首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
This paper presents a new approach for audio watermarking using the Singular Value Decomposition (SVD) mathematical technique. The proposed approach can be used for data hiding in the audio signals transmitted over wireless networks and for multi-level security systems as will be stated in the applications section. This approach is based on embedding a chaotic encrypted watermark in the singular values of the audio signal after transforming it into a 2-D format. The selection of the chaotic encryption algorithm for watermark encryption is attributed to its permutation nature, which resists noise, filtering, and compression attacks. After watermark embedding, the audio signal is transformed again into a 1-D format. The transformation between the 1-D and 2-D formats is performed in the well-known lexicographic ordering method used in image processing. The proposed approach can be implemented on the audio signal as a whole or on a segment-by-segment basis. The segment-by-segment implementation allows embedding the same watermark several times in the audio signal, which enhances the detectability of the watermark in the presence of severe attacks. Experimental results show that the proposed audio watermarking approach maintains the high quality of the audio signal and that the watermark extraction and decryption are possible even in the presence of attacks.  相似文献   

2.
The singular value decomposition (SVD) mathematical technique is utilized, in this paper, for audio watermarking in time and transform domains. Firstly, the audio signal in time or an appropriate transform domain is transformed to a 2-D format. The SVD algorithm is applied on this 2-D matrix, and an image watermark is added to the matrix of singular values (SVs) with a small weight, to guarantee the possible extraction of the watermark without introducing harmful distortions to the audio signal. The transformation of the audio signal between the 1-D and 2-D formats is performed in the well-known lexicographic ordering method used in image processing. A comparison study is presented in the paper between the time and transform domains as possible hosting media for watermark embedding. Experimental results are in favor of watermark embedding in the time domain if the distortion level in the audio signal is to be kept as low as possible with a high detection probability. The proposed algorithm is utilized also for embedding chaotic encrypted watermarks to increase the level of security. Experimental results show that watermarks embedded with the proposed algorithm can survive several attacks. A segment-by-segment implementation of the proposed SVD audio watermarking algorithm is also presented to enhance the detectability of the watermark in the presence of severe attacks.  相似文献   

3.
In this paper, we propose an adaptive audio watermarking scheme based on kernel fuzzy c-means (KFCM) clustering algorithm, which possesses robust ability against common signal processing and desynchronization attacks. The original audio signal is partitioned into audio frames and then each audio frame is further divided as two sub-frames. In order to resist desynchronization attacks, we embed a synchronization code into first sub-frame of each audio frame by using a mean quantization technique in temporal domain. Moreover, watermark signal is hid into DWT coefficients of second sub-frame of each audio frame by using an energy quantization technique. A local audio feature data set extracted from all audio frames is used to train a KFCM. The well-trained KFCM is used to adaptively control quantization steps in above two quantization techniques. The experimental results show the proposed scheme is robust to common signal processing (such as MP3 lossy compression, noise addition, filtering, re-sampling, re-quantizing) and desynchronization attacks (random cropping, pitch shifting, amplitude variation, time-scale modification, jittering).  相似文献   

4.
抗同步攻击是音频水印领域公开的难题. 相对重心是音频的一个稳定的全局特征量, 对 TSM (Time scale modification)等同步攻击不敏感. 本文提出一种基于相对重心的抗同步攻击的音频水印算法,提出的算法通过量化音频的相对重心生成水印, 生成的水印由混沌序列加密后以量化的方法嵌入载体音频三级小波近似分量均值中. 为了降低同步攻击后同步位置的连续偏移, 水印嵌入提取过程采用了均匀分帧的方法. 实验结果表明提出的算法能抵抗常规信号处理操作, 同时 能抵抗20%的TSM操作(包含音调不变TSM和重采样操作)和 1/10的抖动操作, 有很好的鲁棒性.  相似文献   

