DIGITAL BLIND AUDIO WATERMARKING FOR ELEARNING MEDIA By
DIGITAL BLIND AUDIO WATERMARKING FOR E-LEARNING MEDIA By: Youngseock Lee, Jongweon Kim Research done at: Chungwoon University, Sangmyung University
Motivation- Why Watermark? n The need to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i. e. DVD) the reading device must be able to modify the watermark n Content protection – content stamped with a visible watermark that is very difficult to remove so that it can be publicly and freely distributed 2
What is a Watermark? • A watermark is a “secret message” that is embedded into a “cover (original or host) message”. • Only the knowledge of a secret key allows us to extract the watermark from the cover message. • Effectiveness of a watermarking algorithm is a function of its – Resilience to attacks. – Capacity. – Stealth.
What Can Be Watermarked? • Multimedia data. – Video. – Audio. – Still Images. – Documents. • Software. • Hardware designs. E- learning contents Protection!
Multimedia Watermarks • A digital watermark is a “secret key dependent” signal “inserted” into digital multimedia data. • Watermark can be later detected/extracted in order to make an assertion about the data. • A digital watermark can be. – Visible (perceptible). – Invisible (imperceptible).
Watermark Applications • Proof of ownership. – Prove ownership in a court of law. – Simple copyright notice may not help for digital multimedia data. Easily destroyed. • Copy prevention or control. – Recording device may inhibit recording a signal if detected watermark indicates that it is prohibited. – DVD video and digital music distribution. • Content protection (visible watermarks). – Destruction of watermark destroys the content.
Watermark Applications • Authentication. – Detect if image/video has been altered. – Digital cameras. • Media Bridging. – Bridge media such as magazines and the Internet. • Broadcast Monitoring. – Keep track of when and where an advertisement is played.
Watermark Applications • Fingerprinting. – Identify the source of an illegal copy. – Unique watermark embedded in each copy. – Di. VX, a modified version of DVD. • Secret Communications. – Hide information such that general public do not know its presence. – Bin Laden hides attack plans in images on the web – USA Today, Feb. 26, 2001.
Some Digital Watermarking Types (1/2) l Visible vs. Invisible: Visible such as a company logo stamped on an image or Video. l Invisible intended to be imperceptible to the human eye or inaudible. the watermark can only be determined through watermark extraction or detection by computers. l l Fragile vs. Robust : Fragile watermarks break down easily. l Robust survive manipulations of content. l 9
Some Digital Watermarking Types (2/2) ● Public vs. private – Private watermarking techniques require that the original be used as a basis of encryption whereas public does not ● Public-key vs. secret-key – Secret-key watermarking uses the same watermarking key to read the content as the key that was inserted into the image; public key uses different keys for watermarking the image and reading the image 10
Desired Properties ( 1/2) (1) Robustness: A watermark must be difficult or impossible to remove, at least without visibly degrading the original image. A watermark must survive image modifications. – Geometric distortions: rotation, scaling, translation, etc. (2) Tamper Resistance: The watermark must resist any type of attacks, what ever the intentions are: remove or modify 11
Desired Properties ( 2/2) (3) Economically implementable: Time and effort, cost. (4) Unambiguous: The watermark, when retrieved, should unambiguously identify the owner. (5) Capacity: The amount of information that can be embedded (6) Quality: (High Quality) - Quality not degraded 12
Properties Tradeoff Robustness Quality Capacity Embedding and Extraction Complexity 13
Why do we need to study attacks? – Identify weakness – Propose improvement – Security – Attackers are knowledgeable, creative, have lots of time, and are numerous 14
Attackers Main Goal Attackers seek to destroy watermark for the purposes of use without having to pay royalties to the originator of the content. 15
Watermark Attacks • Active Attacks. – Hacker attempts to remove or destroy the watermark. – Watermark detector unable to detect watermark. – Key issue in proof of ownership, fingerprinting, copy control. – Not serious for authentication or covert communication.
