Post on 26-Mar-2015
transcript
DIGITAL BLIND AUDIO WATERMARKING FOR
E-LEARNING MEDIABy:
Youngseock Lee, Jongweon Kim
Research done at:Chungwoon University, Sangmyung University
2
Motivation- Why Watermark?
The need to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i.e. DVD) - the reading device must be able to modify the watermark
Content protection – content stamped with a visible
watermark that is very difficult to remove so that it can
be publicly and freely distributed
What is a Watermark?
• A watermark is a “secret message” that is embedded into a “cover (original or host) message”.
• Only the knowledge of a secret key allows us to extract the watermark from the cover message.
• Effectiveness of a watermarking algorithm is a function of its– Resilience to attacks.
– Capacity.
– Stealth.
What Can Be Watermarked?
• Multimedia data.– Video.
– Audio.
– Still Images.
– Documents.
• Software.
• Hardware designs.
E- learning contentsProtection!
Multimedia Watermarks
• A digital watermark is a “secret key dependent” signal “inserted” into digital multimedia data.
• Watermark can be later detected/extracted in order to make an assertion about the data.
• A digital watermark can be.– Visible (perceptible).
– Invisible (imperceptible).
Watermark Applications
• Proof of ownership.– Prove ownership in a court of law.– Simple copyright notice may not help for digital
multimedia data. Easily destroyed.• Copy prevention or control.
– Recording device may inhibit recording a signal if detected watermark indicates that it is prohibited.
– DVD video and digital music distribution.• Content protection (visible watermarks).
– Destruction of watermark destroys the content.
Watermark Applications
• Authentication.– Detect if image/video has been altered.– Digital cameras.
• Media Bridging.– Bridge media such as magazines and the
Internet.• Broadcast Monitoring.
– Keep track of when and where an advertisement is played.
Watermark Applications
• Fingerprinting.– Identify the source of an illegal copy.– Unique watermark embedded in each copy.– DiVX, a modified version of DVD.
• Secret Communications.– Hide information such that general public do not
know its presence.– Bin Laden hides attack plans in images on the web
– USA Today, Feb. 26, 2001.
9
Some Digital Watermarking Types (1/2)
Visible vs. Invisible: Visible such as a company logo stamped on an image or
Video. Invisible intended to be imperceptible to the human eye or
inaudible. the watermark can only be determined through watermark extraction or detection by computers.
Fragile vs. Robust : Fragile watermarks break down easily. Robust survive manipulations of content.
10
Some Digital Watermarking Types (2/2)
● Public vs. private – Private watermarking techniques require that the original be used as a basis of encryption whereas public does not
● Public-key vs. secret-key – Secret-key watermarking uses the same watermarking key to read the content as the key that was inserted into the image; public key uses different keys for watermarking the image and reading the image
11
Desired Properties ( 1/2)
(1) Robustness: A watermark must be difficult or impossible to remove, at least without visibly degrading the original image. A watermark must survive image modifications.
– Geometric distortions: rotation, scaling, translation, etc.
(2) Tamper Resistance: The watermark must resist any type of attacks, what ever the intentions are: remove or modify
12
Desired Properties ( 2/2)
(3) Economically implementable: Time and effort, cost.
(4) Unambiguous: The watermark, when retrieved, should unambiguously identify the owner.
(5) Capacity: The amount of information that can be embedded
(6) Quality: (High Quality) - Quality not degraded
13
Properties Tradeoff
Robustness
CapacityQuality
Embedding and Extraction Complexity
14
Why do we need to study attacks?
– Identify weakness
– Propose improvement – Security– Attackers are knowledgeable, creative,
have lots of time, and are numerous
15
Attackers Main Goal
Attackers seek to destroy watermark for the
purposes of use without having to pay
royalties to the originator of the content.
Watermark Attacks
• Active Attacks.– Hacker attempts to remove or destroy the
watermark.
– Watermark detector unable to detect watermark.
– Key issue in proof of ownership, fingerprinting, copy control.
– Not serious for authentication or covert communication.
Watermark Attacks
• Passive Attacks.– Hacker tries to find if a watermark is present.– Removal of watermark is not an aim.– Serious for covert communications.
