共查询到16条相似文献,搜索用时 109 毫秒
1.
音频信息隐藏技术已成为近年来的研究热点之一,将混沌理论引入到音频水印系统的研究中,设计了一种将一段音频作为水印,利用混沌序列选择部分原始音频信号作为载体,将混沌加密后的音频水印嵌入到载体的小波系数中的音频信息隐藏方法。实验表明,水印具有很强的安全性和鲁棒性。 相似文献
2.
3.
4.
为提高回声隐藏方法中水印信息的提取效果和准确率,在原始载体基本不变化的基础上加大水印信息的嵌入量,提出了一种使用双向回声核来增加隐藏效果和嵌入量并对水印信息进行BCH编码以利于提高提取准确率的方法,利用功率倒谱方法来确定水印嵌入位置便于增加水印信息的提取率.仿真实验结果表明,该方法算法简单、执行效率高、水印隐藏效果好,在受到恶意攻击后提取出的水印信息的准确率远远高于原方法. 相似文献
5.
6.
基于听觉效果的数字音频水印算法的设计 总被引:1,自引:0,他引:1
黄力 《计算机测量与控制》2011,19(6)
为了提高音频水印嵌入的数据量和嵌入的效果,提出了一种基于人耳听觉效果的数字音频水印嵌入算法;该算法利用人耳对声音的滞后掩蔽效应,在声音中的一些被屏蔽掉的区域嵌入水印信息,达到扩大水印信息量和减少对音频信息的影响;设计的算法采用过零率和音频信号能量实现水印的嵌入,使用同步信号实现水印信息的定位,利用水印信号和帧段数量的相互关系来实现水印的提取;测试结果表明,该算法具有较强的鲁棒性,能够抵御典型的水印攻击技术。 相似文献
7.
8.
音频数字水印中回声隐藏技术的时域提取方法 总被引:4,自引:0,他引:4
回声隐藏是利用音频作载体的一种信息隐藏技术。根据音频数字水印的应用情况,提出了时域水印提取的方法,通过matlah仿真实现。并在此基础上,提出了利用空余隐藏量降低误码率的改进方法。实验证明,在44100Hz采样频率的条件下完全可以获得很好的音频数字水印的运用效果。 相似文献
9.
10.
本文提出了一种基于倒谱变换的自同步数字音频水印算法。算法对音频载体分段后,将同步码嵌入到时域上,将水印信息嵌入到变换域上。水印的提取不需要原始音频信号,是一种盲水印算法。实验结果表明,嵌入后的水印不仅具有很好的不可感知性,而且对添加噪声、重新采样、低通滤波、重新量化和剪切攻击也具有很好的稳健性。 相似文献
11.
Highly Robust, Secure, and Perceptual-Quality Echo Hiding Scheme 总被引:1,自引:0,他引:1
Chen O.T.-C. Wen-Chih Wu 《IEEE transactions on audio, speech, and language processing》2008,16(3):629-638
Audio watermarking using echo hiding has fairly good perceptual quality. However, security and the tradeoff between robustness and imperceptibility are still relevant issues. This paper presents the echo hiding scheme in which the analysis-by-synthesis approach, interlaced kernels, and frequency hopping are adopted to achieve high robustness, security, and perceptual quality. The amplitudes of the embedded echoes are adequately adapted during the embedding process by considering not only the characteristics of the host signals, but also cases in which the watermarked audio signals have suffered various attacks. Additionally, the interlaced kernels are introduced such that the echo positions of the interlaced kernels for embedding "zero" and "one" are interchanged alternately to minimize the influence of host signals and various attacks on the watermarked data. Frequency hopping is employed to increase the robustness and security of the proposed echo hiding scheme in which each audio segment for watermarking is established by combining the fractions selected from all frequency bands based on a pseudonoise sequence as a secret key. Experimental results indicate that the proposed analysis-by-synthesis echo hiding scheme is superior to the conventional schemes in terms of robustness, security, and perceptual quality. 相似文献
12.
Waleed Al-Nuaimy Mohsen A.M. El-Bendary Amira Shafik Farid Shawki A.E. Abou-El-azm N.A. El-Fishawy Said M. Elhalafawy Salaheldin M. Diab Bassiouny M. Sallam Fathi E. Abd El-Samie H.B. KazemianAuthor vitae 《Digital Signal Processing》2011,21(6):764-779
This paper presents a new approach for audio watermarking using the Singular Value Decomposition (SVD) mathematical technique. The proposed approach can be used for data hiding in the audio signals transmitted over wireless networks and for multi-level security systems as will be stated in the applications section. This approach is based on embedding a chaotic encrypted watermark in the singular values of the audio signal after transforming it into a 2-D format. The selection of the chaotic encryption algorithm for watermark encryption is attributed to its permutation nature, which resists noise, filtering, and compression attacks. After watermark embedding, the audio signal is transformed again into a 1-D format. The transformation between the 1-D and 2-D formats is performed in the well-known lexicographic ordering method used in image processing. The proposed approach can be implemented on the audio signal as a whole or on a segment-by-segment basis. The segment-by-segment implementation allows embedding the same watermark several times in the audio signal, which enhances the detectability of the watermark in the presence of severe attacks. Experimental results show that the proposed audio watermarking approach maintains the high quality of the audio signal and that the watermark extraction and decryption are possible even in the presence of attacks. 相似文献
13.
语音回声信息隐藏技术研究 总被引:1,自引:0,他引:1
回声信息隐藏是通过在语音媒体中加入不同延时的回声来实现信息隐藏的一种技术。采用易于检测的前向一后向回声核构建了回声信息隐藏系统。介绍了前向一后向回声核的构成原理和倒谱检测方法,仿真并分析了系统关键参数对隐藏信息恢复率的影响,如延迟时间、分段长度、回声的衰减系数等。通过引入8个延时的回声实现了8进制信息隐藏,使隐藏信息的容量提高了3倍,在采样频率为8kHz的条件下达到150bit/s,恢复率大于99%。20人的非正式试听表明,隐藏信息后的语音和原始语音没有明显的差别且优于单回声的语音质量,得到了较好的隐藏效果。 相似文献
14.
15.