Digital rights management Audio watermark Jiamian.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Multimedia: Digitised Sound Data Section 3. Sound in Multimedia Types: Voice Overs Special Effects Musical Backdrops Sound can make multimedia presentations.
Prepared for DA 201  Introduction to Digital Watermarking.
Rob Farraher Ken Pickering Lim Vu
1. Digitization of Sound What is Sound? Sound is a wave phenomenon like light, but is macroscopic and involves molecules of air being compressed and expanded.
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
DIGITAL COMMUNICATIONS.  The modern world is dependent on digital communications.  Radio, television and telephone systems were essentially analog in.
Internet Piracy. History In the 1980’s mail was used to distribute pirated material Pirated material originally consisted of copyrighted games, software,
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Computer Concepts 2013 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Fifth International Conference on Information
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
1 Issues in Digital Audio. 2 Intellectual Property  Non-tangible property that is the result of creativity:  Patents – products, processes etc.  Copyright.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
UFCEXR-20-1Multimedia Sound Production Multimedia Sound Production and Copyright.
Digital Watermarking Parag Agarwal
Computer Concepts – Illustrated 8 th edition Unit C: Computer Software.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Chapter 8: Digital Media1 Digital Media Chapter 8.
CPS 182s 1.1 Digital Watermark l What is a watermark? A digital watermark?  Message about a work is embedded in the work l What is steganography?  The.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Computers Are Your Future Tenth Edition Spotlight 7: Multimedia Devices Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
How to Achieve Robustness & Fragility in Watermarking Technology.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
The Ethical Use of Electronic Media. V Computer Ethics  Resources such as images and text on the Internet are copyrighted.  Plagiarism (using.
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
ActivatedAudio™ Watermarking Suite Activated Content Media and Entertainment Services Company Founded in 2001 Customers include UMG, Sony / BMG, and Sterling.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Chapter 1. SIGNAL PROCESSING:  Signal processing is concerned with the efficient and accurate extraction of information in a signal process.  Signal.
CSE725.  Watermarking dates back in History.  Cryptography for protection.  Need of software for ownership protection.
 Speech  Narration—also called voice overlay or voice track  Dialogue—between two or more characters  Direct Address—talking straight at the.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
The Ethical Use of Electronic Media. Guilford County SciVis V
By :- Ishank Ranjan Akash Gupta. Audio & Audio File Formats Audio is an electrical or other representation of sound. An audio file format is a file format.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Copyright Laws & Regulations
Copyright Computer crime and cyber security.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Multimedia: Digitised Sound Data
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Digital Watermarking for Image Authentication with Localization
Authors: J.J. Murillo-Fuentes
Digital Watermarking Lecture 2
Presentation transcript:

Digital rights management Audio watermark Jiamian

Outline Definition Mechanism Properties Application Case discussion

1.definition What is audio watermark?

1.definition Watermark a.origin: paper manufacture b.definition:an identification code embedded in an electronic document that is used to identify the ownership or authenticate a document c.type:image watermark audio watermark video watermark

1.definition Audio watermark A watermark embedded within an audio stream to identify its origination The record industry is losing money!

Outline Definition Mechanism –coming topic Properties Application Case discussion

2.mechanism How does it work?

2.mechanism-main idea

2.mechanism Bitstream Watermarking

Outline Definition Mechanism Properties-coming topic Application Case discussion

3.properties What requirements should be met?

3.properties Efficient Computation: There should be low computational complexity for watermark embedding and extraction No Distortion of Original Signal and no format change Robustness:the ability to detect the watermark after common signal processing operations and hostile attacks Imperceptibility:the watermark should not be noticeable

Different attacks Signal diminishment attack Collusion attack Invertibility attack

Different attack Signal diminishment attack:the removal of a watermark by performing operations of audio signal(conversion,lossy compression, modulation, time stretch)

Different attacks Collusion attack:have copies of multiple works that have been embedded with the same watermark.By averaging the sample values of audio signal, one could estimate the value of the embedded mark,and then subtract it Sample:around 10 Countermeasure: embed more than one watermark make watermarks dependant on the characteristics of audio file itself

Different attacks Invertibility attack:it is possible to embed multiple marks on a single audio file.If Alice has the original file A,Bob ha a counterfeit original B derived from A,then Alice can find her watermark in Bob‘s file but the converse will not happen An attack to this procedure can be created.

3.properties Efficient Computation: There should be low computational complexity for watermark embedding and extraction No Distortion of Original Signal and no format change Robustness:the ability to detect the watermark after common signal processing operations and hostile attacks Imperceptibility:the watermark should not be noticeable

3.property-imperceptibility similarity between the original and watermarked version Original versionWatermarked version

3.property-imperceptibility Almost no difference!

outline Definition Mechanism Properties Application-coming topic Case discussion

4.Application How do we use it?

4.Application Proof of Ownership Access Control Tracing Illegal Copies

4.Application- Proof of Ownership Embedding of Copyright. InformationDuring production, copyright information in the form of a watermark can be anchored directly in the recording.

4.Application- Access Control embed a watermark that is used as a trigger

4.Application- Tracing Illegal Copies Embedding of Recipient Information.Personalize every recording distributed. In such cases information is embedded as a watermark that can be used at a later time to monitor recipients. This can be the recipient's customer number, for example. If these recordings are found later on the Internet, the embedded data can be used to identify the person to whom the recorded material was originally distributed.

Outline Definition Mechanism Properties Application Case study

5.Case study the audio watermarking technology utilized were developed at the Fraunhofer Institute for Integrated Circuits IIS in ErlangenFraunhofer Institute for Integrated Circuits IIS

5.Case study-business module Watermark Embedding: MusicTrace offers software products for embedding digital watermarks into audio signals. By means of these products it is possible to transmit additional information, e.g. a transaction number, hidden in the music. Internet Search: After receiving an order from a customer, MusicTrace searches in websites for music titles or audio books with embedded watermarks using its Internet tracing system. Using this information, the customer can identify the original recipient and, if necessary, take legal action

Business module-watermark embedding ContentMarkPCM: ContentMarkPCM permits embedding of watermarks in uncompressed audio signals. These can either be PCM files or WAVE files. The result of processing is still uncompressed audio files that are provided with watermarks.

Business module-watermark embedding ContentMarkCD: With the aid of ContentMarkCD it is possible to make any desired number of copies of an audio CD, each bearing a different watermark. These audio CDs sound identical to the human ear, however are discernable on the basis of the watermark.

Business module-watermark embedding ContentMarkMP3: ContentMarkMP3 is a product for embedding watermarks in existing MP3 audio files. The format is not changed by the watermark, consequently the MP3 audio file still conforms with standards. After watermarking, the file can be played on any MP3 player and is accepted by any MP3 player software that also accepts the original MP3 file.

Thanks for your attention