Introduction to Audio Watermarking Schemes

Similar documents
IMPROVING AUDIO WATERMARK DETECTION USING NOISE MODELLING AND TURBO CODING

Audio Watermark Detection Improvement by Using Noise Modelling

An Improvement for Hiding Data in Audio Using Echo Modulation

High capacity robust audio watermarking scheme based on DWT transform

Method to Improve Watermark Reliability. Adam Brickman. EE381K - Multidimensional Signal Processing. May 08, 2003 ABSTRACT

DWT based high capacity audio watermarking

Audio Watermarking Based on Multiple Echoes Hiding for FM Radio

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

Data Hiding in Digital Audio by Frequency Domain Dithering

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

A Scheme for Digital Audio Watermarking Using Empirical Mode Decomposition with IMF

TWO ALGORITHMS IN DIGITAL AUDIO STEGANOGRAPHY USING QUANTIZED FREQUENCY DOMAIN EMBEDDING AND REVERSIBLE INTEGER TRANSFORMS

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates

Digital Image Watermarking by Spread Spectrum method

An Enhanced Least Significant Bit Steganography Technique

Performance Analysis of Parallel Acoustic Communication in OFDM-based System

11th International Conference on, p

FPGA implementation of DWT for Audio Watermarking Application

Audio Informed Watermarking by means of Dirty Trellis Codes

A High-Rate Data Hiding Technique for Uncompressed Audio Signals

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Acoustic Communication System Using Mobile Terminal Microphones

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

8.3 Basic Parameters for Audio

Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I

Journal of mathematics and computer science 11 (2014),

Localized Robust Audio Watermarking in Regions of Interest

Multiple Sound Sources Localization Using Energetic Analysis Method

Peculiarities of use of speech acoustic environment while embedding into it of hidden message codes

MPEG-4 Structured Audio Systems

Signals and Systems Lecture 9 Communication Systems Frequency-Division Multiplexing and Frequency Modulation (FM)

A Blind EMD-based Audio Watermarking using Quantization

Adaptive Selection of Embedding. Spread Spectrum Watermarking of Compressed Audio

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 7, NO. 4, AUGUST On the Use of Masking Models for Image and Audio Watermarking

Surround: The Current Technological Situation. David Griesinger Lexicon 3 Oak Park Bedford, MA

Speech Watermarking for the VHF Radio Channel

Reduction of Musical Residual Noise Using Harmonic- Adapted-Median Filter

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10]

Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code

TOWARD ROBUSTNESS OF AUDIO WATERMARKING SYSTEMS TO ACOUSTIC CHANNELS. Emmanuel Wolff, Cléo Baras, and Cyrille Siclet

Live multi-track audio recording

Fundamentals of Digital Communication

Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT)

A Optimized and Secure Audio Steganography for Hiding Secret Information - Review

Data Hiding In Audio Signals

Improving Meetings with Microphone Array Algorithms. Ivan Tashev Microsoft Research

Enhanced Waveform Interpolative Coding at 4 kbps

Performance Improving LSB Audio Steganography Technique

The psychoacoustics of reverberation

Spread Spectrum Techniques

Different Approaches of Spectral Subtraction Method for Speech Enhancement

Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm

Comparative study of digital audio steganography techniques

Audio Watermarking Scheme in MDCT Domain

Analyzing Pulse Position Modulation Time Hopping UWB in IEEE UWB Channel

Experimental Validation for Hiding Data Using Audio Watermarking

THE advent of the digital age with the Internet revolution

Frame Synchronization Symbols for an OFDM System

Ninad Bhatt Yogeshwar Kosta

Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

ECE 556 BASICS OF DIGITAL SPEECH PROCESSING. Assıst.Prof.Dr. Selma ÖZAYDIN Spring Term-2017 Lecture 2

Physical Layer: Outline

Audio Imputation Using the Non-negative Hidden Markov Model

Communications Theory and Engineering

SIGNALS AND SYSTEMS LABORATORY 13: Digital Communication

Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding

Practical issue: Group definition. TSTE17 System Design, CDIO. Quadrature Amplitude Modulation (QAM) Components of a digital communication system

Design of a Heterogeneous QR code for Internet of Things Based on Digital Watermarking Techniques Ning Zheng1, a and Shuangli Wu2,b

Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique

Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

- Setup and Operation

Matched filter. Contents. Derivation of the matched filter

An Audio Watermarking Method Based On Molecular Matching Pursuit

Chapter 2 Audio Watermarking

Wireless Networks (PHY): Design for Diversity

Presentation Outline. Advisors: Dr. In Soo Ahn Dr. Thomas L. Stewart. Team Members: Luke Vercimak Karl Weyeneth. Karl. Luke

Watermarked Movie Soundtrack Finds the Position of the Camcorder in a Theater

Research Article A Robust Zero-Watermarking Algorithm for Audio

FPGA implementation of LSB Steganography method

Robustness (cont.); End-to-end systems

MINUET: MUSICAL INTERFERENCE UNMIXING ESTIMATION TECHNIQUE

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

EXPERIMENTAL INVESTIGATION INTO THE OPTIMAL USE OF DITHER

Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

EE5713 : Advanced Digital Communications

Performance Evaluation of STBC-OFDM System for Wireless Communication

Topic. Spectrogram Chromagram Cesptrogram. Bryan Pardo, 2008, Northwestern University EECS 352: Machine Perception of Music and Audio

ROOM SHAPE AND SIZE ESTIMATION USING DIRECTIONAL IMPULSE RESPONSE MEASUREMENTS

Robust and Blind Spatial Watermarking in Digital Image

Pre- and Post Ringing Of Impulse Response

NOISE SHAPING IN AN ITU-T G.711-INTEROPERABLE EMBEDDED CODEC

RECOVERING ASYNCHRONOUS WATERMARK TONES FROM SPEECH.

