SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Least Significant
Bit (LSB)
Least Significant
Bit (LSB)
Discrete Cosine
Transform
Discrete Cosine
Transform
Padded Byte
Stuffing
Padded Byte
Stuffing
Data loss on Resampling
Prone to lossy retrieval
Data loss on Resampling
Prone to lossy retrievalMore Robust Approach
No Loss in data on
Resampling
More Reliable & Secure
DCT- Discrete Cosine
Transform
DCT- Discrete Cosine
Transform
Embedding in Dual Channel – More SecurityEmbedding in Dual Channel – More Security
Audio
Sample
Right Channel
Left Channel
Synchronization Code Selects the Channel
Watermarked
Audio
Track
Watermarked
Audio
Track
Inverse Discrete Cosine
Transform
Audio DataAudio Data
Block
1
Block
1
Block
2
Block
2
Block
3
Block
3
Block
n
Block
n
Discrete Cosine Transform
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT’
Data
DCT’
Data
DCT’
Data
DCT’
Data
Watermark Embedded in AudioWatermark Embedded in Audio
Selecting Mid-Range of DCT BlockSelecting Mid-Range of DCT Block
…
Mid Range
…
…
5 6 7 8
1 2 3 4
13 14 15 16
9 10 11 12
8 5 6 7
4 1 2 3
16 13 14 15
12 9 10 11
1 2 3 4
13 14 15 16
9 10 11 12
5 6 77 8
Original Watermark
Circular Shifted Watermark- Type 1
Circular Shifted Watermark- Type 2
Circular Shifting of Original
Watermark
Circular Shifting of Original
Watermark
Application of Detecting Distributor of unauthorized
copy of Audio file based on the Algorithm
Application of Detecting Distributor of unauthorized
copy of Audio file based on the Algorithm
APPLICATION
Watermark generation for client (unique key)
Upload Audio
Add Client
for Audio
Watermarked Audio is sent to client
Unique Watermark stored in
database for theft detection
Login
Panel
Enter Client
Details
PUBLISHER MODULE
Watermark Extraction from audioUpload Audio
Client Information DisplayedClient Information Displayed
Fetching from
Database
[ FOUND ]
DETECTION & TRACKING MODULE
Login Panel
KEY BASEDKEY BASED

Weitere ähnliche Inhalte

Andere mochten auch

Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingEslam Omar
 
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKSDIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKSbehzad66
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarkingLikan Patra
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals pptjackkhush
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDSurit Datta
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingrupareliab14
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingAnkush Kr
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 

Andere mochten auch (15)

Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
The Audio watermarking
The Audio watermarkingThe Audio watermarking
The Audio watermarking
 
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKSDIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON NEURAL NETWORKS
 
Audio watermarking
Audio watermarkingAudio watermarking
Audio watermarking
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
Imageprocessing
ImageprocessingImageprocessing
Imageprocessing
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Ähnlich wie Audio Watermarking - JIIT noida 2013-14 by Vaibhav Arora and Isha Garg

Robust Watermarking of Video Streams
Robust Watermarking of Video StreamsRobust Watermarking of Video Streams
Robust Watermarking of Video StreamsTamás Polyák
 
Advances in Network-adaptive Video Streaming
Advances in Network-adaptive Video StreamingAdvances in Network-adaptive Video Streaming
Advances in Network-adaptive Video StreamingVideoguy
 
College ADSL Presentation
College ADSL PresentationCollege ADSL Presentation
College ADSL Presentationjviviano
 
Digital Video Course Section 1
Digital Video Course  Section 1Digital Video Course  Section 1
Digital Video Course Section 1ericlsnider
 
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...Synack
 
DEF CON 23: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex ...
DEF CON 23: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex ...DEF CON 23: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex ...
DEF CON 23: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex ...Synack
 
displayport_dsc_protocols_webinar.pdf
displayport_dsc_protocols_webinar.pdfdisplayport_dsc_protocols_webinar.pdf
displayport_dsc_protocols_webinar.pdfssuser884d0a
 
Digital Video And Compression
Digital Video And CompressionDigital Video And Compression
Digital Video And CompressionRobert Burk
 
Computer network (1)
Computer network (1)Computer network (1)
Computer network (1)NYversity
 
FutureComm 2010: Making Real-Time Video Work Over the Internet
FutureComm 2010: Making Real-Time Video Work Over the InternetFutureComm 2010: Making Real-Time Video Work Over the Internet
FutureComm 2010: Making Real-Time Video Work Over the InternetRADVISION Ltd.
 
hdtv ppt slide
hdtv ppt slidehdtv ppt slide
hdtv ppt slidecswati
 
Networking in Java with NIO and Netty
Networking in Java with NIO and NettyNetworking in Java with NIO and Netty
Networking in Java with NIO and NettyConstantine Slisenka
 
Bosch DCN-WDDCS-D
Bosch DCN-WDDCS-DBosch DCN-WDDCS-D
Bosch DCN-WDDCS-Dseoleetran
 
Mobile communication and computing gsm-radio-interface-140720014203-phpapp02.pdf
Mobile communication and computing gsm-radio-interface-140720014203-phpapp02.pdfMobile communication and computing gsm-radio-interface-140720014203-phpapp02.pdf
Mobile communication and computing gsm-radio-interface-140720014203-phpapp02.pdfSomnathMule5
 
Introduction To Telecom
Introduction To TelecomIntroduction To Telecom
Introduction To Telecomhumannetwork
 
