different domains like frequency and time. By using the different scheme of watermarking at
different levels of audio, it can be secure from many types of attacks. This paper shows some
techniques which can be used to secure the audio system from attacks and survey on
various transformation techniques for embedding or extracting watermark.