DOC PREVIEW
UT EE 381K - Audio Watermarking

This preview shows page 1-2-3 out of 10 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 10 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

11Audio Audio W a t e r m a r k in gW a t e r m a r k in gAdam BrickmanAdam [email protected]@mail.utexas.eduDepartment of Electrical & Computer EngineeringDepartment of Electrical & Computer EngineeringThe University of Texas at AustinThe University of Texas at AustinMarch 5, 2003March 5, 200322What is Audio What is Audio Wate r m ar k in g ?Wate r m ar k in g ?WhatWhatInsertion of information into an Insertion of information into an audio fileaudio fileMay be done May be done audiblyaudiblyor or inaudiblyinaudiblyMay be done in time or frequencyMay be done in time or frequencyWhyWhyCopyright protectionCopyright protectionControl or hidden descriptionControl or hidden descriptionCovert communicationsCovert communicationsChallengeChallenge: Ear sensitivity: Ear sensitivity33Basic MethodBasic MethodAAfAW'(,)=+InsertionExtractionsim w wwwww( , *)'''=⋅⋅Compare to threshold T44P r e v ious M e thod # 1P r e v ious M e thod # 1Independent Multiband Phase Independent Multiband Phase Modulation [Kuo Modulation [Kuo et alet al, 2002], 2002]Alter phase in limited amountAlter phase in limited amountCovert (nonCovert (non--blind)blind)Intellectual property protectionIntellectual property protection55P r e v ious M e thod # 1P r e v ious M e thod # 1Insertion in Insertion in timetime, , Modulation in Modulation in frequencyfrequencyTime WindowTime Windowwin nnNn N( ) sin(.),=+≤ ≤ −π0501ddbφ< °30φπ( ) sin( ),bbb=+− ≤ ≤21211Φk iiIb a b i b I( ) ( ),= − ≤ ≤=∑φ01Phase Window Phase Window Phase modulationPhase modulation66P r e v ious M e thod # 2P r e v ious M e thod # 2mm--Sequences and Temporal Sequences and Temporal Masking [Cvejic Masking [Cvejic et alet al, 2001], 2001]Can work in realCan work in real--time (fast time (fast algorithm)algorithm)Attack resistantAttack resistantEmploys temporal maskingEmploys temporal maskingWatermark bits spread in timeWatermark bits spread in timeModulation through pseudoModulation through pseudo--noise noise sequencesequenceMM--sequencesequence77P r e v ious M e thod # 2P r e v ious M e thod # 2Temporal AnalysisTemporal AnalysisHelps determine level of power for watermark sequenceHelps determine level of power for watermark sequenceAudio frames Audio frames ≈≈7.6 ms in length7.6 ms in lengthFrequency AnalysisFrequency AnalysisVia zeroVia zero--crossingscrossingsComputes information about audio spectrumComputes information about audio spectrumHigher Higher b(nb(n) values where host audio has higher frequency) values where host audio has higher frequencyynxnanbnwn()()()()()=+⋅⋅88P r e v ious M e thod # 3P r e v ious M e thod # 3Video Watermarking CrossVideo Watermarking Cross--Correlation Correlation [Dittmann, Mukherjee, and Steinebach, [Dittmann, Mukherjee, and Steinebach, 2000]2000]“Content“Content--fragile” watermarkingfragile” watermarkingMPEG files MPEG files ––image + audioimage + audioFile integrityFile integrityWatermark images via audio informationWatermark images via audio informationWatermark audio via image informationWatermark audio via image information99P r e v ious M e thod # 3P r e v ious M e thod # 3Video DomainVideo DomainExtract an imageExtract an imagePattern from audio featuresPattern from audio featuresApply pattern to luminanceApply pattern to luminanceAudio DomainAudio DomainExtract a frameExtract a framePattern from image edge characteristicsPattern from image edge characteristicsApply pattern to audio scale factorsApply pattern to audio scale factors1010C on c l usionC on c l usionInaudibility possible by exploiting characteristics Inaudibility possible by exploiting characteristics of Human Auditory Systemof Human Auditory SystemType of watermark to use dependent on Type of watermark to use dependent on applicationapplicationRobustness vs. CapacityRobustness vs. CapacitySecuritySecurityTransparency (audibility)Transparency (audibility)Future work will build upon crossFuture work will build upon cross--correlation method applied correlation method applied toward stereo (multitoward stereo (multi--channel) audio fileschannel) audio filesGoal is to produce an inaudible watermarkGoal is to produce an inaudible


View Full Document

UT EE 381K - Audio Watermarking

Documents in this Course
Load more
Download Audio Watermarking
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Audio Watermarking and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Audio Watermarking 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?