/sample without degrading the
  watermarked audio signal to noise ratio by using a three step technique. In this degradation in
  SNR of the watermarked audio is minimised by using minimum error replacement and error
  diffusion steps.
          Echo-hiding watermarking embeds information into the original discrete audio signal
  by introducing a repeated version of anoriginal sample of the audio signal with some delay
  and decay rate so as to make it undetectable [6]. Only binary information in the form of bits
  is embedded in the audio signal. Digital data is embedded by using four main parameters of
  echo: initial value, decay rate and different offset for 1 and 0. The offset is made so small
  such that the human ear cannot detect the presence of echo. Embedding is done by
  convolving the audio signal with the all 0 and all 1 kernel, then by using watermark data bits
  particular outputs are combined to form watermarked signal. Extraction is done by taking
  autocorrelation of cepstrum of the watermarked audio.Autocorrelation gives the power of
  signals at various shifts. With particular shifts in it one can easily determine the bit
  embedded. The watermark dataembedding rate is given as 16 bps (bits per second), while it
  can vary in the range 2 – 64 bps and it depends on the sampling rate and the signal type to be
  echoed.
          In the technique of quantization original sample of audio is replaced with the
  modified audio sample. The modified audio sample is defined as below,

                                        ‫ ݍ‬ሺ‫ܣ ,ݔ‬ሻ ൅       , ݂݅ ݀ܽ‫1 ݏ݅ ݐܾ݅ ܽݐ‬
                                                     ஺

                                 ‫ݕ‬ൌቐ                 ସ
                                        ‫ ݍ‬ሺ‫ܣ ,ݔ‬ሻ െ ସ , ݂݅ ݀ܽ‫0 ݏ݅ ݐܾ݅ ܽݐ‬
                                                     ஺                                       (1)




                                               111
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

         Where q(.) is quantization function and Ais quantization step. The quantization
  function is given as,

                                        ‫ݍ‬ሺ‫ܣ ,ݔ‬ሻ ൌ ሾ‫ܣ⁄ݔ‬ሿ. ‫ܣ‬                                    (2)

         Where [x/A] is rounded to nearest integer. Thus in a single sample of audio signal one
  can embed only one bit of watermark. Hence a blind detection can be applied for watermark
  data extraction. Extraction can be done by following equation,

                                        1 , ݂݅     0 ൏ ‫ ݕ‬െ ‫ݍ‬ሺ‫ܣ ,ݔ‬ሻ ൏ ‫4/ܣ‬
                                 ܾൌ൜
                                        0 , ݂݅ െ ‫ 4/ܣ‬൏ ‫ ݕ‬െ ‫ݍ‬ሺ‫ܣ ,ݔ‬ሻ ൏ 0
                                                                                              (3)

         This technique is simple and easy to implement and is robust to noise as long as the
  noise margin is below A/4. While the technique is easy but the watermark embedding
  capacity is very less.

  2) Frequency domain techniques –
          Frequency domain audio watermarking techniques generally include transforms like
  discrete Fourier transform (DFT), the discrete cosine transform (DCT), and the discrete
  wavelet transform (DWT). It takes the advantage of masking of different tones of human
  auditory system (HAS) for effective watermarking. In this the original audio signal is
  transformed into frequency domain by using any one of the above mentioned transforms and
  then the watermark is either added or replaced in the magnitude or phase response. After that
  the watermarked audio is applied inverse transform to obtain the watermarked audio in time
  domain.
          Discrete Fourier transform decomposes the signal into its fundamental and
  harmonically related sinusoidal frequencies. The human ears sensitivity declines after the
  peak sensitivity around 1 kHz. Magnitude response coefficients are replaced by the
  watermark data in the frequency range of 2.4 – 6.4 kHz [7]. Also the human ears are
  insensitive to the absolute phase of the audio frequency;hence the phase difference between
  the phase signal coefficient and phase reference coefficient is used to modify the phase signal
  coefficient. Phase difference has to be added or subtracted when the watermark data bit is 1
  or 0 respectively [8].
          Discrete cosine transform is similar to the discrete Fourier transform except that its
  coefficients are real valued. Properties of DCT such as high compaction of signal energy in
  transform domain, highly decorrelated coefficients are used to embed data in the transform
  domain.
          Discrete wavelet transform is nowadays gaining popularity because it can decompose
  the signal in time and frequency at the same time while keeping the calculations to obtain
  DWT coefficientssmall as compared to DFT and DCT. Several advantages of applying DWT
  on audio signal are given by Wu and Huang such as 1) It is able to localize the audio in time-
  frequency both with multi-resolution property, 2) variable decomposition levels are available,
  3) less number of operations than DFT and DCT [9]. If there are N samples in the audio then
  number of operations in DFT, DCT and DWT are O(N·log2(N)), O(N·log2(N)) and O(L·N)
  respectively, where L is the length of wavelet filter.A data payload capacity of 172 bps is
  achieved by embedding the self-synchronised watermark data in the wavelet domain without
  degrading the SNR too much[9].