5.
目的 基于数字水印技术的音乐作品版权保护是学术界的研究热点之一,多数数字音频水印方案仅仅能够对抗简单的常规信号处理,无法有效抵抗破坏性较强的一般性去同步攻击。为此,提出了一种基于稳健局部特征的非下采样小波域数字水印算法。方法 利用非下采样小波域平滑梯度检测算子从载体音频中提取稳定的音频特征点,结合数字音频样本响应确定局部特征音频段,采用量化调制策略将数字水印信号重复嵌入局部特征音频段中。结果 选取4段典型的采样频率为44.1 kHz、量化精度为16 bit、长度为15 s的单声道数字音频信号作为原始载体进行测试,并与经典算法在不可感知性和鲁棒性两方面进行对比。结果表明,本文算法在含水印音频与原始载体音频间的信噪比平均提升了5.7 dB,同时常规攻击和去同步攻击下的平均检测率分别保持在0.925和0.913,高于大多数传统算法,表明了本文算法具有较好的不可感知性。在常规信号处理(MP3压缩、重新量化、重新采样等)和去同步攻击(幅度缩放、随机剪切、音调伸缩、DA/AD转换、抖动等)方面均具有较好的鲁棒性。结论 本文利用描述能力强且性能稳定的平滑梯度刻画局部数字音频性质,提出一种基于平滑梯度的非下采样小波域音频特征点提取方法,有效解决了音频特征点稳定性差且分布极不均匀的缺点,提高了数字音频水印对音调伸缩、随机剪切、抖动等攻击的抵抗能力。  相似文献   

6.
以均值量化索引调制(MQIM)、特征点为理论基础,提出一种新颖的强鲁棒性数字音频水印技术。该算法选取数字音频的局部能量峰值点作为特征,提取稳定的特征点;以特征点为标记,对特征点后的区域进行分段,利用均值量化索引调制将水印嵌入到原始音频的小波域中。水印提取时无需原始图像。仿真实验表明,提出的算法对常规信号处理(MP3压缩、叠加噪声、重新采样、重新量化等)和去同步攻击(随机剪切、幅度缩放、变调、抖动等)均具有较好的鲁棒性。  相似文献   

7.
本文提出了一种基于倒谱变换的自同步数字音频水印算法。算法对音频载体分段后,将同步码嵌入到时域上,将水印信息嵌入到变换域上。水印的提取不需要原始音频信号,是一种盲水印算法。实验结果表明,嵌入后的水印不仅具有很好的不可感知性,而且对添加噪声、重新采样、低通滤波、重新量化和剪切攻击也具有很好的稳健性。  相似文献   

8.
一种抗裁剪的半脆弱音频水印算法   总被引:1,自引:0,他引:1  
半脆弱水印不但可以容忍一定程度的常规信号处理操作, 而且可以检测出对多媒体数据的恶意篡改并定位篡改区域. 本文提出一种抗裁剪的半脆弱音频水印算法, 具有以下特点: 1)充分利用多级置乱技术准确定位篡改区域, 最大限度改善被篡改后水印的视觉效果; 2)在篡改定位过程中, 无需原始水印参与; 3)利用水印的归一化相关系数, 可进行完整性认证并给出篡改程度的度量. 实验结果表明, 该算法计算简单, 有很好的抗裁剪性能, 同时对篡改的定位也很精确.  相似文献   

9.
Digital watermarking technology is concerned with solving the problem of copyright protection, data authentication, content identification, distribution, and duplication of the digital media due to the great developments in computers and Internet technology. Recently, protection of digital audio signals has attracted the attention of researchers. This paper proposes a new audio watermarking scheme based on discrete wavelet transform (DWT), singular value decomposition (SVD), and quantization index modulation (QIM) with a synchronization code embedded with two encrypted watermark images or logos inserted into a stereo audio signal. In this algorithm, the original audio signal is split into blocks, and each block is decomposed with a two-level DWT, and then the approximate low-frequency sub-band coefficients are decomposed by SVD transform to obtain a diagonal matrix. The prepared watermarking and synchronization code bit stream is embedded into the diagonal matrix using QIM. After that, we perform inverse singular value decomposition (ISVD) and inverse discrete wavelet transform (IDWT) to obtain the watermarked audio signal. The watermark can be blindly extracted without knowledge of the original audio signal. Experimental results show that the transparency and imperceptibility of the proposed algorithm is satisfied, and that robustness is strong against popular audio signal processing attacks. High watermarking payload is achieved through the proposed scheme.  相似文献   

