Preview

Audio Steganography and Watermarking

Powerful Essays
Open Document
Open Document
43058 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Audio Steganography and Watermarking
ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY

NEDELJKO C VE JIC
Department of Electrical and Information Engineering, Information Processing Laboratory, University of Oulu

OULU 2004

NEDELJKO CVEJIC

ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY

Academic Dissertation to be presented with the assent of the Faculty of Technology, University of Oulu, for public discussion in Kuusamonsali (Auditorium YB210), Linnanmaa, on June 29th, 2004, at 12 noon.

O U L U N Y L I O P I S TO, O U L U 2 0 0 4

Copyright © 2004 University of Oulu, 2004

Supervised by Professor Tapio Seppänen

Reviewed by Professor Aarne Mämmelä Professor Min Wu

ISBN 951-42-7383-4 (nid.) ISBN 951-42-7384-2 (PDF) http://herkules.oulu.fi/isbn9514273842/ ISSN 0355-3213 http://herkules.oulu.fi/issn03553213/

OULU UNIVERSITY PRESS OULU 2004

Cvejic, Nedeljko, Algorithms for audio watermarking and steganography
Department of Electrical and Information Engineering, Information Processing Laboratory, University of Oulu, P.O.Box 4500, FIN-90014 University of Oulu, Finland 2004 Oulu, Finland

Abstract
Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for innovation. Versatile and simple-to-use software and decreasing prices of digital devices have made it possible for consumers from all around the world to create and exchange multimedia data. Broadband Internet connections and near error-free transmission of data facilitate people to distribute large multimedia files and make identical digital copies of them. A perfect reproduction in digital domain have promoted the protection of intellectual ownership and the prevention of unauthorized tampering of multimedia data to become an important technological and research issue. Digital watermarking has been proposed as a new, alternative method to enforce intellectual property rights and protect digital media from tampering. Digital watermarking

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Davide Anghinolfi, Antonio Boccalatte, Alberto Grosso, Massimo Paolucci, Andrea Passadore, Christian Vecchiola, DIST – Department of Communications Computer and System Sciences, University of Genova…

    • 5478 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Gait Recognition

    • 2981 Words
    • 12 Pages

    |N. S. Institute of Technology New Delhi,|N. S. Institute of Technology |Dept. of Electrical Engineering |Dept. of Computer Science |…

    • 2981 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Media Piracy

    • 3439 Words
    • 14 Pages

    A major issue in business today is the protection of intellectual property. While most nations recognize the right to intellectual property, laws differ from one juridical system to another. One common form of protection for intellectual property is a patent. Another important protection of IP is a copyright. Infringement of copyrights has become a salient issue for many businesses that hold intellectual property. In particular, modern multi-media corporations face the universal challenge of piracy of copyrights on electronic and audio-visual media (See Appendix A.1 – A.6 for more information regarding definitions of these terms).…

    • 3439 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Within the audio recording industry, microphone techniques are a way for engineers and producers to be creative and innovative. Many engineers have their ”go-to” techniques that make them a creative force of their craft. There are many “out of the box” miking techniques that are use within the recording industry. Recently I tried some “out of the box” techniques for kick drum that most engineers would consider odd or maybe even fascinatingly interesting. This included many different tunneling type techniques using actual drums as the tunnel.…

    • 634 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Abstract- In this modern world Digital watermarking is of prime importance. This has increased the demand for copyright protection. Digital watermarking is a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. We propose a robust quantization-based image watermarking scheme, called the gradient direction watermarking (GDWM), and based on the uniform quantization of the direction of gradient vectors. In GDWM, the watermark bits are embedded by quantizing the angles of significant gradient vectors at multiple wavelet scales. The proposed scheme has the following advantages: 1) Increased invisibility of the embedded watermark, 2) Robustness to amplitude scaling attacks, and 3) Increased watermarking capacity. To quantize the gradient direction, the DWT coefficients are modified based on the derived relationship between the changes in coefficients and the change in the gradient direction. This watermarking technique is more robust to various sizes of watermark images. The Gaussian filter is a local and linear filter that smoothens the whole image irrespective of its edges or details, whereas the bilateral filter is also a local but non-linear, considers both gray level similarities and geometric closeness of the neighbouring pixels without smoothing edges. The extension of bilateral filter: multi-resolution bilateral filter, where bilateral…

    • 3433 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Bill Lane* Department of Electrical and Computer Engineering Cleveland State University Cleveland, Ohio 44115 EEC 517 April 30, 2008…

    • 5516 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Modern Steganography

    • 1774 Words
    • 8 Pages

    This paper introduces steganography, the art and science of hidden writing. The purpose of steganography is to hide the existence of a secret message from a third party. The most popular modern application of steganography involves concealing messages within least significant bits of image or sound files. Another application of modern steganography is a steganographic file system. Steganography is also used by some modern printers, where tiny yellow dots that contain encoded printer serial numbers, as well as other information, are added to each printed page.…

    • 1774 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Ratcheting Analysis

    • 16374 Words
    • 66 Pages

    Submitted in partial fulfillment of the requirements for the award of the degree of Master of Technology by…

    • 16374 Words
    • 66 Pages
    Powerful Essays
  • Powerful Essays

    Watermarking was introduced for image processing and then it extended for security of text and multimedia data.Now days, it is also used for software and database. There are two phases of the Database Watermarking Techniques. Watermark Embedding and Watermark Verification. During watermark embedding phase, a private key K (known only to the owner) is used to embed the watermark W into the original database. The watermarked database is then made publicly available. To verify the ownership of a suspicious database, the verification process is performed where the suspicious database is taken as input and by using the private key K the embedded watermark is extracted and compared with the original watermark information[5]. The novel approach for the copyright protection for outsourced database for the watermarking,In which watermark is embedded into the secret key and the chaotic random series.for the detection process there is no need of original database and to judge the…

    • 3087 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    The speech, being a fundamental way of communication, has been embedded in various applications. The central methods for enhancing speech are removal of background noise, echo suppression or artificially bringing certain frequencies into speech signal. In this project, an attempt has been made towards studying speech enhancement techniques like Spectral Subtraction, Minimum Mean Square Error (MMSE), Kalman and Wiener filter.…

    • 3824 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Abstract Examples

    • 1204 Words
    • 5 Pages

    1 Center for Multimedia and Network Technology, School of Computer Engineering, Nanyang Technological University, Singapore 639798, Singapore…

    • 1204 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Mimo

    • 4122 Words
    • 17 Pages

    Liang Dong, Hao Ling, and Robert W. Heath, Jr. Department of Electrical and Computer Engineering The University of Texas, Austin, TX 78712…

    • 4122 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    What Is Midi ?

    • 522 Words
    • 3 Pages

    • Basic Ideas of compression (see next Chapter) used as integral part of audio format --…

    • 522 Words
    • 3 Pages
    Good Essays
  • Good Essays

    sound proofing

    • 938 Words
    • 5 Pages

    Noise pollution disorders the balance or activities in mankind or habitat. The source of most outdoor noise worldwide is mainly machinery, vehicular transportation, aircraft, and trains. Poor urban planning tends to worsen noise pollution, since adjacent industrial and residential structures can result in noise pollution in the residential areas.…

    • 938 Words
    • 5 Pages
    Good Essays