SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
AUDIO WATERMARKING AND
STEGANOGRAPHY
Anirudh Shekhawat
Manan Shah
Prateek Srivastava
Pratik Poddar



Guided by: Prof. Bernard Menezes
DIGITAL WATERMARKING
 Embedding perceptually transparent data in
  digital media
 Watermark can be detected and retrieved by a
  computer algorithm
 Applications include broadcast monitoring,
  fingerprinting, copyright protection and
  steganography
STEGANOGRAPHY
 Steganography literally means "secret writing”
 Hiding data in a digital media

 Avoids the suspicion and scrutiny an encrypted
  message would arouse
 Applications include "covert communication”

 Examples from history - Invisible ink, Scalp
  tattoo, Pinholes
APPLICATIONS
COPYRIGHT PROTECTION
 Ownership information can be embedded in the
  media
 Presence of the watermark can be demonstrated
  to prove ownership
 The watermark must survive compression
FINGERPRINTING
 Embedding a serial number in each copy of a
  media before distribution
 Can be used to trace down the originator of a
  particular illegal copy of media
 The watermark must be secure against attacks
BROADCAST MONITORING
 Programs and advertisements broadcasted can be
  monitored by an automated system
 Illegal broadcasts can be identified by monitoring
  satellite nodes
 High Bit rate and low complexity are required
COVERT COMMUNICATION
 Embedding data such that existence of a
  watermark cannot be detected
 Aimed at protecting the sender and receiver
  rather than the message
 Terrorists have been reported to hide messages
  in images to communicate
CHARACTERISTICS OF A
WATERMARKING ALGORITHM
PERCEPTUAL TRANSPARENCY
 Primary requirement in watermarking
 Watermark should be imperceptible to human
  auditory system
 Watermarking is more difficult for audio as
  compared to images
WATERMARK BIT RATE
 Represented in bits per second (bps)
 Required rates vary across applications (0.5 bps
  in copyright protection and 15 bps in broadcast
  monitoring)
 Attainable values depend upon level of
  compression of audio
ROBUSTNESS
 The ability of the watermark to survive common
  signal processing manipulations
 Required against a predefined set of
  manipulations
 Required in some applications (radio broadcast
  monitoring) but not at all required in some
  (tampering detection)
BLIND AND INFORMED DETECTION
 Informed: with access to original(host) audio
 Blind: without access to original audio

 Informed techniques are more secure

 Examples
     Blind: Tampering detection, Information Carrier
     Informed: Steganography
SECURITY
 Adversary must not be able to detect the
  existence of embedded data
 Not be able to extract or modify the data without
  the secret key
 In some cases the watermark is encrypted before
  being embedded
ALGORITHMS AND DEMO
1) LEAST SIGNIFICANT BIT ENCODING
 Watermark added in the least significant bit of
  amplitude
 Easy to embed and retrieve

 High bit rate

 Low robustness
WATERMARKING, COMPRESSION &
REDUNDANCY
 Lossy compression destroys watermark.
 To make watermark robust against compression,
  we need sufficient redundancy
 LSB encoding: Robustness vs Imperceptibility?



 LSB Watermarking in JPEG done 
 Possible for MP3?
2) PHASE MODULATION
 Embed watermark by modulating phase in host
  audio
 Robust against signal processing manipulations

 Extraction or detection of watermark needs
  original audio
 Suitable for applications where security and
  robustness are important, e.g. copyright
  protection
3) FREQUENCY DOMAIN STEGANOGRAPHY
 Shanon Sampling theorem
 Sampling rate for CD is 44.1KHz    the highest
  frequency is 18KHz
 Average peak frequency which a human can hear
  is 18Khz

       22 – 18 = 4KHz band goes unused
UNDERLYING PRINCIPLE
   Use the 18Khz - 22KHz frequency band to hide
    the message


    Message
    signal



                                           Base
                                           signal




                   Fig : Combined Signal
MERITS AND DEMERITS

   Merits
      Longer message can be hidden in a given base
     Less likely to be affected by errors during
      transmission


   Demerits
     Message signal has limited frequency range
     Low recovery quality
4) ECHO HIDING
   Embeds data by introducing “echo” in the original
    signal.




