SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Bit Replacement Audio Watermarking
                     Using Stereo Signals


                                               Term Project

                               Muhammad Umer Kakli
                            Muhammad Naeem Tayyab




This Paper was presented in International Conference on
   New Trends in Information & Service Science 2009
         By Wei Cao, Yixin Yan, Shengming Li
Digital Watermarking involves embedding secret data
as an additional information to the digital signal such
          as Audio, Image or Video Signal.



        Copyright Protection
        Video Fingerprinting
        Broadcast Monitoring
For Digital Audio Watermarking, the approaches can be
                   Blind or Non-blind.

For Non-blind watermarking techniques, original signals
are required for watermark extraction while in Blind
technique original signals are not required to extract
watermark.
   Removal Attacks: Trying to remove the watermark
      signal without attempting to break the security of
      watermark algorithm.
   Geometric Attacks: Don’t remove the watermark itself,
      but intended to distort the watermark detector
      synchronization with the embedded information.
   Cryptographic Attacks: Aim at cracking the security
      methods in watermarking schemes and thus finding
      a way to remove the embedded watermark
      information
   Protocol Attacks: Aim at attacking the entire concept
      of watermarking application.
Figure 1: Classification of Watermark Attacks
   LSB Encoding

   Echo Hiding

   Spread Spectrum Watermarking

   Watermarking the phase of the host signal
   Watermark added to the Least Significant Bit
     (LSB)

   Easy to embed and retrieve

   High bit rate
De-merits of LSB Encoding Scheme
 Robustness of this method is very low
 Watermark bits can be easily detected and changed
 Addition of High level noise, re-sampling and MP3
  Compression may completely destroy the watermark
  information.

Proposed Scheme
   Instead of using LSB of mono-signal samples, it is
    perceived that by using higher bits of Stereo-Signal
    samples, it can be more robust.
   The proposed Audio Watermarking scheme improves
    mono-signal watermarking method by introducing
    watermarking threshold and making use of Stereo
    Signals.

Mono Signals Vs. Stereo Signals
   Mono means audio signals are mixed together and
    routed through a single channel while In Stereo two or
    more individual channels are using. left channel's o/p is
    connected to the left speakers and right channel's o/p is
    connected to the right speakers. It gives the effect of
    direction    and       the     depth       of     sound.
   Watermarking threshold is calculated using the following
    equation
                Watermarking Threshold = 1/2n-(w+4)
                   n=Number of bits per sample
                   w=Watermark embed bit layer

   Samples whose values are higher than threshold are
    considered as “Non-Silent” samples and they are used
    to embed watermark bits. Samples whose values are
    lower than threshold are considered as “Silent”
    samples and they are not used for watermark
    embedding.
After threshold calculation , let each “non-silent” sample
value of original stereo signal be represented in 16 bit
binary format.
              a16,a15,a14,………….a3,a2,a1

where a1 is the bit in the 1st bit layer, a2 is the bit in the
2nd bit layer and so on.

A watermark bit stream is first generated and ith bit layers
of “non-silent” samples are used as watermark
embedded bit layer.
If the first bit of the stream is bit “1”, and ai of the first “non-silent”
sample of left-channel signal is also bit “1”, no action is taken. If ai is
not “1”, watermark embedding process of left-channel signal is
performed according to the following procedures,
If the first bit of the stream is bit “0”, and ai of the first “non-silent”
sample of right-channel signal is also bit “0”, no action is taken. If ai
is not “0”, watermark embedding process of right channel signal is
performed according to the following procedures,
Effect of Watermarking on Bit Layers




  Figure 2: Percentage of Changed bits as embedding in the 5th bit layer
Signal to Noise Ration (SNR)




 Signal to Noise          Embedded Bit Layer of Watermark Signals
     Ratios
      (dB)          1st          2nd       3rd       4th            5th
Stereo Signals     72.09        70.15     67.38     59.36      46.25
Mono Signals       66.52        61.49     56.81     44.37      28.53



             SNR of Watermarked Stereo and Mono Signals
Robustness under Attack of Addition of Noise




Figure 3: Watermark Extraction Rate Under addition of White noise (for 20dB & 50dB)
Robustness under MP3 Compression Attack

                                 Embedded Bit Layer of Watermark
  Extraction Rate (%) for MP3
        Compression
                                            Signals
                                 1st     2nd     3rd     4th     5th
  Extraction Rate (%)           49.80   49.82   49.83   50.06   50.11




    Watermark Extraction Rate Under Attack of MP3 Compression
Robustness under Re-Sampling Attack
        Watermark        Embedded Bit Layer of Watermark Signals
      Extraction Rate
            (%)            1st    2nd      3rd     4th     5th

                    14.70 48.99 49.54 49.83 49.71 50.11
      Re-sampling
       Frequency




                    22.05 49.61 49.73 50.17 50.66 50.70
         (KHz)




                    66.15 49.17 49.84 49.96 50.30 50.43
                    88.20 50.03 53.29 55.64 58.52 60.79


      Watermark Extraction Rate Under Attack of Re-sampling
The noise level due to embedding watermark is
significantly reduced. This schemes is robust against
addition of white noise, even if the noise level is high.
The proposed scheme is not robust against MP3
Compression and re-sampling unless frequency is
integer multiple of original sampling frequency.
Bit replacement audio watermarking

Weitere ähnliche Inhalte

Was ist angesagt?