10.
In the field of audio watermarking, reliably embedding the large number of watermarking bits per second in an audio signal without affecting the audible quality of the host audio with good robustness against signal processing attacks is still one of the most challenging issues. In this paper, a high payload, perceptually transparent and robust audio watermarking solution for such a problem by optimizing the existing problem using genetic algorithm is presented. The genetic algorithm in this paper is used to find the optimal number of audio samples required for hiding each watermarking bit. The embedding is done using the imperceptible properties of LU (lower upper) factorization in wavelet domain. This paper addresses the robustness within perceptual constraints at high payload rate in both mathematical analysis and experimental testing by representing behavior of various attacks using attack characterization. Experimental results show that the proposed audio watermarking algorithm can achieve 1280 bps capacity at an average Signal-to-noise ratio (SNR) of 31.02 dB with good robustness to various signal processing attacks such as noise addition, filtering, and compression. In addition, the proposed watermarking algorithm is blind as it does not require the original signal or watermark during extraction. The comparison of the proposed algorithm with the existing techniques also shows that the proposed algorithm is able to achieve high payload with good robustness under perceptual constraints.  相似文献   

11.
奇偶量化的抗同步攻击音频水印方案   总被引:1,自引:0,他引:1       下载免费PDF全文
提出一种基于奇偶量化的音频水印算法,算法具有如下特点:(1)在音频信号的时间域上检索满足条件的同步信号区,同步信号区是一段具有一定长度且能量较大的音频信号;这种时间域上的同步检索具有较高的效率;(2)水印图像划分成若干块,把每一个水印分块及其分块编号嵌入在一个同步信号区的小波变换低频系数上,水印图像划分成分块循环嵌入到检索到的同步信号区,当含水印的音频信号被裁剪后,可以确保在其他音频段提取出正确的水印分块;(3)水印检测不需要参考原始音频信号,是一种盲检测水印算法。仿真实验证明了算法对常见的音频信号处理具有较好的鲁棒性和不可感知性,对同步攻击、抖动攻击具有很好的鲁棒性。  相似文献   

12.
基于m序列的音频水印隐藏算法   总被引:1,自引:0,他引:1  
该文提出基于m序列的音频信息隐藏算法,将需要隐藏的水印信息进行m序列的扩展;对数字音频信号进行分段离散小波变换,最后将经过调制的水印信号嵌入到二层小波变换的中频系数中。在接收端,利用盲检测可以精确地提取水印信号。实验仿真结果表明:算法对原始载体音频信号的影响极小,具有较好的鲁棒性和透明性。  相似文献   

13.
It is a challenging work to design a robust audio watermarking scheme against various attacks. Wavelet moment invariances are new features combining the moment invariant features and the wavelet features, and they have some excellent characteristics, such as the ability to capture local information, robustness against common signal processing, and the linear relationship between a signal and its wavelet moments etc. Based on wavelet moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance against most attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly, with the spatial watermarking technique, synchronization code is embedded into the statistics average value of audio samples in the first part. And then, map 1D digital audio signal in the second part into 2D form, and calculate its wavelet moments. Finally, the watermark bit is embedded into the average value of modulus of the low-order wavelet moments. Meanwhile combining the two adjacent synchronization code searching technology, the algorithm can extract the watermark without the help from the origin digital audio signal. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signals processing such as MP3 compression, noise addition, resampling, and re-quantization etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, and jittering etc.  相似文献   

14.
用于内容认证的半脆弱音频零水印算法   总被引:1,自引:0,他引:1  
提出了一种可用于版权和内容认证的半脆弱音频零水印算法,该算法提取载体音频的中低频分量构造零水印,确保了水印算法的不可感知性,并可实现盲检测。采用自适应的音频分帧方法,合理地分配了水印图像的像素点,从而提高了算法的篡改定位能力和对于常规攻击的鲁棒性。同时利用多级置乱技术消除水印图像的相关性,提高了算法的安全性以及对于常规攻击的鲁棒性。算法不但可进行完整性认证,还可以通过篡改评估准确定位篡改区域。实验结果表明,该算法对于常规攻击具有较好的鲁棒性,对恶意攻击还体现了很强的篡改定位能力。  相似文献   