   Resilient to lossy data compression algorithms.
ECHO ENCODING AND DECODING



                             Encoding




                             Decoding
THE END.. QUESTIONS?
REFERENCES
   Juergen Seitz, Digital Watermarking for Digital Media, ISBN
    159140519X, 2005, Information Resources Press, Arlington, VA,
    USA

   Nedeljko Cvejic, Algorithms for audio watermarking and
    steganography, ISBN 9514273834, 2004, Oulu University Press,
    Oulu

   C.H. Yeh & C.J Kuo, Digital watermarking through quasi m-arrays,
    Proceedings of the IEEE Workshop on Signal Processing Systems
    1999, 456-461

   Guy Belloch, Introduction to Data Compression, Draft version,
    Algorithms in the real world

   Kuo S, Johnston J, Turin W & Quackenbush S Covert audio-
    watermarking using perceptually tuned signal independent
    multiband phase modulation, IEEE International Conference on
    Acoustics, Speech, and Signal Processing 2002, 1753-1756
REFERENCES
    Foo, S.W., Yeo, T.H., & Huang, D.Y. (2001). An adaptive audio
    watermarking system. Proceedings of the IEEE Region 10
    International Conference on Electrical and Electronic Technology,
    509–513.


   Huang, D.Y., & Yeo, Y.H. (2002). Robust and inaudible multi-echo
    audio watermarking. Proceedings of the IEEE Pacific-Rim Conference
    on Multimedia, 615–622.


   Bender, W., Gruhl D. Echo Hiding, International Workshop on
    Information Hiding, 1996.

Mais conteúdo relacionado

Mais procurados

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Ankush Kr
 
Watermarking
WatermarkingWatermarking
Watermarking
Pushkar Dutt
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
Manush Desai
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
Ankush Kr
 

Mais procurados (20)

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Stegnography
StegnographyStegnography
Stegnography
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
MPEG Compression Standards
MPEG Compression StandardsMPEG Compression Standards
MPEG Compression Standards
 

Destaque (12)

Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Steganography
SteganographySteganography
Steganography
 
File000133
File000133File000133
File000133
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
SteganographySteganography
Steganography
 

Semelhante a Audio Watermarking and Steganography

Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
IAEME Publication
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
CSCJournals
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
Ankit Gupta
 

Semelhante a Audio Watermarking and Steganography (20)

Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Digital audio watermarking applications
Digital audio watermarking applicationsDigital audio watermarking applications
Digital audio watermarking applications
 
40120130406010 2-3-4-5-6
40120130406010 2-3-4-5-640120130406010 2-3-4-5-6
40120130406010 2-3-4-5-6
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Quality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by SpectrumQuality and Distortion Evaluation of Audio Signal by Spectrum
Quality and Distortion Evaluation of Audio Signal by Spectrum
 
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdfaudio-watermarking-with-encryption-IJERTV6IS090174.pdf
audio-watermarking-with-encryption-IJERTV6IS090174.pdf
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITYDATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
DATA HIDING IN AUDIO SIGNALS USING WAVELET TRANSFORM WITH ENHANCED SECURITY
 
F017253244
F017253244F017253244
F017253244
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive samplingDWT-SMM-based audio steganography with RSA encryption and compressive sampling
DWT-SMM-based audio steganography with RSA encryption and compressive sampling
 
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
 
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umtsSecurity in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
 

Mais de Pratik Poddar (10)

Guide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITiansGuide to wall street quant jobs for IITians
Guide to wall street quant jobs for IITians
 
Art of Puzzle Solving
Art of Puzzle SolvingArt of Puzzle Solving
Art of Puzzle Solving
 
Clipr Introduction
Clipr IntroductionClipr Introduction
Clipr Introduction
 
Clipr rodinhood openhouse
Clipr rodinhood openhouseClipr rodinhood openhouse
Clipr rodinhood openhouse
 
Grad School101
Grad School101Grad School101
Grad School101
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
Non-convex Optimization in Networks
Non-convex Optimization in NetworksNon-convex Optimization in Networks
Non-convex Optimization in Networks
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Audio Watermarking and Steganography