Communication Networks II
Communication Networks IICommunication Networks II
Communication Networks II
anishgoel
 
Digital communications 1
Digital communications 1Digital communications 1
Digital communications 1
Jojie Cepeda
 
Wireless quality of services
Wireless quality of servicesWireless quality of services
Wireless quality of services
Utkarsh Vashistha
 

Was ist angesagt? (20)

Communication Networks II
Communication Networks IICommunication Networks II
Communication Networks II
 
Adaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signalAdaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signal
 
Analog to-digital conversion
Analog to-digital conversionAnalog to-digital conversion
Analog to-digital conversion
 
DPCM
DPCMDPCM
DPCM
 
30 CHL PCM PDH SDH BY SKG
30 CHL PCM PDH SDH BY SKG30 CHL PCM PDH SDH BY SKG
30 CHL PCM PDH SDH BY SKG
 
Digital communication unit 1
Digital communication unit 1Digital communication unit 1
Digital communication unit 1
 
Pulse code modulation and Quantization
Pulse code modulation and QuantizationPulse code modulation and Quantization
Pulse code modulation and Quantization
 
NI Presenation Delta
NI Presenation DeltaNI Presenation Delta
NI Presenation Delta
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
 
Wireless digital communication and coding techniques new
Wireless digital communication and coding techniques newWireless digital communication and coding techniques new
Wireless digital communication and coding techniques new
 
Digital communications 1
Digital communications 1Digital communications 1
Digital communications 1
 
Presentation ct
Presentation ctPresentation ct
Presentation ct
 
Slides2 The Communication System midterm Slides
Slides2  The Communication System midterm SlidesSlides2  The Communication System midterm Slides
Slides2 The Communication System midterm Slides
 
00699b
00699b00699b
00699b
 
Companding and DPCM and ADPCM
Companding and DPCM and ADPCMCompanding and DPCM and ADPCM
Companding and DPCM and ADPCM
 
Digital signal processing part1
Digital signal processing part1Digital signal processing part1
Digital signal processing part1
 
Pcm
PcmPcm
Pcm
 
Wireless quality of services
Wireless quality of servicesWireless quality of services
Wireless quality of services
 
Pulse code modulation
Pulse code modulationPulse code modulation
Pulse code modulation
 
Digital Signal Processing-Digital Filters
Digital Signal Processing-Digital FiltersDigital Signal Processing-Digital Filters
Digital Signal Processing-Digital Filters
 

Ähnlich wie Bit replacement audio watermarking

Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
Mr SMAK
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
Mr SMAK
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
IAEME Publication
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
CSCJournals
 

Ähnlich wie Bit replacement audio watermarking (20)

Digital Audio
Digital AudioDigital Audio
Digital Audio
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio SignalEvaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
Evaluation of Two-Set Algorithm in Embedding a Watermark into an Audio Signal
 
DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study DWT Based Audio Watermarking Schemes : A Comparative Study
DWT Based Audio Watermarking Schemes : A Comparative Study
 
Speech processing and recognition
Speech processing and recognition Speech processing and recognition
Speech processing and recognition
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
 
Chapter 2- Digital Data Acquistion.ppt
Chapter 2- Digital Data Acquistion.pptChapter 2- Digital Data Acquistion.ppt
Chapter 2- Digital Data Acquistion.ppt
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
 
Coding
CodingCoding
Coding
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
Audio compression 1
Audio compression 1Audio compression 1
Audio compression 1
 
DSP Based Speech Operated Home Appliances UsingZero Crossing Features
DSP Based Speech Operated Home Appliances UsingZero Crossing FeaturesDSP Based Speech Operated Home Appliances UsingZero Crossing Features
DSP Based Speech Operated Home Appliances UsingZero Crossing Features
 
Speaker recognition.
Speaker recognition.Speaker recognition.
Speaker recognition.
 
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
Pseudo Four-Channel Image Denoising for Noisy CFA Raw Data (ICIP2015)
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
IIR Filter Design for De Nosing Speech Signal using Matlab
IIR Filter Design for De Nosing Speech Signal using MatlabIIR Filter Design for De Nosing Speech Signal using Matlab
IIR Filter Design for De Nosing Speech Signal using Matlab
 
0A-01-ACA-Fundamentals-Digitization.pdf
0A-01-ACA-Fundamentals-Digitization.pdf0A-01-ACA-Fundamentals-Digitization.pdf
0A-01-ACA-Fundamentals-Digitization.pdf
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Bit replacement audio watermarking

