This document discusses audio watermarking techniques for copyright protection. It describes embedding a watermark in the mid-range of an audio file's discrete cosine transform (DCT) blocks. Two types of circularly shifted versions of the original watermark are embedded to increase security. The watermarking algorithm can be applied to detect unauthorized distribution of audio files by extracting the embedded watermark and matching it to watermarks stored in a database.
1 of 8
More Related Content
Audio Watermarking - JIIT noida 2013-14 by Vaibhav Arora and Isha Garg
1. Least Significant
Bit (LSB)
Least Significant
Bit (LSB)
Discrete Cosine
Transform
Discrete Cosine
Transform
Padded Byte
Stuffing
Padded Byte
Stuffing
Data loss on Resampling
Prone to lossy retrieval
Data loss on Resampling
Prone to lossy retrievalMore Robust Approach
No Loss in data on
Resampling
More Reliable & Secure
3. Embedding in Dual Channel More SecurityEmbedding in Dual Channel More Security
Audio
Sample
Right Channel
Left Channel
Synchronization Code Selects the Channel
Watermarked
Audio
Track
Watermarked
Audio
Track
4. Inverse Discrete Cosine
Transform
Audio DataAudio Data
Block
1
Block
1
Block
2
Block
2
Block
3
Block
3
Block
n
Block
n
Discrete Cosine Transform
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
DCT
Data
Watermark Embedded in AudioWatermark Embedded in Audio
Selecting Mid-Range of DCT BlockSelecting Mid-Range of DCT Block
Mid Range
6. Application of Detecting Distributor of unauthorized
copy of Audio file based on the Algorithm
Application of Detecting Distributor of unauthorized
copy of Audio file based on the Algorithm
APPLICATION
7. Watermark generation for client (unique key)
Upload Audio
Add Client
for Audio
Watermarked Audio is sent to client
Unique Watermark stored in
database for theft detection
Login
Panel
Enter Client
Details
PUBLISHER MODULE
8. Watermark Extraction from audioUpload Audio
Client Information DisplayedClient Information Displayed
Fetching from
Database
[ FOUND ]
DETECTION & TRACKING MODULE
Login Panel
KEY BASEDKEY BASED