                                               112
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
        ional
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

  3) Spread-spectrum technique –
         It involves embedding of watermark in the original audio signal by spreading it over
  the bandwidth of audio signal[6 This technique utilizes DSSS (Direct Sequence Spread
                                 6].
  Spectrum) method of spread spectrum Encoding of watermark in the audio is shown in
                               spectrum.
  Figure 1.




                        Fig. 1 Direct sequence spread spectrum encoding

        In DSSS PN-sequence in used to spread the watermark data in the whole frequency
                       sequence
  range of audio and then added to the audio signal by proper attenuation, so that the
                           n
  watermark data is treated as additive random noise.Same sequence is again used to extract the
  watermark data by performing correlationbetween watermarked audio and PN-sequence.
                                                                           PN sequence.

  4) Patchwork technique –
           This technique was first proposed for image watermarking and it is a pseudorandom
  statistical approach [6]. The idea is to select two subsets (patch) of thecover signal and in
                          .
  order to embed the watermark, the sample values of these two subsets are moved in opposite
  directions by a constant valued, which defines the watermark strength and watermark bit. The
                                  ,                                        d            bit
  imperceptibility of watermark in cover signal depends on value of d. Decoding is performed
  by taking the difference of the means of these two subsets and making decision based on the
                       nce
  obtained value. The assumption in this method is that the difference of the means of the two
  patches is zero for the original cover signal and is nonzero for the watermarked cover
                                                              zero
  signal.As two subsets (patch) are used this technique can extract the watermark without the
         .As
  original cover signal.
           Yeo and Kim have proposed a modification on the patchwork technique [4]. They
  have embedded the watermark data bit in the two subsets taken from DCT domain of original
  audio signal. The use of transform domain for embedding watermark makes the technique
  more robust against signal processing attacks such as down-sampling, equal
                                                                 down sampling, equalization,
  compression, filtering.

  V. PROPOSED ALGORITHM

          As observed from the above techniques that transform domain are more secure than
  time domain. In these models are suggested for embedding and extracting the watermark data
  in and out of audio signal. These models utilize the discrete wavelet transform for speedily
                                 se
  and efficiently transforming audio in time-frequency domain, while using discrete cosine
                                         time frequency
  transform to decorrelate and compress watermark image.
          Transformed watermark image coefficients must be normalised and multiplied with
  an attenuation constant before embedding. Attenuating the coefficients helps to keep noise
  level low in the audio signal. Since watermark image is compressed using discrete cos cosine


                                              113
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

  transform less number of transform coefficients are used for embedding and this improves the
  signal to noise ratio and also the watermark data embedding capacity.
          Discrete wavelet transform is used to transform the audio signals into frequency sub
  bands. These sub bands are called as approximate or detail frequencysub bands. Any one of
  this frequency band can be used to embed watermark.
          This algorithm is based on emerging wavelet transform and cosine transform for
  embedding and extracting watermark in audio signal, hence it will possess characteristics
  such ashigh signal-to-noise ratio (SNR) of watermarked audio, high data payload capacity i.e.
  number of watermark bits per second of audio signal, low computational complexity.

  VI. CONCLUSION

          Several algorithms are discussed for digital audio watermarking. These algorithms
  suffer from problems like intentional or unintentional attacksby means of signal processing.
  Lacunas such as unblind detection, less embedding capacity, resistance to various types of
  attacks also occurs.The proposed algorithm can overcome problems in existing techniques
  discussed while at the same time can achieve high performance with less computational cost.

