**3. Proposed audio watermarking**

comprises of two main steps: (i) embedding method and (ii) extraction method. The secret key could be used for additional level of security. There are fundamentally three sorts of watermarking methods and are described here: (1) non-blind watermarking, (2) semi-blind and (3) blind watermarking. The process of watermarking that uses the original sound signal during the extraction procedure termed as "non-blind watermarking". The watermarking system uses a portion of the segment or some a part of the input audio signal then it is term as a "semi-blind watermarking". The watermarking system helps to retrieve the watermark without use of original audio signal or a part of an audio signal for extraction process termed

*Security and Privacy From a Legal, Ethical, and Technical Perspective*

as "blind watermarking" [14]. The paper covers proposed novel blind audio

sequence of binary bits which is inserted into the host signal. The audio watermarking scheme should have following basic characteristics: inaudibility, payload and robustness. **Figure 1** gives the visual representation of the requirements of data watermarking concept in digital audio, these three requirements

unsuccessful for an unauthorized user in any case.

and is provided by bits per second (bps).

forms the corners of the magic triangle.

lossy compression, etc.

the audio is being recorded.

(SNR).

**Figure 1.**

**198**

*Performance parameter magic triangle.*

watermarking scheme and its hardware implementation is performed in Xilinx ISE. The steps of algorithms are covered in Section 3. The watermark consists of a data

1.**Inaudibility:** The inserted data has to be "inaudible" in the watermarked digital music. Evaluation of the same is quantified using signal-to-noise ratio

2. **Security:** The algorithm should be secure where authorized person should able to only retrieve the watermark. The attempt of extracting watermark is to be

3. **Robustness:** The watermark should not be eliminated or removed by applying common processing techniques such as cropping, nonlinear and/or linear filter,

4.**Paylod (capacity):** It is defined as total information to be embedded in the host without having of any distortion. It is usually defined as the bit rate for the audio signal which is the actual number of bits inserted in the original audio

5. **Real-time processing:** The process of inserting into the original signal without much delay. It should be able to insert the watermark at same instance when

The proposed audio watermarking scheme is blind and robust and is based on DWT transformation. In the proposed scheme, only eight-audio samples of a single frame from two channels, is considered for watermarking process. The details of the embedded and extracted process are shown in the following section.
