首页 | 本学科首页   官方微博 | 高级检索  
     

基于陷阱策略的音频数字水印新方法
引用本文:王让定,蒋刚毅,陈金儿,朱斌.基于陷阱策略的音频数字水印新方法[J].计算机研究与发展,2006,43(4):613-620.
作者姓名:王让定  蒋刚毅  陈金儿  朱斌
作者单位:宁波大学信息科学与工程学院,宁波,315211
基金项目:中国科学院资助项目;浙江省自然科学基金;浙江省宁波市博士基金
摘    要:数字水印已经成为实现多媒体版权保护的一项重要技术.提出在嵌入鲁棒性水印的同时考虑攻击的行为特征,辅以陷阱策略抵制各种攻击.水印以量化音频DCT系数的方式嵌入,在提取时针对攻击的行为特征以不同方式提取水印.算法嵌入的水印为一幅二值图像,能抵制随机裁剪、AD及DA转换、低通滤波等去同步型攻击,提取的水印可以直接分辨.与cocktail水印方法相比,所提方法的鲁棒性高,提取水印时不需要原始音频.实验结果说明我们的音频水印方法十分有效.

关 键 词:数字水印  音频水印  陷阱策略  攻击行为
收稿时间:09 22 2004 12:00AM
修稿时间:01 11 2005 12:00AM

An New Method of Audio-Digital Watermarking Based on Trap Strategy
Wang Rangding,Jiang Gangyi,Chen Jin'er,Zhu Bin.An New Method of Audio-Digital Watermarking Based on Trap Strategy[J].Journal of Computer Research and Development,2006,43(4):613-620.
Authors:Wang Rangding  Jiang Gangyi  Chen Jin'er  Zhu Bin
Abstract:The recent growth of network multimedia systems has increased the need for the protection of digital media. This is particularly important for the protection and enhancement of intellectual property rights. The ubiquity of digital media in Internet and digital library applications has called for new methods in digital copyright protection and new measures in data security. Digital watermarking techniques have been developed to meet the needs for these growing concerns and have become active areas of research.A new scheme for robust, high-quality embedded audio coding is presented in this paper, in which the effect of different attacks is taken into account and the trap strategy is designed. Trap strategy can assure that if the strong attack can removes the watermark embedded in audio, it destroys the watermarked audio as well, or else the watermark can be detected with very high response. Watermarks are embedded by quantizing audio's DCT coefficients using the trap strategy and extracted by different ways due to different attacks. The binary image used as watermark is embedded to audio pieces. De-synchronization attacks can be resisted in this algorithm, such as random clipping some audio samples, A?D and D?A conversion, low-pass filtering and so on. The extracted watermark can be identified directly. Compared with the former algorithm (cocktail watermarking) in the method, watermark is blind detected with a very high detector response. Experimental results demonstrate that this audio watermarking scheme is remarkably effective.
Keywords:digital watermarking  audio watermarking  trap strategy  attack behavior
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号