Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation,...

13
Audio Audio Watermarking Watermarking Denis Denis Lebel Lebel presented by

Transcript of Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation,...

Page 1: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

Audio Audio WatermarkingWatermarking

Denis Denis LebelLebel

presented by

Page 2: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 22 / 13 / 13

Presentation OutlinePresentation Outline

IntroductionIntroduction SystemsSystems TechniquesTechniques ApplicationsApplications DiscussionDiscussion ReferencesReferences

Page 3: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 33 / 13 / 13

IntroductionIntroduction

IdeaIdea: : Embedding an inaudible mark into an Embedding an inaudible mark into an audio signalaudio signal

Originally proposed as a technique to counter music Originally proposed as a technique to counter music piracypiracy

Analogical to the technique used for paper (e.g., money)Analogical to the technique used for paper (e.g., money)

First audio watermarking techniques were directly First audio watermarking techniques were directly inspired from previous research on image watermarkinginspired from previous research on image watermarking

Page 4: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 44 / 13 / 13

IntroductionIntroduction

Fingerprinting vs WatermarkingFingerprinting vs Watermarking

• FingerprintingFingerprinting analyzes the signal and constructs a analyzes the signal and constructs a unique signatureunique signature Signal is not modifiedSignal is not modified Requires a repositoryRequires a repository No preprocessing requiredNo preprocessing required

• WatermarkingWatermarking hides information in the audio signal hides information in the audio signal Signal is alteredSignal is altered Self-containedSelf-contained Signal must be preprocessedSignal must be preprocessed

Page 5: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 55 / 13 / 13

Watermarking SystemsWatermarking Systems

Devices or systems should check for watermark before Devices or systems should check for watermark before proceeding with operationsproceeding with operations

A detection mechanism is requiredA detection mechanism is required

A key A key (as in cryptography)(as in cryptography) is generally used during is generally used during construction and detectionconstruction and detection• SymmetricSymmetric (same key)(same key)

Both construction and detection use a private keyBoth construction and detection use a private key• AsymmetricAsymmetric (different keys)(different keys)

Construction uses a private key and detection uses a Construction uses a private key and detection uses a public keypublic key

Watermark is permanent. Audio data can still be used.Watermark is permanent. Audio data can still be used.• Contrasts with encryptionContrasts with encryption: temporary and content only : temporary and content only

usable when decryptedusable when decrypted

Page 6: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 66 / 13 / 13

Watermarking SystemsWatermarking Systems

PropertiesProperties

• InaudibilityInaudibility:: No sound quality degradationNo sound quality degradation

• RobustnessRobustness:: Resistance to ANY signal transformationResistance to ANY signal transformation

• CapacityCapacity:: Bit rateBit rate

• ReliabilityReliability:: Error rate during detectionError rate during detection

• Low ComplexityLow Complexity:: EfficiencyEfficiency

Page 7: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 77 / 13 / 13

Watermarking SystemsWatermarking Systems

Psychoacoustic models are often used to ensure inaudibilityPsychoacoustic models are often used to ensure inaudibility

Figure 2: Watermarking shaping example. (Kim 2003)Figure 1: Masking curve example. (Kim 2003)

Page 8: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 88 / 13 / 13

TechniquesTechniques

Spread-SpectrumSpread-Spectrum• Spreads pseudo-random sequence across time-domain signal or Spreads pseudo-random sequence across time-domain signal or

transform signaltransform signal• Pseudo-random sequence is generated using a secret keyPseudo-random sequence is generated using a secret key• Watermark is embedded as a modulation of pseudo-random sequenceWatermark is embedded as a modulation of pseudo-random sequence• Watermark is scaled according to a psychoacoustic modelWatermark is scaled according to a psychoacoustic model

Figure 4: Spread-spectrum scheme. (Kim 2003)

Page 9: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 99 / 13 / 13

TechniquesTechniques

ReplicaReplica• Uses the original signal itself to create the watermarkUses the original signal itself to create the watermark

• ExampleExample:: Echo HidingEcho Hiding Introduce echo in time domainIntroduce echo in time domain Watermark bit values are embedded using 2 different Watermark bit values are embedded using 2 different delay valuesdelay values

Detection finds delay length used to determine watermarkDetection finds delay length used to determine watermark Masking is usedMasking is used

• Could also be done in frequency domainCould also be done in frequency domain ExampleExample: : Frequency shiftingFrequency shifting

Page 10: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 1010 / 13 / 13

TechniquesTechniques

Self-MarkingSelf-Marking• Embed special signal in the audioEmbed special signal in the audio• ExampleExample:: Embedding a peak in frequency domainEmbedding a peak in frequency domain

Two-SetTwo-Set• Statistical method based on hypothesis testing and relying Statistical method based on hypothesis testing and relying

on large data setson large data sets• Pseudo-random process to insert a certain statistic into Pseudo-random process to insert a certain statistic into

the audio signalthe audio signal• Usually applied in frequency domainUsually applied in frequency domain• ExampleExample:: Patchwork AlgorithmPatchwork Algorithm

Page 11: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 1111 / 13 / 13

ApplicationsApplications

CopyrightsCopyrights• Proof of ownershipProof of ownership• Enforcement of usage policyEnforcement of usage policy

Forensic watermarkingForensic watermarking• Fragile watermarkingFragile watermarking• Fingerprint watermarkingFingerprint watermarking

Information hidingInformation hiding• Added valueAdded value• AnnotationAnnotation

Page 12: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 1212 / 13 / 13

DiscussionDiscussion

Is watermarking really useful? What could it be used Is watermarking really useful? What could it be used for?for?

What could be done for copyright protection?What could be done for copyright protection?

Page 13: Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation, and Retrieval 2 / 13 Presentation Outline Introduction.

MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 1313 / 13 / 13

ReferencesReferences

Gomes, L., P. Cano, E. Gomez, M. Bonnet, and E. Battle. 2003. Audio Gomes, L., P. Cano, E. Gomez, M. Bonnet, and E. Battle. 2003. Audio watermarking and fingerprinting: For which applications? watermarking and fingerprinting: For which applications? Journal of New Journal of New Music ResearchMusic Research 32 (1): 65–81. 32 (1): 65–81.

Craver, S., M. Wu, and B. Liu. 2001. What can we reasonably expect from Craver, S., M. Wu, and B. Liu. 2001. What can we reasonably expect from watermarks? watermarks? IEEE Workshop on the Applications of Signal Processing to IEEE Workshop on the Applications of Signal Processing to Audio and AcousticsAudio and Acoustics. 223–6.. 223–6.

Kim, H, Y. Choi, J. Seok, and J. Hong. 2004. Audio watermarking Kim, H, Y. Choi, J. Seok, and J. Hong. 2004. Audio watermarking techniques. In techniques. In Intelligent watermarking techniques,Intelligent watermarking techniques, edited by J. Pan, H. edited by J. Pan, H. Huang, and L. Jain, 185–219. River Edge, N.J.: World Scientific.Huang, and L. Jain, 185–219. River Edge, N.J.: World Scientific.