  REFERENCES

  [1] Al-Haj A., Mohammad A., Bata L., “DWT based Audio Watermarking,” The
      International Arab Journal of Information Technology, vol. 8, no. 3, pp. 326 – 333, 2011.
  [2] Gruhl D., Lu A., Bender W., “Echo Hiding,” in Proceedings of the International
      Conference on Info Hiding, pp. 295 – 315, 1996.
  [3] Cox I., Miller M., Bloom J., “Watermarking applications and their properties,”
      International. Conference on Information Technology, Las Vegas, pp. 1 – 5, 2000.
  [4] Yeo I. and Kim H., “Modified PatchworkAlgorithm: A Novel Audio Watermarking
      scheme,” IEEE Transactions on Speech and Audio Processing, vol. 11, no. 4,
      pp. 381 – 386, 2003.
  [5] Cvejic N., Seppanen T., “Increasing the Capacity of LSB-Based Audio Steganography,”
      in Proceedings of the IEEE International Workshop on Multimedia Signal Processing, pp.
      336 – 338, 2002.
  [6] Bender W., Gruhl D., Morimoto N., Lu A., “Techniques for data hiding,” IBM Systems
      Journal, vol. 35, no. 3 and 4, pp. 313–336, 1996.
  [7] Tilki J. F., Beex A. A., “Encoding a Hidden Digital Signature onto an Audio Signal Using
      Psychoacoustic Masking, ”7th International Conference on Signal Processing Applications
      & Technology, Boston MA, pp. 476 – 480, 1996.
  [8] Tilki J. F., Beex A. A., “Encoding a Hidden Auxiliary Channel onto a Digital
      AudioSignal using Psychoacoustic Masking,” IEEE Southeastcon, Blacksburg, VA, pp.
      331 – 333, 1997.
  [9] Wu S., Huang J., “Efficiently Self-Synchronized Audio Watermarking for Assured Audio
      Data Transmission,” IEEE Transactions on Broadcasting, vol. 51, no. 1, pp. 69 – 75,
      2005.
  [10] Karimella Vikram, Dr. V.Murali Krishna, Dr. Shaik Abdul Muzeer and
      Mr. K. Narasimha, “Invisible Water Marking Within Media Files Using State-of-The-Art
      Technology” International Journal of Computer Engineering & Technology (IJCET),
      Volume 3, Issue 3, 2012, pp. 1 - 8, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.


                                              114
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

  AUTHORS’ INFORMATION


                 Govind B. Khatri is pursuing M.Tech. in Electronic System and
               Communication from Government College of Engineering, Amravati
               (Autonomous Institute of M.S.). He received his B.E. in Electronics and
               Telecommunication from H.V.P.M.’s College of Engineering & Technology in
               2011. He also received Diploma in Electronics and Communication from
               Government Polytechnic, Amravati (Autonomous Institute of M.S.) in year
  208. His area of interest includes Digital Signal Processing, Wavelet Processing, Digital
  Watermarking, and HDL with FPGA.


                 Dr. Devendra S. Chaudhari obtained BE, ME, from Marathwada
                  University, Aurangabad and PhD from Indian Institute of Technology,
                  Bombay, Mumbai. He has been engaged in teaching, research for period of
                  about 25 years and worked on DST-SERC sponsored Fast Track Project for
                  Young Scientists. He has worked as Head Electronics and
                  Telecommunication, Instrumentation, Electrical, Research and in charge
  Principal at Government Engineering Colleges. Presently he is working as Head, Department
  of Electronics and Telecommunication Engineering at Government College of Engineering,
  Amravati. He has published research papers and presented papers in international conferences
  abroad at Seattle, USA and Austria, Europe. He worked as Chairman / Expert Member on
  different committees of All India Council for Technical Education, Directorate of Technical
  Education for Approval, Graduation, Inspection, Variation of Intake of diploma and degree
  Engineering Institutions. As a university recognized PhD research supervisor in Electronics
  and Computer Science Engineering he has been supervising research work since 2001. One
  research scholar received PhD under his supervision. He has worked as Chairman / Member
  on different university and college level committees like Examination, Academic, Senate,
  Board of Studies, etc. he chaired one of the Technical sessions of International Conference
  held at Nagpur. He is fellow of IE, IETE and life member of ISTE, BMESI and member of
  IEEE (2007). He is recipient of Best Engineering College Teacher Award of ISTE, New
  Delhi, Gold Medal Award of IETE, New Delhi, Engineering Achievement Award of IE (I),
  Nashik. He has organized various Continuing Education Programmes and delivered Expert
  Lectures on research at different places. He has also worked as ISTE Visiting Professor and
  visiting faculty member at Asian Institute of Technology, Bangkok, Thailand. His present
  research and teaching interests are in the field of Biomedical Engineering, Digital Signal
  Processing and Analogue Integrated Circuits.




                                              115

Weitere ähnliche Inhalte

Was ist angesagt?

Digitization of Audio.ppt
Digitization of Audio.pptDigitization of Audio.ppt
Digitization of Audio.ppt
Videoguy
 
DIGITAL SIGNAL PROCESWSING AND ITS APPLICATION
DIGITAL SIGNAL PROCESWSING AND ITS APPLICATIONDIGITAL SIGNAL PROCESWSING AND ITS APPLICATION
DIGITAL SIGNAL PROCESWSING AND ITS APPLICATION
LokeshBanarse
 
Inclusive video conferencing – White paper and guideline document
Inclusive video conferencing – White paper and guideline documentInclusive video conferencing – White paper and guideline document
Inclusive video conferencing – White paper and guideline document
Videoguy
 
Video Conferencing PAGES
Video Conferencing PAGESVideo Conferencing PAGES
Video Conferencing PAGES
Videoguy
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video Forensics
Dipika Sengupta
 
