首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
This paper presents a new approach for audio watermarking using the Singular Value Decomposition (SVD) mathematical technique. The proposed approach can be used for data hiding in the audio signals transmitted over wireless networks and for multi-level security systems as will be stated in the applications section. This approach is based on embedding a chaotic encrypted watermark in the singular values of the audio signal after transforming it into a 2-D format. The selection of the chaotic encryption algorithm for watermark encryption is attributed to its permutation nature, which resists noise, filtering, and compression attacks. After watermark embedding, the audio signal is transformed again into a 1-D format. The transformation between the 1-D and 2-D formats is performed in the well-known lexicographic ordering method used in image processing. The proposed approach can be implemented on the audio signal as a whole or on a segment-by-segment basis. The segment-by-segment implementation allows embedding the same watermark several times in the audio signal, which enhances the detectability of the watermark in the presence of severe attacks. Experimental results show that the proposed audio watermarking approach maintains the high quality of the audio signal and that the watermark extraction and decryption are possible even in the presence of attacks.  相似文献   

2.
A robust multi bit and high quality audio watermarking technique in time domain is proposed in this paper. Watermarking is a technique used to label digital media by hiding copyright or other information into the underlying data. The watermark must be imperceptible and undetectable by the user and should be robust to various types of distortion. To enhance the robustness and taper-resistance of the embedded watermark, in this paper a multi bit technique is employed. Instead of embedding one bit into an audio frame, multiple bits can be embedded into each audio sub-frame. For attackers, since they do not know the parameters, this significantly reduces the possibility of unauthorized bit detection and removal of watermark. In real-time watermarking applications, robustness is not the only factor that plays an important role. The other factor that plays a very an important role is computational complexity. In general, audio file is transmitted in compressed form. Real-time watermark embedding must take into account this compressed form, because first decompressing the data, adding a watermark and then recompressing the data is computationally too demanding. In this paper, we propose robust and low complexity audio watermarking algorithm. To evaluate the performance of the proposed audio watermarking algorithm, subjective and objective quality tests including bit error rate (BER) and signal-to-noise ratio (SNR) were conducted. Compared to traditional one bit embedding algorithm, the proposed algorithm gives highly recovery rate after attack by commonly used audio data manipulations, such as low pass filtering, requantization, resampling, and MP3 compression.  相似文献   

3.
It is a challenging work to design a robust audio watermarking scheme against various attacks. Wavelet moment invariances are new features combining the moment invariant features and the wavelet features, and they have some excellent characteristics, such as the ability to capture local information, robustness against common signal processing, and the linear relationship between a signal and its wavelet moments etc. Based on wavelet moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance against most attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly, with the spatial watermarking technique, synchronization code is embedded into the statistics average value of audio samples in the first part. And then, map 1D digital audio signal in the second part into 2D form, and calculate its wavelet moments. Finally, the watermark bit is embedded into the average value of modulus of the low-order wavelet moments. Meanwhile combining the two adjacent synchronization code searching technology, the algorithm can extract the watermark without the help from the origin digital audio signal. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signals processing such as MP3 compression, noise addition, resampling, and re-quantization etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, and jittering etc.  相似文献   

4.
In digital audio watermarking, the watermark's vulnerability to desynchronization attacks has long been a difficult problem. According to the audio statistics characteristics and synchronization code technique, a new robust audio watermarking scheme against desynchronization attacks is proposed in this paper. Firstly, the original digital audio is segmented and then each audio segment is cut into two parts. Secondly, with the spatial watermarking technique, the synchronization code is embedded into the statistics average value of audio samples in the first part. Finally, the second part of audio segment is cut into audio sections, the DWT is performed on the audio sections, and the watermark bit is embedded into the statistics average value of low frequency components. Experimental results show that the proposed scheme is inaudible and robust against common signals processing, including MP3 compression, low-pass filtering, noise addition, and equalization, etc. Moreover, it also survives several desynchronization attacks, such as random cropping, amplitude variation, pitch shifting, time-scale modification, and jittering, etc.  相似文献   

5.
A new adaptive digital audio watermarking based on support vector machine   总被引:2,自引:0,他引:2  
It is a challenging work to design a robust digital audio watermarking scheme against desynchronization attacks. On the basis of support vector machines (SVMs), a new robust digital audio watermarking algorithm against desynchronization attacks is proposed in this paper, and in this the audio statistics characteristics and synchronization code are utilized. Firstly, the optimal embedding positions are located adaptively by using the SVM theory. Secondly, the 16-bit Barker code is chosen as synchronization mark and embedded into the digital audio by modifying the statistics average value of several samples. Finally, the digital watermark are embedded into the statistics average value of low-frequency components in wavelet domain by making full use of auditory masking. Experimental results show that the proposed scheme is inaudible and robust against common signal processing such as MP3 compression, low-pass filtering, noise addition, equalization, etc., and is robust against desynchronization attacks such as random cropping, amplitude variation, pitch shifting, time-scale modification, jittering, etc.  相似文献   