Watermark Attacks • Passive Attacks. – Hacker tries to find if a watermark is present. – Removal of watermark is not an aim. – Serious for covert communications. • Collusion Attacks. – Hacker uses several copies of watermarked data (images, video etc. ) to construct a copy with no watermark. – Uses several copies to find the watermark. – Serious for fingerprinting applications.
Watermark Attacks • Forgery Attacks. – Hacker tries to embed a valid watermark. – Serious in authentication. – If hacker embeds a valid authentication watermark, watermark detector can accept bogus or modified media.
General Framework of Watermarking host media 101101 … marked media (w/ hidden data) data to be hidden embed “Hello, World” compress player extracted 101101 … data “Hello, World” play/ record/… extract [19] process / attack test media
Important Definitions • • Cover : Audio-video, text in which data will be hidden Watermark: What is actually added to the cover Information: message to be added Watermarking key: Secret parameter needed for embedding & detecting the watermark & extracting the information • Watermarking Function: Embedding & Extraction algorithms. 20
Audio Watermarking • Echo Data Hiding – Discrete copies of the original signal are mixed in with the original signal creating echoes of each sound. – By using two different time values between an echo and the original sound, a binary 1 or binary 0 can be encoded. 21
Inaudible echo theory • If the offset or delay is short then the echo produced will be unperceivable. • Depends on the quality of recording but max delay without effect is noted to be around 1 ms. • Also, initial amplitude and decay rate can also be set below the audible threshold of the human ear. 22
Echo Data Hiding • Echo introduced to hide data into audio signal • Echo is varied with three parameters: – Initial Amplitude – Decay Rate – Offset 23
Encoding • The audio signal is divided into multiple windows. • Two delay times are used to encode the hidden data. – Binary 0 encoded with delay = offset – Binary 1 encoded with delay = offset + delta. 25
FIR Filter • A simple FIR Filter equation is used to delay the audio signal. • H(z) = 1 +g*z –d – g = initial amplitude – d = delay • Therefore two impulses are used; one to copy the original signal and one to introduce an echo. 26
Final Encoding Step • Filter original signal separately through both binary “one” and “zero” filter. • Use mixer signal that contains a ramping function to switch between 0 and 1 encodings. 27
Decoding • Decoding is done by finding the delay before the echo. • First find the Cepstrum of the encoded signal. – Finding the Cepstrum makes the echo delay more pronounced and easier to detect. – F-1(ln(F(x))2) : Inverse log fast Fourier transform • Then find the autocorrelation of the Cepstrum signal. 28
Result of Auto-Correlation of Cepstrum 29
PROPOSED SYSTEM PN SEQUENCE WATERMARKED AUDIO 10110. . . 1001 WATERMARK CONVOLUTION (bit stream) SUMMATION DELAY TRANSMISSION CHANNEL AUDIO
EXAMPLES Original Audio Watermarked Audio One watermark
MPEG LAYER 3 Level: -2 d. B
Fig 5. 4. Original audio signal Fig 5. 5. Embedded audio signal 2008/5/27 33
Experiment with Lossy Compression • • • The performance of the scheme is significantly improved by combining with audio watermark, especially when the quality factor of MPEG is low. When the quality factor of MPEG is low, the error of the extracted watermark is increased and the watermark is damaged significantly. As the error correcting code is provided from the audio watermark, it can survive the attack by lossy compression which is applied to the video channel. 34
Experiment with Resampling • Echo hiding technique inherits many advantages in resisting the attacks on the watermarked frames. It achieves perceptual invisibility and attacks by image processing techniques. • Resampling is one of the most common attack to audio watermark. 35
Conclusion Attacks BER(%) Proposed The method ref. [9] Re-sampling 45. 2 55. 5 Re-quantization 57. 3 62. 9 Time-scaling 14. 6 18. 5 MP 3 compression 42. 3 49. 2 Robust against common signal processing attacks!! Thank you ! 36
- Slides: 35