Multimedia tools (sound)
Multimedia tools (sound)Multimedia tools (sound)
Multimedia tools (sound)
dhruv patel
 
I Minds2009 Future Networks Prof Piet Demeester (Ibbt Ibcn U Gent)
I Minds2009 Future Networks  Prof  Piet Demeester (Ibbt Ibcn U Gent)I Minds2009 Future Networks  Prof  Piet Demeester (Ibbt Ibcn U Gent)
I Minds2009 Future Networks Prof Piet Demeester (Ibbt Ibcn U Gent)
imec.archive
 
Interactive media Brief
Interactive media BriefInteractive media Brief
Interactive media Brief
elliotnjones
 
Ac02417471753
Ac02417471753Ac02417471753
Ac02417471753
IJMER
 

Was ist angesagt? (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digitization of Audio.ppt
Digitization of Audio.pptDigitization of Audio.ppt
Digitization of Audio.ppt
 
DIGITAL SIGNAL PROCESWSING AND ITS APPLICATION
DIGITAL SIGNAL PROCESWSING AND ITS APPLICATIONDIGITAL SIGNAL PROCESWSING AND ITS APPLICATION
DIGITAL SIGNAL PROCESWSING AND ITS APPLICATION
 
Inclusive video conferencing – White paper and guideline document
Inclusive video conferencing – White paper and guideline documentInclusive video conferencing – White paper and guideline document
Inclusive video conferencing – White paper and guideline document
 
Video Conferencing PAGES
Video Conferencing PAGESVideo Conferencing PAGES
Video Conferencing PAGES
 
Application of digital_signal_processing_in_audio_processing[1]
Application of digital_signal_processing_in_audio_processing[1]Application of digital_signal_processing_in_audio_processing[1]
Application of digital_signal_processing_in_audio_processing[1]
 
Aichroth audio forensics and automation
Aichroth audio forensics and automationAichroth audio forensics and automation
Aichroth audio forensics and automation
 
Audio and Video Forensics
Audio and Video ForensicsAudio and Video Forensics
Audio and Video Forensics
 
Digital Technology
Digital TechnologyDigital Technology
Digital Technology
 
Basics of speech coding
Basics of speech codingBasics of speech coding
Basics of speech coding
 
Mini Project- Audio Enhancement
Mini Project- Audio EnhancementMini Project- Audio Enhancement
Mini Project- Audio Enhancement
 
Multimedia tools (sound)
Multimedia tools (sound)Multimedia tools (sound)
Multimedia tools (sound)
 
I Minds2009 Future Networks Prof Piet Demeester (Ibbt Ibcn U Gent)
I Minds2009 Future Networks  Prof  Piet Demeester (Ibbt Ibcn U Gent)I Minds2009 Future Networks  Prof  Piet Demeester (Ibbt Ibcn U Gent)
I Minds2009 Future Networks Prof Piet Demeester (Ibbt Ibcn U Gent)
 
SPEECH CODING
SPEECH CODINGSPEECH CODING
SPEECH CODING
 
Multimedia Tech
Multimedia TechMultimedia Tech
Multimedia Tech
 
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
A Survey on Various Techniques used to Add Watermark to Multimedia Data for D...
 
Interactive media Brief
Interactive media BriefInteractive media Brief
Interactive media Brief
 
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A SurveyPerformance Comparison of Digital Image Watermarking Techniques: A Survey
Performance Comparison of Digital Image Watermarking Techniques: A Survey
 
Ac02417471753
Ac02417471753Ac02417471753
Ac02417471753
 
Ig2 task 1 work sheet s
Ig2 task 1 work sheet sIg2 task 1 work sheet s
Ig2 task 1 work sheet s
 

Andere mochten auch (15)

Audio Watermarking - JIIT noida 2013-14 by Vaibhav Arora and Isha Garg
Audio Watermarking - JIIT noida 2013-14 by Vaibhav Arora and Isha GargAudio Watermarking - JIIT noida 2013-14 by Vaibhav Arora and Isha Garg
Audio Watermarking - JIIT noida 2013-14 by Vaibhav Arora and Isha Garg
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKSDIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
Imageprocessing
ImageprocessingImageprocessing
Imageprocessing
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Ähnlich wie Digital audio watermarking applications

Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
CSCJournals
 

Ähnlich wie Digital audio watermarking applications (20)

Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...
 
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
A Robust Audio Watermarking in Cepstrum Domain Composed of Sample's Relation ...
 