Video Compression Basics - MPEG2
Video Compression Basics - MPEG2Video Compression Basics - MPEG2
Video Compression Basics - MPEG2VijayKumarArya
 

Ähnlich wie Audio Watermarking - JIIT noida 2013-14 by Vaibhav Arora and Isha Garg (20)

Barcelona keynote web
Barcelona keynote webBarcelona keynote web
Barcelona keynote web
 
Robust Watermarking of Video Streams
Robust Watermarking of Video StreamsRobust Watermarking of Video Streams
Robust Watermarking of Video Streams
 
Advances in Network-adaptive Video Streaming
Advances in Network-adaptive Video StreamingAdvances in Network-adaptive Video Streaming
Advances in Network-adaptive Video Streaming
 
College ADSL Presentation
College ADSL PresentationCollege ADSL Presentation
College ADSL Presentation
 
Digital Video Course Section 1
Digital Video Course  Section 1Digital Video Course  Section 1
Digital Video Course Section 1
 
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...
 
DEF CON 23: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex ...
DEF CON 23: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex ...DEF CON 23: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex ...
DEF CON 23: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex ...
 
displayport_dsc_protocols_webinar.pdf
displayport_dsc_protocols_webinar.pdfdisplayport_dsc_protocols_webinar.pdf
displayport_dsc_protocols_webinar.pdf
 
Digital Video And Compression
Digital Video And CompressionDigital Video And Compression
Digital Video And Compression
 
Computer network (1)
Computer network (1)Computer network (1)
Computer network (1)
 
FutureComm 2010: Making Real-Time Video Work Over the Internet
FutureComm 2010: Making Real-Time Video Work Over the InternetFutureComm 2010: Making Real-Time Video Work Over the Internet
FutureComm 2010: Making Real-Time Video Work Over the Internet
 
hdtv ppt slide
hdtv ppt slidehdtv ppt slide
hdtv ppt slide
 
Gsm (4)
Gsm (4)Gsm (4)
Gsm (4)
 
Networking in Java with NIO and Netty
Networking in Java with NIO and NettyNetworking in Java with NIO and Netty
Networking in Java with NIO and Netty
 
multiplexing
multiplexingmultiplexing
multiplexing
 
Bosch DCN-WDDCS-D
Bosch DCN-WDDCS-DBosch DCN-WDDCS-D
Bosch DCN-WDDCS-D
 
Mobile communication and computing gsm-radio-interface-140720014203-phpapp02.pdf
Mobile communication and computing gsm-radio-interface-140720014203-phpapp02.pdfMobile communication and computing gsm-radio-interface-140720014203-phpapp02.pdf
Mobile communication and computing gsm-radio-interface-140720014203-phpapp02.pdf
 
DSL
DSLDSL
DSL
 
Introduction To Telecom
Introduction To TelecomIntroduction To Telecom
Introduction To Telecom
 
Video Compression Basics - MPEG2
Video Compression Basics - MPEG2Video Compression Basics - MPEG2
Video Compression Basics - MPEG2
 

Kürzlich hochgeladen

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 

Kürzlich hochgeladen (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 

Audio Watermarking - JIIT noida 2013-14 by Vaibhav Arora and Isha Garg

  • 1. Least Significant Bit (LSB) Least Significant Bit (LSB) Discrete Cosine Transform Discrete Cosine Transform Padded Byte Stuffing Padded Byte Stuffing Data loss on Resampling Prone to lossy retrieval Data loss on Resampling Prone to lossy retrievalMore Robust Approach No Loss in data on Resampling More Reliable & Secure
  • 2. DCT- Discrete Cosine Transform DCT- Discrete Cosine Transform
  • 3. Embedding in Dual Channel – More SecurityEmbedding in Dual Channel – More Security Audio Sample Right Channel Left Channel Synchronization Code Selects the Channel Watermarked Audio Track Watermarked Audio Track
  • 4. Inverse Discrete Cosine Transform Audio DataAudio Data Block 1 Block 1 Block 2 Block 2 Block 3 Block 3 Block n Block n Discrete Cosine Transform DCT Data DCT Data DCT Data DCT Data DCT Data DCT Data DCT Data DCT Data DCT’ Data DCT’ Data DCT’ Data DCT’ Data Watermark Embedded in AudioWatermark Embedded in Audio Selecting Mid-Range of DCT BlockSelecting Mid-Range of DCT Block … Mid Range … …
  • 5. 5 6 7 8 1 2 3 4 13 14 15 16 9 10 11 12 8 5 6 7 4 1 2 3 16 13 14 15 12 9 10 11 1 2 3 4 13 14 15 16 9 10 11 12 5 6 77 8 Original Watermark Circular Shifted Watermark- Type 1 Circular Shifted Watermark- Type 2 Circular Shifting of Original Watermark Circular Shifting of Original Watermark
  • 6. Application of Detecting Distributor of unauthorized copy of Audio file based on the Algorithm Application of Detecting Distributor of unauthorized copy of Audio file based on the Algorithm APPLICATION
  • 7. Watermark generation for client (unique key) Upload Audio Add Client for Audio Watermarked Audio is sent to client Unique Watermark stored in database for theft detection Login Panel Enter Client Details PUBLISHER MODULE
  • 8. Watermark Extraction from audioUpload Audio Client Information DisplayedClient Information Displayed Fetching from Database [ FOUND ] DETECTION & TRACKING MODULE Login Panel KEY BASEDKEY BASED