15.
提出一种可抵抗MP3压缩的稳健的数字音频盲水印算法。该算法通过对音频小波域的近似分量进行分段以嵌入水印。水印提取时按音频特征实现自适应重分段,同时自动调整提取强度,解决了音频特征在MP3压缩前后不一致的矛盾,并实现了盲提取。实验结果显示该算法能有效抵抗MP3压缩、重采样、低通滤波和叠加白噪声等多种攻击。  相似文献   

16.
Content-based audio content authentication algorithms provide a method to solve the veracity and integrity of audio content. On the basic of pseudo-Zernike moments, an audio content authentication algorithm robust against feature-analysed substitution attack is proposed, which is aimed at some insecure issues in the existing content-based audio content authentication schemes. Firstly, the audio signal is cut into non-overlapping frames and each frame is divided into two segments, and each segment is scrambled. Then, synchronization codes generated by pseudo random sequence and watermark bits generated by pseudo-Zernike moments are embedded in the first and second segment, respectively, which are completed by quantizing the modulus of pseudo-Zernike moments. The scrambled segments used to generate and extract watermark are unknown to attackers. So, it is difficult for attackers to get the watermark generated and extracted to perform feature-analysed substitution attack. The synchronization code and watermark embedding method proposed is inaudible and has excellent ability to tolerance against common signal processing operations. Compared with the existing audio watermark algorithms based on pseudo-Zernike moments, the algorithm increases the embedding capacity and improves the security of the watermarking system.  相似文献   

17.
Desynchronization attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work to design a robust audio watermarking scheme against desynchronization attacks. Based on undecimated discrete wavelet transform (UDWT) and invariant histogram, we propose a new content based audio watermarking algorithm with good audible quality and reasonable resistance toward desynchronization attacks in this paper. Firstly, the undecimated discrete wavelet transform (UDWT) is performed on original host audio. Secondly, the invariant histogram is extracted from a selected wavelet coefficients range in the low frequency subband. Then, the bin of histogram is divided into many groups, each group including four consecutive bins. For each group, one watermark bit is embedded by reassigning the number of wavelet coefficients in this group of four bins. Finally, the digital watermark is embedded into the original audio signal in UDWT domain by modifying a small set of wavelet coefficients. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signal processing operations such as MP3 compression, noise addition, and low-pass filtering etc, but also robust against the desynchronization attacks such as random cropping, time-scale modification, pitch shifting, and jittering etc.  相似文献   

18.
Desynchronization attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work to design a robust audio watermarking scheme against desynchronization attacks. Based on pseudo-Zernike moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance toward desynchronization attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly, with the spatial watermarking technique, synchronization code is embedded into the statistics average value of audio samples in the first part. And then, map 1D digital audio signal in the second part into 2D form, and calculate its pseudo-Zernike moments. Finally, the watermark bit is embedded into the average value of modulus of the low-order pseudo-Zernike moments. Meanwhile combining the two adjacent synchronization code searching technology, the algorithm can extract the watermark without the help from the origin digital audio signal. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signals processing such as MP3 compression, noise addition, resampling, re-quantization, etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, jittering, etc.  相似文献   

19.
刘娇  费耀平  李敏 《计算机应用研究》2008,25(12):3728-3731
结合人类听觉系统,提出了一种基于倒谱变换的自适应音频水印算法,充分利用复倒谱变换的性质,将原始音频信号分成若干帧,每帧实施复倒谱变换后,在对应位置按照一定的方法嵌入水印信号。水印的提取不需要原始音频信号,是一种盲水印算法。实验结果表明,嵌入后的水印不仅具有很好的不可感知性,而且对添加噪声、重新采样、低通滤波和重新量化等攻击也具有很好的鲁棒性。  相似文献   

20.
吕林涛  王伟 《计算机工程》2009,35(21):169-170
针对现有公钥水印算法抗几何攻击能力弱的问题,提出一种利用SIFT特征实现抗RST攻击的公钥水印算法,采用SIFT算法对原始图像的特征点进行提取,构造局部特征区域,并在其DCT域中嵌入水印信息,使嵌入水印后的图像能够更好抵御RST攻击,从而满足公钥水印可公开检测的要求。实验结果表明,该算法能够有效抵抗RST攻击和一般信号处理的攻击。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号