A Survey On Audio Watermarking Methods
A Survey On Audio Watermarking  MethodsA Survey On Audio Watermarking  Methods
A Survey On Audio Watermarking Methods
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Universal sound recorder using arm 9
Universal sound recorder using arm 9Universal sound recorder using arm 9
Universal sound recorder using arm 9
 
Audio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet TransformsAudio Steganography Coding Using the Discreet Wavelet Transforms
Audio Steganography Coding Using the Discreet Wavelet Transforms
 
A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...A new robust video watermarking technique using h_264_aac_codec luma componen...
A new robust video watermarking technique using h_264_aac_codec luma componen...
 
Steganography analysis techniques applied to audio and image files
Steganography analysis techniques applied to audio and image filesSteganography analysis techniques applied to audio and image files
Steganography analysis techniques applied to audio and image files
 
Mk3422222228
Mk3422222228Mk3422222228
Mk3422222228
 
F5242832
F5242832F5242832
F5242832
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
50120140506015
5012014050601550120140506015
50120140506015
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
Speech processing and recognition
Speech processing and recognition Speech processing and recognition
Speech processing and recognition
 
Encrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometryEncrypting an audio file based on integer wavelet transform and hand geometry
Encrypting an audio file based on integer wavelet transform and hand geometry
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
 
A review of Noise Suppression Technology for Real-Time Speech Enhancement
A review of Noise Suppression Technology for Real-Time Speech EnhancementA review of Noise Suppression Technology for Real-Time Speech Enhancement
A review of Noise Suppression Technology for Real-Time Speech Enhancement
 

Mehr von IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Digital audio watermarking applications

