SlideShare uma empresa Scribd logo
1 de 19
Visit www.seminarlinks.blogspot.com to download
Introduction
 Digital Data can be shared by multiple users, distributed over network, and
managed for long period time without any damage.
 In contrast to these, the copyright protection problem arises, since unauthorized
copying and distribution of digital data are simplified, too.
 As a result, a technique called digital watermarking is introduced to protect the
ownership of these contents.
AUDIO WATERMARKING
Digital Audio Watermarking is a technology to hide information in an audio file
without the information being audible to the listener, and without affecting in any
way the audio quality of the original file.
What we can define ?
AIMS AT
 Copy control of digital music
 Ownership identification
 Enforcement of usage policy
 Fingerprinting
AUDIO WATERMARKING CHARACTERISTICS
 Transparency: watermark is not detectable
 Robustness: survives digital processing (e.g., compression) and
malicious analytical attacks.
 Efficiency: low cost implementation using minimal resources
 Independence: of both the type and format of multimedia data (e.g.,
music, speech, video, sample rates, coding scheme, ...)
CLASSIFICATION OF AUDIO WATERMARKING
Temporal watermarking
• Temporal watermarking hides watermarks directly into digital audio signals in
the time domain.
Spectral water-marking
• The spectral audio watermarking applies certain frequency transform, such as
FFT, DCT, and DWT, etc, to the data block of the audio signal, and hides the
watermark information Into the transformed data block.
AUDIO WATERMARKING SCHEMES
 DC level shifting
 QMF bank band division
 Frequency masking
 Spread spectrum
DC LEVEL SHIFTING
 Here watermark is embedded by shifting the DC level of the audio signal.
 An input signal is divided into frames of fixed length.
 DC level of each frame =Mean of a frame-value in the frame
 After that a binary watermark sequence generated randomly is introduced to the shifted signal.
 This is achieved by introducing a DC offset level to each frame in the signal according to the
watermark bits.
 If the watermark bit is 0, the signal is shifted downward.
 If the watermark bit is 1, the signal is shifted upward.
Cont..
DC LEVEL SHIFTING
level0=-DCBiasMultiplier x FramePower
level1=+DCBiasMultiplier x FramePower
where
level0 ->DC level introduced when a watermark bit is 0
level1 -> the DC level introduced when a watermark bit is 1.
 To extract a watermark, a watermarked signal is first divided into frames.
 Then, the mean of each frame is calculated. If the mean of a frame is positive,
the corresponding watermark bit is 1. Else, the watermark bit is 0.
 The original signal and watermark is not needed in the extraction process.
Therefore, DC level shifting is a blind watermarking scheme.
Band Division Based on Quadrature Mirror Filter (QMF) Bank
Cont..
Cont..
 Watermarked signal is filtered by the analysis filter bank and the low frequency
watermarked band is extracted out.
 The modified MDCT coefficients are calculated out and watermark can be
determined by rounding the coefficients and observe whether coefficients are
even or odd.
Watermark is 1 when coefficients are odd.
Watermark is 0 when coefficients are even.
This technique has a
 High signal to noise ratio
 The rate of detection or bit error rate is very high
WATERMARKED SIGNAL EXTRACTION USING QMF
FREQUENCY MASKING
 Watermarking involves hiding a faint but audible sound under another louder
sound (original sound).
 So the faint sound becomes inaudible and it acts as a watermark for the
original sound.
 Watermark is generated firstly by creating a pseudo-noise sequence (PN
sequence) from a shift register.
 The shift register consists of m flip-flops with a maximum period of (2m) – 1.
Cont..Visit www.seminarlinks.blogspot.com to download
 PN sequence is filtered along with the filter that approximates the frequency
characteristics of the human auditory system (HAS).
 Consequently, it is put through to the time domain for temporal masking.
 The frequency masking algorithm is robust to coding, multiple watermarking, and
resampling.
 Different watermark can be embedded by this algorithm into the same signal and is
easy to detect by the owner.
 The detection scheme for this algorithm needs the original input signal, which is not
flexible
 From the extraction scheme, frequency masking is a private watermarking.
SPREAD SPECTRUM
Where
wi is element of watermark
y is the watermarked signal
A correlation detector is carried out to detect the presence of the watermark and is
described by Eqn
where N is vector cardinality Cont..
SPREAD SPECTRUM
While x can be modelled as Gaussian random vector, the normalised correlation test
is described as Eqn
 