• Collusion Attacks.– Hacker uses several copies of watermarked data
(images, video etc.) to construct a copy with no watermark.
– Uses several copies to find the watermark.– Serious for fingerprinting applications.
Watermark Attacks
• Forgery Attacks.–Hacker tries to embed a valid
watermark.
–Serious in authentication.
–If hacker embeds a valid authentication watermark, watermark detector can accept bogus or modified media.
[19]
General Framework of Watermarking
marked media(w/ hidden data)
embedembeddata to be data to be hiddenhidden
host media
compresscompress
process / process / attackattack
extractextract
play/ record/…play/ record/…extracted extracted datadata
playerplayer
101101 …101101 …
““Hello, World”Hello, World”
101101 …101101 …
““Hello, World”Hello, World”test media
20
Important Definitions
• Cover : Audio-video, text in which data will be hidden
• Watermark: What is actually added to the cover
• Information: message to be added • Watermarking key: Secret parameter needed for
embedding & detecting the watermark & extracting the information
• Watermarking Function: Embedding & Extraction algorithms.
21
Audio Watermarking
• Echo Data Hiding– Discrete copies of the original signal are
mixed in with the original signal creating echoes of each sound.
– By using two different time values between an echo and the original sound, a binary 1 or binary 0 can be encoded.
22
Inaudible echo theory
• If the offset or delay is short then the echo produced will be unperceivable.
• Depends on the quality of recording but max delay without effect is noted to be around 1 ms.
• Also, initial amplitude and decay rate can also be set below the audible threshold of the human ear.
23
Echo Data Hiding
• Echo introduced to hide data into audio signal
• Echo is varied with three parameters:
– Initial Amplitude
– Decay Rate
– Offset
25
Encoding
• The audio signal is divided into multiple windows.
• Two delay times are used to encode the hidden data.– Binary 0 encoded with delay = offset
– Binary 1 encoded with delay = offset + delta.
26
FIR Filter
• A simple FIR Filter equation is used to delay the audio signal.
• H(z) = 1 +g*z –d
– g = initial amplitude– d = delay
• Therefore two impulses are used; one to copy the original signal and one to introduce an echo.
27
Final Encoding Step
• Filter original signal separately through both binary “one” and “zero” filter.
• Use mixer signal that contains a ramping function to switch between 0 and 1 encodings.
28
Decoding
• Decoding is done by finding the delay before the echo.
• First find the Cepstrum of the encoded signal.
– Finding the Cepstrum makes the echo delay more pronounced and easier to detect.
– F-1(ln(F(x))2) : Inverse log fast Fourier transform
• Then find the autocorrelation of the Cepstrum signal.
29
Result of Auto-Correlation of Cepstrum
PROPOSED SYSTEM
CONVOLUTION
SUMMATION
10110...1001
WATERMARK
(bit stream)
AUDIO
WATERMARKEDAUDIO
TRANSMISSION
CHANNEL
PN SEQUENCE
DELAY
EXAMPLES
Original Audio
Watermarked Audio
One watermark
MPEG LAYER 3 Level: -2 dB
2008/5/27 33
Fig 5.4. Original audio signal
Fig 5.5. Embedded audio signal
34
Experiment with Lossy Compression
• The performance of the scheme is significantly improved by combining with audio watermark, especially when the quality factor of MPEG is low.
• When the quality factor of MPEG is low, the error of the extracted watermark is increased and the watermark is damaged significantly.
• As the error correcting code is provided from the audio watermark, it can survive the attack by lossy compression which is applied to the video channel.
35
Experiment with Resampling
• Echo hiding technique inherits many advantages in resisting the attacks on the watermarked frames. It achieves perceptual invisibility and attacks by image processing techniques.
• Resampling is one of the most common attack to audio watermark.
36
Conclusion
Attacks BER(%)
Proposed The method ref. [9]
Re-sampling 45.2 55.5
Re-quantization 57.3 62.9
Time-scaling 14.6 18.5
MP3 compression 42.3 49.2
Robust against common signal processing attacks!!
Thank you !