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN INTERNATIONAL JOURNAL OF ELECTRONICS AND 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April, 2013, pp. 109-115 IJECET © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2013): 5.8896 (Calculated by GISI) ©IAEME www.jifactor.com DIGITAL AUDIO WATERMARKING APPLICATIONS AND TECHNIQUES G. B. Khatri1, D. S. Chaudhari2 1 (Department of EXTC, GCOE, Amravati, India) 2 (Department of EXTC, GCOE, Amravati, India) ABSTRACT Digital audio watermarking is nowadays gaining popularity among the original audio content producers. It provides a way to the owner to prove ownership by using watermark which forms integral part of audio. An approach is made in this paper to collectively introduce applications and techniques up till developed for audio watermarking.The proposedalgorithm is based on wavelet transform which has efficient computational load and also on cosine transform for increasing the watermark embedding capacity. Keywords: Watermark, audio, DFT, DCT, DWT, and DSSS. I. INTRODUCTION Production, storage, distribution of digital multimedia data is very easy. Hence itcreates the problem of protecting the intellectual copyrights. The copyrighted digital multimedia data is pirated without notification to the owner. Digital watermarking is a technique to embed the owner information as a copyright material in the digital data as a proof of ownership.Watermark as the name suggest is as transparent as water when watermark data is embedded in the original audio .Watermarking performance can be judged on parameters like imperceptibility, robustness, efficiency, and embedding capacity. A watermarking technique must achieve high performance without degrading the cover signal [1]. Digital watermarking can be applied to image, audio or video and the watermark data can be an image, audio and text.Generally there is less attention towards audio watermarking because HAS (human auditory system) is more sensitive than HVS (human visual system) and human ears can easily detect the presence of the watermark as low as one part in ten million [2]. 109
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME This paper presents an overview on applications and techniques of digital audio watermarking. Section II describes the digital audio watermarking, section III briefly describes four areas of applications whereas in section IV watermarking techniques are discussed with the performances of each and in section V new algorithm is proposed. II. DIGITAL AUDIO WATERMARKING Digital audio watermarking is a technique of embedding watermark data such as image, audio and text in the original audio stream to create copyrighted watermarked audio. Audio watermarking application areas include such as vendor identification, evidence of proprietorship, validation of genuineness, copy protection, etc. [3] Audio watermarking techniques can be grouped as; time-domain, frequency (transform) domain, spread-spectrum, patchwork [1,4]. The performances of the techniques are judged with respect to the robustness and imperceptibility (inaudibility) of audio watermarking. Inaudibility means the watermarked audio and original audio must be identical in nature to listen. Robustness means the resistance of the watermark against removal or degradation. The watermark should survive intentional attacks such as random cropping,noise addition, requantization, resampling, compression, filtering and its removal should degrade original audio. III. AUDIO WATERMARKING APPLICATIONS Watermarking serves various applications and each application puts desirable feature necessity on the watermarking technique. Hence the watermarking technique to be used depends on the area of application [3]. Thus a variety of applications are discussed below, 1) Vendor Identification – Text form of copyright notices occurs on the packaging of copyrighted materials. This type of protection does not prove sufficient as it would be easily removed. Digital audio watermarking can be used to embed copyright notice in the audio signal itself. As notice forms an integrated part of audio one can determine the vendor of the copyrighted audio. 2) Evidence of Proprietorship – One can prove its proprietorship in the case of copyright dispute.The original owner can prove its proprietorship by extracting the watermark copyright information from the watermarked audio, in the case when another person tries to sell the copyrighted material on behalf of his name by pirating it. 3) Validation of Genuineness – The copyrighted audio is genuine or not, can be proved very easily by the use of watermarking. A signature or copyright watermark is embedded in the audiothus anyone trying to modify the watermarked audio, modification also applies to the watermark because watermark forms integral part of audio. Hence one can prove genuineness of copyrighted audio by extracting exact copy of the watermark. 4) Copy Protection – The above mentioned applications do not putrestrictionson the illegal copying. Owner can restrict the illegal copying or the numbers of copies permitted by the use of special watermarking algorithms. One such method is modified patchwork algorithm (MPA) developed by Yeo and Kim [4]. 110
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME IV. AUDIO WATERMARKING TECHNIQUES Though audio watermarking techniques are few in numbers they can be categorised majorly into four groups viz. time domain, frequency domain, spread spectrum and patchwork. These techniques are discussed one by one along with their performances. 1) Time-domain techniques – It includes the least significant bit (LSB) substitution, echo hiding and quantization techniques. In time-domain techniques parameters of signal samples like amplitude, masking of samples with lower amplitude by higher amplitude samples, samples LSB are varied to attain embedding of watermark.The time-domain audio watermarking is relatively easy to implement, and requires few computing resources, however, it is weak against signal processing attacks such as compression and filtering.This type of techniques suffers from problems like low watermark data embedding capacity, easily detectable by the attacker, easy to decode watermark from cover audio. LSB technique is the simplest technique in which watermark datais embedded in the least significant bits of the audio sample values. It provides easy data embedding and extracting algorithms. As the information contained in the LSB is less, it is replaced by the data of the watermark without producing the noticeable effect in the cover audio signal. The cover audio signal degrades as the number of watermark bits is increased. A maximum of 3 watermark bits per 16 bits of audio sample is