6.
数字水印是信息隐藏技术的一个重要分支,是一种全新的数字产品保护技术。多功能水印克服了传统数字水印的不足,将多个功能水印嵌入到载体中,具有版权保护、用户跟踪和内容完整性认证三种功能。本文介绍了多功能水印的基本原理,并对典型的多功能水印算法进行了阐述。最后.分析指出了多功能水印技术的研究现状与发展前景。  相似文献   

7.
为确保数字音频数据感知意义上的完整性,提出了一种新的音频认证水印算法。该算法把原始音频分帧,每帧分为两节,在第一节时域中嵌入同步码,将第二节进行DCT变换,计算邻帧关系向量,并将其作为水印信息嵌入其他帧第二节的DCT中频系数。认证时,计算邻帧关系误差,据事先设定的阈值来判断音频是否被窜改,若遭受窜改,可进行窜改定位。仿真实验表明,该算法在无原始水印参与的情况下,不仅可以实现音频媒体的完整性认证,而且窜改定位准确。  相似文献   

8.
可交换加密数字水印(CEW)是一种密码和数字水印相结合的技术,用于多媒体信息安全和版权方面的保护.为了保证载体数据的安全性,提出了基于祖冲之(ZUC)的交换加密水印算法.算法采用ZUC序列密码产生密钥,对载体信息进行模运算加密,水印嵌入操作与数据加密操作的先后顺序,不影响含水印密文数据的产生;在提取水印时,可以实现密码和水印操作的交换.实验表明,密文域提取的水印与明文域提取水印一致,含水印图像的质量高,加解密和水印嵌入提取效率更高,且算法具有一定的鲁棒性.  相似文献   

9.
为了有效解决多媒体数据在传输、存储过程中的安全及版权保护问题,提出基于祖冲之序列密码算法(zuc)与离散小波变换—奇异值分解(DWT-SVD)的交换加密水印算法.该算法基于奇异值不变性,将水印嵌入到奇异值中,通过ZUC算法分别对奇异值矩阵集合、奇异矩阵集合置换加密.水印嵌入操作与加密操作的先后顺序不影响含水印密文的生成,且从含水印密文和解密后的明文中都能提取完整的水印.实验表明,水印的不可见性较好,算法有较高的安全性并具有—定的鲁棒性.  相似文献   

10.
Inaudible watermarking via phase manipulation of random frequencies   总被引:1,自引:1,他引:0  
Watermarking technology can be beneficial in digital rights protection. However, the industry’s acceptance of the technology has been lukewarm as experts have been able to hear audible artifacts introduced during the watermarking process. In this paper, we present what we believe to be a truly inaudible solution to this problem. Our proposed watermarking technique embeds the watermark signal in the phase of an audio signal, with secrecy as to which frequency components carry the watermark bits, achieved via a pseudorandom generator. Inaudibility is realized by exploiting the human auditory system’s insensitivity to absolute phase. Further, our algorithm includes a novel mechanism for segmenting an audio signal into variable frame-lengths to provide robustness against de-synchronization attacks such as jitter and time-scaling. It uses a short-time Fourier transform to first characterize local changes in the frequency content of an audio signal, from which, pairs of frequencies satisfying specified conditions are identified, to mark the start and end of a segment. The insertion of synchronization marks adds further robustness against such attacks. Robustness against other common attacks may be further enhanced through the use of concatenated error-control codes which enable the correction of random and/or burst errors, which may be introduced during an attack.
M. A. ArmandEmail:
  相似文献   

11.
提出了一种基于混沌的DWT域多功能图像数字水印算法。原始水印分为鲁棒水印和半脆弱水印,分别用于版权保护和图像认证。根据不同的应用,鲁棒水印又分为容量小但鲁棒性要求相对高和容量大但鲁棒性要求相对低的两种,它们和半脆弱水印分别嵌入DWT域的不同部分。并利用广义猫映射置乱鲁棒水印和Logistic混沌系统生成半脆弱水印以提高安全性。实验表明,嵌入水印后的图像视觉质量好,其中鲁棒水印能抵抗各种常规图像处理,半脆弱水印能准确地检测并定位内容篡改。  相似文献   

12.
一种DCT域自适应音频水印算法*   总被引:2,自引:1,他引:1  
数字水印技术中水印强度是影响水印鲁棒性的重要参数。当前大多数的水印算法均利用实验来确定水印强度,但实验具有很大的随机性,得到合适的水印强度需要大量的实验。提出了一种DCT(discrete cosine transform)域基于信噪比(signal noise ratio,SNR)水印强度自适应的音频水印。首先将载体音频分帧,然后根据对嵌入水印后音频品质要求的SNR计算各帧的水印强度,选择可嵌入强度大的帧,将一个水印比特信息嵌入一帧的DCT的直流系数,水印强度将自适应于各帧。实验结果证明了该算法具有较好  相似文献   