1
0, /
^ 2
x
C
Q p N N
N
  
 
If p = 1, watermark is present
If p=0, watermark is not present
ANALYSIS OF VARIOUS TECHNIQUES
• DC level shifting algorithm
 The robustness level for the DC level shifting is poor
 The watermark can be easily removed by altering the DC levels of the signal and the watermark is
destroyed.
• Frequency Masking
 This method is not robust to filtering because watermark is embedded to all frequency bands.
 Attack by high pass filter MPEG can erase the watermark.
Cont..
• Spread Spectrum & Band Division Based On QMF
 Both the band division method and the spread spectrum method are capable of defending against the
MP3 compression, but the spread spectrum has a better detection rate than the band division method.
 The implementation steps for spread spectrum are more complicated. This makes it hard to hack and
breakdown the algorithm.
• Band Division Based On QMF
 Band division technology performs extraction scheme with no original signal require attacks are still not
upgraded to hack down this audio watermarking technology.
CONCLUSION
 Watermark can be embedded in an audio signal without being
recognized by hearing and the perceptibility requirement is fulfilled .
 Extraction can be done without the presence of the original signal and
the watermark itself, so can be classified as blind or public
watermarking.
Visit www.seminarlinks.blogspot.com to download

Mais conteúdo relacionado

Mais de Seminar Links

Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTSeminar Links
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Seminar Links
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTSeminar Links
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTSeminar Links
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing TechniqueSeminar Links
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Seminar Links
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Seminar Links
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPTSeminar Links
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareSeminar Links
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material pptSeminar Links
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military ApplicationsSeminar Links
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer scienceSeminar Links
 
उपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिउपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिSeminar Links
 
Electronic Paper (e-Paper)
Electronic Paper (e-Paper)Electronic Paper (e-Paper)
Electronic Paper (e-Paper)Seminar Links
 

Mais de Seminar Links (20)

Claytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPTClaytronics | Programmable Matter | PPT
Claytronics | Programmable Matter | PPT
 
Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018Three-dimensional Holographic Projection Technology PPT | 2018
Three-dimensional Holographic Projection Technology PPT | 2018
 
MicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPTMicroLED : Latest Display Technology | PPT
MicroLED : Latest Display Technology | PPT
 
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPTPerformance of 400 kV line insulators under pollution | PDF | DOC | PPT
Performance of 400 kV line insulators under pollution | PDF | DOC | PPT
 
Box Pushing Technique
Box Pushing TechniqueBox Pushing Technique
Box Pushing Technique
 
Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018Highest Largest Tallest Longest in India 2018
Highest Largest Tallest Longest in India 2018
 
Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE) Atmospheric Vortex Engine (AVE)
Atmospheric Vortex Engine (AVE)
 
Artificial photosynthesis PPT
Artificial photosynthesis PPTArtificial photosynthesis PPT
Artificial photosynthesis PPT
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry Ransomware
 
Dams PPT
Dams PPTDams PPT
Dams PPT
 
Bio mass Energy
Bio mass EnergyBio mass Energy
Bio mass Energy
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military Applications
 
Future challenges in computer science
Future challenges in computer scienceFuture challenges in computer science
Future challenges in computer science
 
उपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृतिउपभोक्तावादी संस्कृति
उपभोक्तावादी संस्कृति
 
Electronic Paper (e-Paper)
Electronic Paper (e-Paper)Electronic Paper (e-Paper)
Electronic Paper (e-Paper)
 
Biosensor ppt
Biosensor pptBiosensor ppt
Biosensor ppt
 
Six-Stroke Engine
Six-Stroke Engine Six-Stroke Engine
Six-Stroke Engine
 
Solar Roadways PPT
Solar Roadways PPTSolar Roadways PPT
Solar Roadways PPT
 

Último

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Último (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Audio Watermarking