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems

23rd European Signal Processing Conference (EUSIPCO) ROBUST AND RELIABLE AUDIO WATERMARKING BASED ON DYNAMIC PHASE CODING AND ERROR CONTROL CODING

Transcription:

Introduction to Audio Watermarking Schemes N. Lazic and P. Aarabi, Communication over an Acoustic Channel Using Data Hiding Techniques, IEEE Transactions on Multimedia, Vol. 8, No. 5, October 2006 Multimedia Security

Outline Problem model Previous work Spread spectrum information embedding Implementation parameters Simulation and experimental results Comparison to other techniques Application example: a localization and navigation system Conclusions and future work 2

Information Transmission Transmitting information from one device to another Common mediums Radio frequency Optical connection Cable connection Transmitting acoustically Hiding the information in audio signals, using a speaker as a transmitter and a microphone as a receiver Characteristics Low rate, limited range, but benefit from backward compatibility 3

Data Hiding Procedures for Acoustic Data Transmission Requirements Fast Capability to hide data into arbitrary signals, without prior knowledge of what they are Why not using existing schemes? Robust audio watermarking Non-negligible delay between the host signal and the secret signal Auxiliary information 4

Problem Model [Host-blind decoding scenario] x(t): host audio signal m: message symbol c m (t): a codeword indexed by m f: encoding function y(t) and y (t): transmitted and received signal h(t): room impulse response w(t): noise 5

Auditory Masking The effect by which one sound becomes inaudible in the presence of another sound Frequency masking Frequency Sound pressure level Tone-like or noise-like characteristics Critical bands Human perception of frequency are modeled as a set of overlapping band-pass filters Signals that lie within the same critical band are hard to separate for human ear 6

Critical Bands Davis Yen Pan, Digital Audio Compression, Digital Technical Journal, Vol. 5 No. 2, Spring 1993 7

Critical Bands Davis Yen Pan, Digital Audio Compression, Digital Technical Journal, Vol. 5 No. 2, Spring 1993 8

Frequency-Domain Masking Davis Yen Pan, Digital Audio Compression, Digital Technical Journal, Vol. 5 No. 2, Spring 1993 9

Real-time Imperceptible Acoustic Data Transmission Closely related to audio data hiding Goal of both procedures is to imperceptibly add information to an audio signal Differences lie in Objectives Transmitting arbitrary information vs. simply detecting a hidden signal Attacks Room reverberations + D/A and A/D conversions vs. deliberate signal processing manipulations 10

Existing Audio Data Hiding Schemes Schemes too slow LSB embedding QIM for phase coefficients Adjusting relation between energies of different frames in time domain Echo encoding Simple and real-time Sensitive to the presence of additional echos SS data hiding scheme 11

Sonic Watermarking R. Tachibana, Sonic Watermarking,, EURASIP Journal of Applied Signal Processing, no. 13, October 2004 12

SS Information Embedding Y i [k]=x i [k]+f(c m, X i-1 [k]) Psycho-acoustically adjusting A pseudo-random sequence of length N, drawn from U[0,1] distribution 13

SS Information Embedding (cont.) f(c m, X i-1 [k])=α[k]c m [k] α b [k]=p.max X i-1, b [k] k belongs to b [Encoding the data in real-time is desirable!] The noise in band b never exceeds a pre-defined faction p of the maximum amplitude of X i-1 in the same critical band The host signal will mask the added signal within the same band p controls the tradeoff between the sound quality and code reliability Code range: [0, 1] [0, α b ] Assumes that the frequency content of the host signal does not change significantly from one frame to the next 14

SS Information Decoding Received signal Y [k]=y[k]+w[k] Preprocessing Whitening to negative effects on cross correlation due to scaling Y w,b [k]=y b p[k]/max Y b [k] Code range changes accordingly Correlation coefficients The codeword corresponding to the highest correlation value is selected Synchronization Each codeword is added to 3 consecutive frames N length-n Fourier transforms staring at consecutive samples are taken 15

Implementation Parameters Hanning windowed DFT of overlapping 4096- sample frames # of symbols (codewords): M=2 the length of codeword N=2048 encoded into 20 sec pop music signal White Gaussian noise was added 16

Experimental Results SNR=10 log10 (E host +E code )/E noise 17

Experimental Results (cont.) 0: no audible distortion Barely audible for p<0.2 10 listeners 18

Experimental Results (cont.) Empirical results for p=0.2 19

Experimental Results (cont.) SS Sonic watermarking 20

Experimental Results (cont.) 21

A Localization and Navigation System Reverberation time 0.1 sec First source Always code 1 in music Second source Music only or music with code 2 22

Experimental Results Applications Guiding in a shopping mall or an airport with music played Weather information, shop discounts or flight times 23