13.
14.
基于卷积码的盲音频水印算法研究   总被引:1,自引:0,他引:1  
徐达文  王让定 《计算机应用》2006,26(7):1649-1651
提出了一种基于提升小波和卷积码的盲音频水印算法。原始音频信号经过提升小波变换后,选取中低频小波系数进行自适应水印嵌入。水印在嵌入前经过卷积编码和交织预处理,以提高水印系统的抗干扰能力。为了增强算法的鲁棒性,水印提取时采用了软判决Viterbi译码。实验结果表明,该水印算法具有较好的性能。  相似文献   

15.
Copyright violation and illegal manipulation of digital data have been acute challenges for many sectors since the very same set of enabling techniques for generating and processing digital data started to emerge. Although traditional protective methods, such as encryption and digital signatures, have been in use for decades, their inability to provide protection after decryption and locating tampering has prompted the development of digital watermarking. In this paper, a semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar coordinate mapping is proposed. Firstly, the vertices are divided into groups, and for each group, the vertices for carrying a watermark are mapped to the log-polar coordinate system. Then the watermark is embedded in the mantissa of the real-valued log-polar coordinates via bit substitution. Theoretical analysis and experimental results show that the proposed algorithm is not only robust against incidental global operations such as rotation, translation and scaling, but can also detect and locate malicious attacks such as entity modification and entity addition/deletion.  相似文献   

16.
一种兼具版权保护及窜改认证双重功能的数字水印算法   总被引:1,自引:0,他引:1  
针对目前较多数字水印功能单一的不足,提出了一种新的具有双重功能的数字图像水印,首先在原始图像的小波中频区域中,通过比较中心系数与邻域系数均值关系来嵌入版权水印;其次在低频区域中自适应地嵌入半脆弱水印作为认证水印,实现版权保护和窜改认证的双重功能。两种水印的检测和提取都不需要原始图像。采用常规的图像处理操作和恶意窜改操作进行实验,结果表明,该方法透明性好, 版权保护水印对JPEG压缩、裁剪、噪声等攻击抵抗力强, 内容认证水印能够精确地定位窜改,具有很好的应用前景。  相似文献   

17.
复合式的多功能数字水印算法   总被引:2,自引:1,他引:2  
提出了一种鲁棒性数字水印和脆弱性数字水印相结合的复合式水印算法,具有较好的双重保护性能,即鲁棒性数字水印用于版权认证方面和脆弱性数字水印用于图像内容的保护.首先,在原始载体图像的DCT中频域上嵌入不可见水印;其次,再根据LSB算法在空域自适应地嵌入脆弱性数字水印.实验结果表明,该方法不可见性好,对一般的图像处理和攻击,如JPEG压缩、滤波、加噪声、旋转、缩放等都有良好的鲁棒性,同时还能对图像中细微的篡改进行有效精确的定位,并且作为一种盲水印算法有着良好的安全性.  相似文献   

18.
Commutative Watermarking and Encryption (CWE) provides a solution for interoperation between watermarking and encryption. It realizes the challenging operation that embeds a watermark into the encrypted multimedia data directly, which avoids the decryption–watermarking–encryption triples. Till now, few CWE schemes have been reported. They often obtain the commutative property by partitioning multimedia data into independent parts (i.e., the encryption part and the watermarking part). Since the two parts are isolated, it can not keep secure enough against replacement attacks. To avoid the disadvantage, a novel quasi-commutative watermarking and encryption (QCWE) scheme based on quasi-commutative operations is proposed in this paper. In the proposed scheme, the encryption operation and watermarking operation are applied to the same data part. Since the two operations are homogenous with commutative properties, their orders can be commutated. As an example, the scheme for MPEG2 video encryption and watermarking is presented. In this example, the DCs in intra macroblocks are encrypted or watermarked based on random module addition, while the DCs in other macroblocks and all the ACs’ signs are encrypted with a stream cipher or block cipher. Analysis and experiments show that the scheme obtains high perceptual security and time efficiency, and the watermarking and encryption operations can be commutated. These properties make the scheme a suitable choice for efficient media content distribution. Additionally, the paper shows the availability of constructing the commutative watermarking and encryption scheme with homogenous operations, which is expected to activate the new research topic.
Shiguo LianEmail:
  相似文献   

19.
混沌同步的发现为有关混沌的保密通讯研究提供了新的拓广空间。根据广义混沌同步的基本理论构建了一个新的广义混沌同步系统(GCS);利用GCS,提出了一个基于小波变换的鲁棒性数字水印算法。数值模拟实例对该文的理论结果进行了验证,理论分析及实验结果表明,给出的数字水印算法对常用的图像处理方法有较好的鲁棒性。  相似文献   

20.
We proposed a novel discrete fractional Sine transform (DFRST) based watermarking scheme for audio data copyright protection. Chaotic sequences were adopted to improve the security of the proposed watermarking scheme. Simulations under various conditions were given to verify the effectiveness of the audio watermarking scheme. The results show the proposed scheme is secure, and the watermark is imperceptible and robust against various audio signal processing attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号