  • 2. Introduction  Digital Data can be shared by multiple users, distributed over network, and managed for long period time without any damage.  In contrast to these, the copyright protection problem arises, since unauthorized copying and distribution of digital data are simplified, too.  As a result, a technique called digital watermarking is introduced to protect the ownership of these contents.
  • 3. AUDIO WATERMARKING Digital Audio Watermarking is a technology to hide information in an audio file without the information being audible to the listener, and without affecting in any way the audio quality of the original file. What we can define ? AIMS AT  Copy control of digital music  Ownership identification  Enforcement of usage policy  Fingerprinting
  • 4. AUDIO WATERMARKING CHARACTERISTICS  Transparency: watermark is not detectable  Robustness: survives digital processing (e.g., compression) and malicious analytical attacks.  Efficiency: low cost implementation using minimal resources  Independence: of both the type and format of multimedia data (e.g., music, speech, video, sample rates, coding scheme, ...)
  • 5. CLASSIFICATION OF AUDIO WATERMARKING Temporal watermarking • Temporal watermarking hides watermarks directly into digital audio signals in the time domain. Spectral water-marking • The spectral audio watermarking applies certain frequency transform, such as FFT, DCT, and DWT, etc, to the data block of the audio signal, and hides the watermark information Into the transformed data block.
  • 6. AUDIO WATERMARKING SCHEMES  DC level shifting  QMF bank band division  Frequency masking  Spread spectrum
  • 7. DC LEVEL SHIFTING  Here watermark is embedded by shifting the DC level of the audio signal.  An input signal is divided into frames of fixed length.  DC level of each frame =Mean of a frame-value in the frame  After that a binary watermark sequence generated randomly is introduced to the shifted signal.  This is achieved by introducing a DC offset level to each frame in the signal according to the watermark bits.  If the watermark bit is 0, the signal is shifted downward.  If the watermark bit is 1, the signal is shifted upward. Cont..
  • 8. DC LEVEL SHIFTING level0=-DCBiasMultiplier x FramePower level1=+DCBiasMultiplier x FramePower where level0 ->DC level introduced when a watermark bit is 0 level1 -> the DC level introduced when a watermark bit is 1.  To extract a watermark, a watermarked signal is first divided into frames.  Then, the mean of each frame is calculated. If the mean of a frame is positive, the corresponding watermark bit is 1. Else, the watermark bit is 0.  The original signal and watermark is not needed in the extraction process. Therefore, DC level shifting is a blind watermarking scheme.
  • 9. Band Division Based on Quadrature Mirror Filter (QMF) Bank Cont..
  • 11.  Watermarked signal is filtered by the analysis filter bank and the low frequency watermarked band is extracted out.  The modified MDCT coefficients are calculated out and watermark can be determined by rounding the coefficients and observe whether coefficients are even or odd. Watermark is 1 when coefficients are odd. Watermark is 0 when coefficients are even. This technique has a  High signal to noise ratio  The rate of detection or bit error rate is very high WATERMARKED SIGNAL EXTRACTION USING QMF
  • 12. FREQUENCY MASKING  Watermarking involves hiding a faint but audible sound under another louder sound (original sound).  So the faint sound becomes inaudible and it acts as a watermark for the original sound.  Watermark is generated firstly by creating a pseudo-noise sequence (PN sequence) from a shift register.  The shift register consists of m flip-flops with a maximum period of (2m) – 1. Cont..Visit www.seminarlinks.blogspot.com to download
  • 13.  PN sequence is filtered along with the filter that approximates the frequency characteristics of the human auditory system (HAS).  Consequently, it is put through to the time domain for temporal masking.  The frequency masking algorithm is robust to coding, multiple watermarking, and resampling.  Different watermark can be embedded by this algorithm into the same signal and is easy to detect by the owner.  The detection scheme for this algorithm needs the original input signal, which is not flexible  From the extraction scheme, frequency masking is a private watermarking.
  • 14. SPREAD SPECTRUM Where wi is element of watermark y is the watermarked signal A correlation detector is carried out to detect the presence of the watermark and is described by Eqn where N is vector cardinality Cont..
  • 15. SPREAD SPECTRUM While x can be modelled as Gaussian random vector, the normalised correlation test is described as Eqn   1 0, / ^ 2 x C Q p N N N      If p = 1, watermark is present If p=0, watermark is not present
  • 16. ANALYSIS OF VARIOUS TECHNIQUES • DC level shifting algorithm  The robustness level for the DC level shifting is poor  The watermark can be easily removed by altering the DC levels of the signal and the watermark is destroyed. • Frequency Masking  This method is not robust to filtering because watermark is embedded to all frequency bands.  Attack by high pass filter MPEG can erase the watermark. Cont..
  • 17. • Spread Spectrum & Band Division Based On QMF  Both the band division method and the spread spectrum method are capable of defending against the MP3 compression, but the spread spectrum has a better detection rate than the band division method.  The implementation steps for spread spectrum are more complicated. This makes it hard to hack and breakdown the algorithm. • Band Division Based On QMF  Band division technology performs extraction scheme with no original signal require attacks are still not upgraded to hack down this audio watermarking technology.
  • 18. CONCLUSION  Watermark can be embedded in an audio signal without being recognized by hearing and the perceptibility requirement is fulfilled .  Extraction can be done without the presence of the original signal and the watermark itself, so can be classified as blind or public watermarking.