allowed for imperceptibility. If above 3 bits per audio sample is embedded distortions like noise are introduced and human auditory system begins to detect the noise introduced by the watermark. Cvejic N. and Seppanen T. have tried to increase the capacity from 3bits/sample to 4bits/sample without degrading the watermarked audio signal to noise ratio by using a three step technique. In this degradation in SNR of the watermarked audio is minimised by using minimum error replacement and error diffusion steps. Echo-hiding watermarking embeds information into the original discrete audio signal by introducing a repeated version of anoriginal sample of the audio signal with some delay and decay rate so as to make it undetectable [6]. Only binary information in the form of bits is embedded in the audio signal. Digital data is embedded by using four main parameters of echo: initial value, decay rate and different offset for 1 and 0. The offset is made so small such that the human ear cannot detect the presence of echo. Embedding is done by convolving the audio signal with the all 0 and all 1 kernel, then by using watermark data bits particular outputs are combined to form watermarked signal. Extraction is done by taking autocorrelation of cepstrum of the watermarked audio.Autocorrelation gives the power of signals at various shifts. With particular shifts in it one can easily determine the bit embedded. The watermark dataembedding rate is given as 16 bps (bits per second), while it can vary in the range 2 – 64 bps and it depends on the sampling rate and the signal type to be echoed. In the technique of quantization original sample of audio is replaced with the modified audio sample. The modified audio sample is defined as below, ‫ ݍ‬ሺ‫ܣ ,ݔ‬ሻ ൅ , ݂݅ ݀ܽ‫1 ݏ݅ ݐܾ݅ ܽݐ‬ ஺ ‫ݕ‬ൌቐ ସ ‫ ݍ‬ሺ‫ܣ ,ݔ‬ሻ െ ସ , ݂݅ ݀ܽ‫0 ݏ݅ ݐܾ݅ ܽݐ‬ ஺ (1) 111
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME Where q(.) is quantization function and Ais quantization step. The quantization function is given as, ‫ݍ‬ሺ‫ܣ ,ݔ‬ሻ ൌ ሾ‫ܣ⁄ݔ‬ሿ. ‫ܣ‬ (2) Where [x/A] is rounded to nearest integer. Thus in a single sample of audio signal one can embed only one bit of watermark. Hence a blind detection can be applied for watermark data extraction. Extraction can be done by following equation, 1 , ݂݅ 0 ൏ ‫ ݕ‬െ ‫ݍ‬ሺ‫ܣ ,ݔ‬ሻ ൏ ‫4/ܣ‬ ܾൌ൜ 0 , ݂݅ െ ‫ 4/ܣ‬൏ ‫ ݕ‬െ ‫ݍ‬ሺ‫ܣ ,ݔ‬ሻ ൏ 0 (3) This technique is simple and easy to implement and is robust to noise as long as the noise margin is below A/4. While the technique is easy but the watermark embedding capacity is very less. 2) Frequency domain techniques – Frequency domain audio watermarking techniques generally include transforms like discrete Fourier transform (DFT), the discrete cosine transform (DCT), and the discrete wavelet transform (DWT). It takes the advantage of masking of different tones of human auditory system (HAS) for effective watermarking. In this the original audio signal is transformed into frequency domain by using any one of the above mentioned transforms and then the watermark is either added or replaced in the magnitude or phase response. After that the watermarked audio is applied inverse transform to obtain the watermarked audio in time domain. Discrete Fourier transform decomposes the signal into its fundamental and harmonically related sinusoidal frequencies. The human ears sensitivity declines after the peak sensitivity around 1 kHz. Magnitude response coefficients are replaced by the watermark data in the frequency range of 2.4 – 6.4 kHz [7]. Also the human ears are insensitive to the absolute phase of the audio frequency;hence the phase difference between the phase signal coefficient and phase reference coefficient is used to modify the phase signal coefficient. Phase difference has to be added or subtracted when the watermark data bit is 1 or 0 respectively [8]. Discrete cosine transform is similar to the discrete Fourier transform except that its coefficients are real valued. Properties of DCT such as high compaction of signal energy in transform domain, highly decorrelated coefficients are used to embed data in the transform domain. Discrete wavelet transform is nowadays gaining popularity because it can decompose the signal in time and frequency at the same time while keeping the calculations to obtain DWT coefficientssmall as compared to DFT and DCT. Several advantages of applying DWT on audio signal are given by Wu and Huang such as 1) It is able to localize the audio in time- frequency both with multi-resolution property, 2) variable decomposition levels are available, 3) less number of operations than DFT and DCT [9]. If there are N samples in the audio then number of operations in DFT, DCT and DWT are O(N·log2(N)), O(N·log2(N)) and O(L·N) respectively, where L is the length of wavelet filter.A data payload capacity of 172 bps is achieved by embedding the self-synchronised watermark data in the wavelet domain without degrading the SNR too much[9]. 112
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN ional 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME 3) Spread-spectrum technique – It involves embedding of watermark in the original audio signal by spreading it over the bandwidth of audio signal[6 This technique utilizes DSSS (Direct Sequence Spread 6]. Spectrum) method of spread spectrum Encoding of watermark in the audio is shown in spectrum. Figure 1. Fig. 1 Direct sequence spread spectrum encoding In DSSS PN-sequence in used to spread the watermark data in the whole frequency sequence range of audio and then added to the audio signal by proper attenuation, so that the n watermark data is treated as additive random noise.Same sequence is again used to extract the watermark data by performing correlationbetween watermarked audio and PN-sequence. PN sequence. 