  • 1. AUDIO WATERMARKING AND STEGANOGRAPHY Anirudh Shekhawat Manan Shah Prateek Srivastava Pratik Poddar Guided by: Prof. Bernard Menezes
  • 2. DIGITAL WATERMARKING  Embedding perceptually transparent data in digital media  Watermark can be detected and retrieved by a computer algorithm  Applications include broadcast monitoring, fingerprinting, copyright protection and steganography
  • 3. STEGANOGRAPHY  Steganography literally means "secret writing”  Hiding data in a digital media  Avoids the suspicion and scrutiny an encrypted message would arouse  Applications include "covert communication”  Examples from history - Invisible ink, Scalp tattoo, Pinholes
  • 5. COPYRIGHT PROTECTION  Ownership information can be embedded in the media  Presence of the watermark can be demonstrated to prove ownership  The watermark must survive compression
  • 6. FINGERPRINTING  Embedding a serial number in each copy of a media before distribution  Can be used to trace down the originator of a particular illegal copy of media  The watermark must be secure against attacks
  • 7. BROADCAST MONITORING  Programs and advertisements broadcasted can be monitored by an automated system  Illegal broadcasts can be identified by monitoring satellite nodes  High Bit rate and low complexity are required
  • 8. COVERT COMMUNICATION  Embedding data such that existence of a watermark cannot be detected  Aimed at protecting the sender and receiver rather than the message  Terrorists have been reported to hide messages in images to communicate
  • 10. PERCEPTUAL TRANSPARENCY  Primary requirement in watermarking  Watermark should be imperceptible to human auditory system  Watermarking is more difficult for audio as compared to images
  • 11. WATERMARK BIT RATE  Represented in bits per second (bps)  Required rates vary across applications (0.5 bps in copyright protection and 15 bps in broadcast monitoring)  Attainable values depend upon level of compression of audio
  • 12. ROBUSTNESS  The ability of the watermark to survive common signal processing manipulations  Required against a predefined set of manipulations  Required in some applications (radio broadcast monitoring) but not at all required in some (tampering detection)
  • 13. BLIND AND INFORMED DETECTION  Informed: with access to original(host) audio  Blind: without access to original audio  Informed techniques are more secure  Examples  Blind: Tampering detection, Information Carrier  Informed: Steganography
  • 14. SECURITY  Adversary must not be able to detect the existence of embedded data  Not be able to extract or modify the data without the secret key  In some cases the watermark is encrypted before being embedded
  • 16. 1) LEAST SIGNIFICANT BIT ENCODING  Watermark added in the least significant bit of amplitude  Easy to embed and retrieve  High bit rate  Low robustness
  • 17. WATERMARKING, COMPRESSION & REDUNDANCY  Lossy compression destroys watermark.  To make watermark robust against compression, we need sufficient redundancy  LSB encoding: Robustness vs Imperceptibility?  LSB Watermarking in JPEG done   Possible for MP3?
  • 18. 2) PHASE MODULATION  Embed watermark by modulating phase in host audio  Robust against signal processing manipulations  Extraction or detection of watermark needs original audio  Suitable for applications where security and robustness are important, e.g. copyright protection
  • 19. 3) FREQUENCY DOMAIN STEGANOGRAPHY  Shanon Sampling theorem  Sampling rate for CD is 44.1KHz the highest frequency is 18KHz  Average peak frequency which a human can hear is 18Khz 22 – 18 = 4KHz band goes unused
  • 20. UNDERLYING PRINCIPLE  Use the 18Khz - 22KHz frequency band to hide the message Message signal Base signal Fig : Combined Signal
  • 21. MERITS AND DEMERITS  Merits  Longer message can be hidden in a given base  Less likely to be affected by errors during transmission  Demerits  Message signal has limited frequency range  Low recovery quality
  • 22. 4) ECHO HIDING  Embeds data by introducing “echo” in the original signal.  Resilient to lossy data compression algorithms.
  • 23. ECHO ENCODING AND DECODING Encoding Decoding
  • 25. REFERENCES  Juergen Seitz, Digital Watermarking for Digital Media, ISBN 159140519X, 2005, Information Resources Press, Arlington, VA, USA  Nedeljko Cvejic, Algorithms for audio watermarking and steganography, ISBN 9514273834, 2004, Oulu University Press, Oulu  C.H. Yeh & C.J Kuo, Digital watermarking through quasi m-arrays, Proceedings of the IEEE Workshop on Signal Processing Systems 1999, 456-461  Guy Belloch, Introduction to Data Compression, Draft version, Algorithms in the real world  Kuo S, Johnston J, Turin W & Quackenbush S Covert audio- watermarking using perceptually tuned signal independent multiband phase modulation, IEEE International Conference on Acoustics, Speech, and Signal Processing 2002, 1753-1756
  • 26. REFERENCES  Foo, S.W., Yeo, T.H., & Huang, D.Y. (2001). An adaptive audio watermarking system. Proceedings of the IEEE Region 10 International Conference on Electrical and Electronic Technology, 509–513.  Huang, D.Y., & Yeo, Y.H. (2002). Robust and inaudible multi-echo audio watermarking. Proceedings of the IEEE Pacific-Rim Conference on Multimedia, 615–622.  Bender, W., Gruhl D. Echo Hiding, International Workshop on Information Hiding, 1996.