  • 1. Bit Replacement Audio Watermarking Using Stereo Signals Term Project Muhammad Umer Kakli Muhammad Naeem Tayyab This Paper was presented in International Conference on New Trends in Information & Service Science 2009 By Wei Cao, Yixin Yan, Shengming Li
  • 2. Digital Watermarking involves embedding secret data as an additional information to the digital signal such as Audio, Image or Video Signal.  Copyright Protection  Video Fingerprinting  Broadcast Monitoring
  • 3.
  • 4. For Digital Audio Watermarking, the approaches can be Blind or Non-blind. For Non-blind watermarking techniques, original signals are required for watermark extraction while in Blind technique original signals are not required to extract watermark.
  • 5. Removal Attacks: Trying to remove the watermark signal without attempting to break the security of watermark algorithm.  Geometric Attacks: Don’t remove the watermark itself, but intended to distort the watermark detector synchronization with the embedded information.  Cryptographic Attacks: Aim at cracking the security methods in watermarking schemes and thus finding a way to remove the embedded watermark information  Protocol Attacks: Aim at attacking the entire concept of watermarking application.
  • 6. Figure 1: Classification of Watermark Attacks
  • 7. LSB Encoding  Echo Hiding  Spread Spectrum Watermarking  Watermarking the phase of the host signal
  • 8. Watermark added to the Least Significant Bit (LSB)  Easy to embed and retrieve  High bit rate
  • 9. De-merits of LSB Encoding Scheme  Robustness of this method is very low  Watermark bits can be easily detected and changed  Addition of High level noise, re-sampling and MP3 Compression may completely destroy the watermark information. Proposed Scheme  Instead of using LSB of mono-signal samples, it is perceived that by using higher bits of Stereo-Signal samples, it can be more robust.
  • 10. The proposed Audio Watermarking scheme improves mono-signal watermarking method by introducing watermarking threshold and making use of Stereo Signals. Mono Signals Vs. Stereo Signals  Mono means audio signals are mixed together and routed through a single channel while In Stereo two or more individual channels are using. left channel's o/p is connected to the left speakers and right channel's o/p is connected to the right speakers. It gives the effect of direction and the depth of sound.
  • 11. Watermarking threshold is calculated using the following equation Watermarking Threshold = 1/2n-(w+4) n=Number of bits per sample w=Watermark embed bit layer  Samples whose values are higher than threshold are considered as “Non-Silent” samples and they are used to embed watermark bits. Samples whose values are lower than threshold are considered as “Silent” samples and they are not used for watermark embedding.
  • 12. After threshold calculation , let each “non-silent” sample value of original stereo signal be represented in 16 bit binary format. a16,a15,a14,………….a3,a2,a1 where a1 is the bit in the 1st bit layer, a2 is the bit in the 2nd bit layer and so on. A watermark bit stream is first generated and ith bit layers of “non-silent” samples are used as watermark embedded bit layer.
  • 13. If the first bit of the stream is bit “1”, and ai of the first “non-silent” sample of left-channel signal is also bit “1”, no action is taken. If ai is not “1”, watermark embedding process of left-channel signal is performed according to the following procedures,
  • 14. If the first bit of the stream is bit “0”, and ai of the first “non-silent” sample of right-channel signal is also bit “0”, no action is taken. If ai is not “0”, watermark embedding process of right channel signal is performed according to the following procedures,
  • 15. Effect of Watermarking on Bit Layers Figure 2: Percentage of Changed bits as embedding in the 5th bit layer
  • 16. Signal to Noise Ration (SNR) Signal to Noise Embedded Bit Layer of Watermark Signals Ratios (dB) 1st 2nd 3rd 4th 5th Stereo Signals 72.09 70.15 67.38 59.36 46.25 Mono Signals 66.52 61.49 56.81 44.37 28.53 SNR of Watermarked Stereo and Mono Signals
  • 17. Robustness under Attack of Addition of Noise Figure 3: Watermark Extraction Rate Under addition of White noise (for 20dB & 50dB)
  • 18. Robustness under MP3 Compression Attack Embedded Bit Layer of Watermark Extraction Rate (%) for MP3 Compression Signals 1st 2nd 3rd 4th 5th Extraction Rate (%) 49.80 49.82 49.83 50.06 50.11 Watermark Extraction Rate Under Attack of MP3 Compression
  • 19. Robustness under Re-Sampling Attack Watermark Embedded Bit Layer of Watermark Signals Extraction Rate (%) 1st 2nd 3rd 4th 5th 14.70 48.99 49.54 49.83 49.71 50.11 Re-sampling Frequency 22.05 49.61 49.73 50.17 50.66 50.70 (KHz) 66.15 49.17 49.84 49.96 50.30 50.43 88.20 50.03 53.29 55.64 58.52 60.79 Watermark Extraction Rate Under Attack of Re-sampling
  • 20. The noise level due to embedding watermark is significantly reduced. This schemes is robust against addition of white noise, even if the noise level is high. The proposed scheme is not robust against MP3 Compression and re-sampling unless frequency is integer multiple of original sampling frequency.