4) Patchwork technique – This technique was first proposed for image watermarking and it is a pseudorandom statistical approach [6]. The idea is to select two subsets (patch) of thecover signal and in . order to embed the watermark, the sample values of these two subsets are moved in opposite directions by a constant valued, which defines the watermark strength and watermark bit. The , d bit imperceptibility of watermark in cover signal depends on value of d. Decoding is performed by taking the difference of the means of these two subsets and making decision based on the nce obtained value. The assumption in this method is that the difference of the means of the two patches is zero for the original cover signal and is nonzero for the watermarked cover zero signal.As two subsets (patch) are used this technique can extract the watermark without the .As original cover signal. Yeo and Kim have proposed a modification on the patchwork technique [4]. They have embedded the watermark data bit in the two subsets taken from DCT domain of original audio signal. The use of transform domain for embedding watermark makes the technique more robust against signal processing attacks such as down-sampling, equal down sampling, equalization, compression, filtering. V. PROPOSED ALGORITHM As observed from the above techniques that transform domain are more secure than time domain. In these models are suggested for embedding and extracting the watermark data in and out of audio signal. These models utilize the discrete wavelet transform for speedily se and efficiently transforming audio in time-frequency domain, while using discrete cosine time frequency transform to decorrelate and compress watermark image. Transformed watermark image coefficients must be normalised and multiplied with an attenuation constant before embedding. Attenuating the coefficients helps to keep noise level low in the audio signal. Since watermark image is compressed using discrete cos cosine 113
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME transform less number of transform coefficients are used for embedding and this improves the signal to noise ratio and also the watermark data embedding capacity. Discrete wavelet transform is used to transform the audio signals into frequency sub bands. These sub bands are called as approximate or detail frequencysub bands. Any one of this frequency band can be used to embed watermark. This algorithm is based on emerging wavelet transform and cosine transform for embedding and extracting watermark in audio signal, hence it will possess characteristics such ashigh signal-to-noise ratio (SNR) of watermarked audio, high data payload capacity i.e. number of watermark bits per second of audio signal, low computational complexity. VI. CONCLUSION Several algorithms are discussed for digital audio watermarking. These algorithms suffer from problems like intentional or unintentional attacksby means of signal processing. Lacunas such as unblind detection, less embedding capacity, resistance to various types of attacks also occurs.The proposed algorithm can overcome problems in existing techniques discussed while at the same time can achieve high performance with less computational cost. REFERENCES [1] Al-Haj A., Mohammad A., Bata L., “DWT based Audio Watermarking,” The International Arab Journal of Information Technology, vol. 8, no. 3, pp. 326 – 333, 2011. [2] Gruhl D., Lu A., Bender W., “Echo Hiding,” in Proceedings of the International Conference on Info Hiding, pp. 295 – 315, 1996. [3] Cox I., Miller M., Bloom J., “Watermarking applications and their properties,” International. Conference on Information Technology, Las Vegas, pp. 1 – 5, 2000. [4] Yeo I. and Kim H., “Modified PatchworkAlgorithm: A Novel Audio Watermarking scheme,” IEEE Transactions on Speech and Audio Processing, vol. 11, no. 4, pp. 381 – 386, 2003. [5] Cvejic N., Seppanen T., “Increasing the Capacity of LSB-Based Audio Steganography,” in Proceedings of the IEEE International Workshop on Multimedia Signal Processing, pp. 336 – 338, 2002. [6] Bender W., Gruhl D., Morimoto N., Lu A., “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3 and 4, pp. 313–336, 1996. [7] Tilki J. F., Beex A. A., “Encoding a Hidden Digital Signature onto an Audio Signal Using Psychoacoustic Masking, ”7th International Conference on Signal Processing Applications & Technology, Boston MA, pp. 476 – 480, 1996. [8] Tilki J. F., Beex A. A., “Encoding a Hidden Auxiliary Channel onto a Digital AudioSignal using Psychoacoustic Masking,” IEEE Southeastcon, Blacksburg, VA, pp. 331 – 333, 1997. [9] Wu S., Huang J., “Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission,” IEEE Transactions on Broadcasting, vol. 51, no. 1, pp. 69 – 75, 2005. [10] Karimella Vikram, Dr. V.Murali Krishna, Dr. Shaik Abdul Muzeer and Mr. K. Narasimha, “Invisible Water Marking Within Media Files Using State-of-The-Art Technology” International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 1 - 8, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 114
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME AUTHORS’ INFORMATION Govind B. Khatri is pursuing M.Tech. in Electronic System and Communication from Government College of Engineering, Amravati (Autonomous Institute of M.S.). He received his B.E. in Electronics and Telecommunication from H.V.P.M.’s College of Engineering & Technology in 2011. He also received Diploma in Electronics and Communication from Government Polytechnic, Amravati (Autonomous Institute of M.S.) in year 208. His area of interest includes Digital Signal Processing, Wavelet Processing, Digital Watermarking, and HDL with FPGA. Dr. Devendra S. Chaudhari obtained BE, ME, from Marathwada University, Aurangabad and PhD from Indian Institute of Technology, Bombay, Mumbai. He has been engaged in teaching, research for period of about 25 years and worked on DST-SERC sponsored Fast Track Project for Young Scientists. He has worked as Head Electronics and Telecommunication, Instrumentation, Electrical, Research and in charge Principal at Government Engineering Colleges. Presently he is working as Head, Department of Electronics and Telecommunication Engineering at Government College of Engineering, Amravati. He has published research papers and presented papers in international conferences abroad at Seattle, USA and Austria, Europe. He worked as Chairman / Expert Member on different committees of All India Council for Technical Education, Directorate of Technical Education for Approval, Graduation, Inspection, Variation of Intake of diploma and degree Engineering Institutions. As a university recognized PhD research supervisor in Electronics and Computer Science Engineering he has been supervising research work since 2001. One research scholar received PhD under his supervision. He has worked as Chairman / Member on different university and college level committees like Examination, Academic, Senate, Board of Studies, etc. he chaired one of the Technical sessions of International Conference held at Nagpur. He is fellow of IE, IETE and life member of ISTE, BMESI and member of IEEE (2007). He is recipient of Best Engineering College Teacher Award of ISTE, New Delhi, Gold Medal Award of IETE, New Delhi, Engineering Achievement Award of IE (I), Nashik. He has organized various Continuing Education Programmes and delivered Expert Lectures on research at different places. He has also worked as ISTE Visiting Professor and visiting faculty member at Asian Institute of Technology, Bangkok, Thailand. His present research and teaching interests are in the field of Biomedical Engineering, Digital Signal Processing and Analogue Integrated Circuits. 115