Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation,...
-
Upload
mitchell-baldwin -
Category
Documents
-
view
212 -
download
0
Transcript of Audio Watermarking Denis Lebel presented by. MUMT-611: Music Information Acquisition, Preservation,...
Audio Audio WatermarkingWatermarking
Denis Denis LebelLebel
presented by
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 22 / 13 / 13
Presentation OutlinePresentation Outline
IntroductionIntroduction SystemsSystems TechniquesTechniques ApplicationsApplications DiscussionDiscussion ReferencesReferences
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 33 / 13 / 13
IntroductionIntroduction
IdeaIdea: : Embedding an inaudible mark into an Embedding an inaudible mark into an audio signalaudio signal
Originally proposed as a technique to counter music Originally proposed as a technique to counter music piracypiracy
Analogical to the technique used for paper (e.g., money)Analogical to the technique used for paper (e.g., money)
First audio watermarking techniques were directly First audio watermarking techniques were directly inspired from previous research on image watermarkinginspired from previous research on image watermarking
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 44 / 13 / 13
IntroductionIntroduction
Fingerprinting vs WatermarkingFingerprinting vs Watermarking
• FingerprintingFingerprinting analyzes the signal and constructs a analyzes the signal and constructs a unique signatureunique signature Signal is not modifiedSignal is not modified Requires a repositoryRequires a repository No preprocessing requiredNo preprocessing required
• WatermarkingWatermarking hides information in the audio signal hides information in the audio signal Signal is alteredSignal is altered Self-containedSelf-contained Signal must be preprocessedSignal must be preprocessed
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 55 / 13 / 13
Watermarking SystemsWatermarking Systems
Devices or systems should check for watermark before Devices or systems should check for watermark before proceeding with operationsproceeding with operations
A detection mechanism is requiredA detection mechanism is required
A key A key (as in cryptography)(as in cryptography) is generally used during is generally used during construction and detectionconstruction and detection• SymmetricSymmetric (same key)(same key)
Both construction and detection use a private keyBoth construction and detection use a private key• AsymmetricAsymmetric (different keys)(different keys)
Construction uses a private key and detection uses a Construction uses a private key and detection uses a public keypublic key
Watermark is permanent. Audio data can still be used.Watermark is permanent. Audio data can still be used.• Contrasts with encryptionContrasts with encryption: temporary and content only : temporary and content only
usable when decryptedusable when decrypted
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 66 / 13 / 13
Watermarking SystemsWatermarking Systems
PropertiesProperties
• InaudibilityInaudibility:: No sound quality degradationNo sound quality degradation
• RobustnessRobustness:: Resistance to ANY signal transformationResistance to ANY signal transformation
• CapacityCapacity:: Bit rateBit rate
• ReliabilityReliability:: Error rate during detectionError rate during detection
• Low ComplexityLow Complexity:: EfficiencyEfficiency
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 77 / 13 / 13
Watermarking SystemsWatermarking Systems
Psychoacoustic models are often used to ensure inaudibilityPsychoacoustic models are often used to ensure inaudibility
Figure 2: Watermarking shaping example. (Kim 2003)Figure 1: Masking curve example. (Kim 2003)
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 88 / 13 / 13
TechniquesTechniques
Spread-SpectrumSpread-Spectrum• Spreads pseudo-random sequence across time-domain signal or Spreads pseudo-random sequence across time-domain signal or
transform signaltransform signal• Pseudo-random sequence is generated using a secret keyPseudo-random sequence is generated using a secret key• Watermark is embedded as a modulation of pseudo-random sequenceWatermark is embedded as a modulation of pseudo-random sequence• Watermark is scaled according to a psychoacoustic modelWatermark is scaled according to a psychoacoustic model
Figure 4: Spread-spectrum scheme. (Kim 2003)
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 99 / 13 / 13
TechniquesTechniques
ReplicaReplica• Uses the original signal itself to create the watermarkUses the original signal itself to create the watermark
• ExampleExample:: Echo HidingEcho Hiding Introduce echo in time domainIntroduce echo in time domain Watermark bit values are embedded using 2 different Watermark bit values are embedded using 2 different delay valuesdelay values
Detection finds delay length used to determine watermarkDetection finds delay length used to determine watermark Masking is usedMasking is used
• Could also be done in frequency domainCould also be done in frequency domain ExampleExample: : Frequency shiftingFrequency shifting
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 1010 / 13 / 13
TechniquesTechniques
Self-MarkingSelf-Marking• Embed special signal in the audioEmbed special signal in the audio• ExampleExample:: Embedding a peak in frequency domainEmbedding a peak in frequency domain
Two-SetTwo-Set• Statistical method based on hypothesis testing and relying Statistical method based on hypothesis testing and relying
on large data setson large data sets• Pseudo-random process to insert a certain statistic into Pseudo-random process to insert a certain statistic into
the audio signalthe audio signal• Usually applied in frequency domainUsually applied in frequency domain• ExampleExample:: Patchwork AlgorithmPatchwork Algorithm
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 1111 / 13 / 13
ApplicationsApplications
CopyrightsCopyrights• Proof of ownershipProof of ownership• Enforcement of usage policyEnforcement of usage policy
Forensic watermarkingForensic watermarking• Fragile watermarkingFragile watermarking• Fingerprint watermarkingFingerprint watermarking
Information hidingInformation hiding• Added valueAdded value• AnnotationAnnotation
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 1212 / 13 / 13
DiscussionDiscussion
Is watermarking really useful? What could it be used Is watermarking really useful? What could it be used for?for?
What could be done for copyright protection?What could be done for copyright protection?
MUMT-611: Music Information Acquisition, Preservation, and MUMT-611: Music Information Acquisition, Preservation, and RetrievalRetrieval 1313 / 13 / 13
ReferencesReferences
Gomes, L., P. Cano, E. Gomez, M. Bonnet, and E. Battle. 2003. Audio Gomes, L., P. Cano, E. Gomez, M. Bonnet, and E. Battle. 2003. Audio watermarking and fingerprinting: For which applications? watermarking and fingerprinting: For which applications? Journal of New Journal of New Music ResearchMusic Research 32 (1): 65–81. 32 (1): 65–81.
Craver, S., M. Wu, and B. Liu. 2001. What can we reasonably expect from Craver, S., M. Wu, and B. Liu. 2001. What can we reasonably expect from watermarks? watermarks? IEEE Workshop on the Applications of Signal Processing to IEEE Workshop on the Applications of Signal Processing to Audio and AcousticsAudio and Acoustics. 223–6.. 223–6.
Kim, H, Y. Choi, J. Seok, and J. Hong. 2004. Audio watermarking Kim, H, Y. Choi, J. Seok, and J. Hong. 2004. Audio watermarking techniques. In techniques. In Intelligent watermarking techniques,Intelligent watermarking techniques, edited by J. Pan, H. edited by J. Pan, H. Huang, and L. Jain, 185–219. River Edge, N.J.: World Scientific.Huang, and L. Jain, 185–219. River Edge, N.J.: World Scientific.