首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper presents a new approach for audio watermarking using the Singular Value Decomposition (SVD) mathematical technique. The proposed approach can be used for data hiding in the audio signals transmitted over wireless networks and for multi-level security systems as will be stated in the applications section. This approach is based on embedding a chaotic encrypted watermark in the singular values of the audio signal after transforming it into a 2-D format. The selection of the chaotic encryption algorithm for watermark encryption is attributed to its permutation nature, which resists noise, filtering, and compression attacks. After watermark embedding, the audio signal is transformed again into a 1-D format. The transformation between the 1-D and 2-D formats is performed in the well-known lexicographic ordering method used in image processing. The proposed approach can be implemented on the audio signal as a whole or on a segment-by-segment basis. The segment-by-segment implementation allows embedding the same watermark several times in the audio signal, which enhances the detectability of the watermark in the presence of severe attacks. Experimental results show that the proposed audio watermarking approach maintains the high quality of the audio signal and that the watermark extraction and decryption are possible even in the presence of attacks.  相似文献   

2.
A robust multi bit and high quality audio watermarking technique in time domain is proposed in this paper. Watermarking is a technique used to label digital media by hiding copyright or other information into the underlying data. The watermark must be imperceptible and undetectable by the user and should be robust to various types of distortion. To enhance the robustness and taper-resistance of the embedded watermark, in this paper a multi bit technique is employed. Instead of embedding one bit into an audio frame, multiple bits can be embedded into each audio sub-frame. For attackers, since they do not know the parameters, this significantly reduces the possibility of unauthorized bit detection and removal of watermark. In real-time watermarking applications, robustness is not the only factor that plays an important role. The other factor that plays a very an important role is computational complexity. In general, audio file is transmitted in compressed form. Real-time watermark embedding must take into account this compressed form, because first decompressing the data, adding a watermark and then recompressing the data is computationally too demanding. In this paper, we propose robust and low complexity audio watermarking algorithm. To evaluate the performance of the proposed audio watermarking algorithm, subjective and objective quality tests including bit error rate (BER) and signal-to-noise ratio (SNR) were conducted. Compared to traditional one bit embedding algorithm, the proposed algorithm gives highly recovery rate after attack by commonly used audio data manipulations, such as low pass filtering, requantization, resampling, and MP3 compression.  相似文献   

3.
It is a challenging work to design a robust audio watermarking scheme against various attacks. Wavelet moment invariances are new features combining the moment invariant features and the wavelet features, and they have some excellent characteristics, such as the ability to capture local information, robustness against common signal processing, and the linear relationship between a signal and its wavelet moments etc. Based on wavelet moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance against most attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly, with the spatial watermarking technique, synchronization code is embedded into the statistics average value of audio samples in the first part. And then, map 1D digital audio signal in the second part into 2D form, and calculate its wavelet moments. Finally, the watermark bit is embedded into the average value of modulus of the low-order wavelet moments. Meanwhile combining the two adjacent synchronization code searching technology, the algorithm can extract the watermark without the help from the origin digital audio signal. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signals processing such as MP3 compression, noise addition, resampling, and re-quantization etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, and jittering etc.  相似文献   

4.
In digital audio watermarking, the watermark's vulnerability to desynchronization attacks has long been a difficult problem. According to the audio statistics characteristics and synchronization code technique, a new robust audio watermarking scheme against desynchronization attacks is proposed in this paper. Firstly, the original digital audio is segmented and then each audio segment is cut into two parts. Secondly, with the spatial watermarking technique, the synchronization code is embedded into the statistics average value of audio samples in the first part. Finally, the second part of audio segment is cut into audio sections, the DWT is performed on the audio sections, and the watermark bit is embedded into the statistics average value of low frequency components. Experimental results show that the proposed scheme is inaudible and robust against common signals processing, including MP3 compression, low-pass filtering, noise addition, and equalization, etc. Moreover, it also survives several desynchronization attacks, such as random cropping, amplitude variation, pitch shifting, time-scale modification, and jittering, etc.  相似文献   

5.
为确保数字音频数据感知意义上的完整性,提出了一种新的音频认证水印算法。该算法把原始音频分帧,每帧分为两节,在第一节时域中嵌入同步码,将第二节进行DCT变换,计算邻帧关系向量,并将其作为水印信息嵌入其他帧第二节的DCT中频系数。认证时,计算邻帧关系误差,据事先设定的阈值来判断音频是否被窜改,若遭受窜改,可进行窜改定位。仿真实验表明,该算法在无原始水印参与的情况下,不仅可以实现音频媒体的完整性认证,而且窜改定位准确。  相似文献   

6.
A new adaptive digital audio watermarking based on support vector machine   总被引:2,自引:0,他引:2  
It is a challenging work to design a robust digital audio watermarking scheme against desynchronization attacks. On the basis of support vector machines (SVMs), a new robust digital audio watermarking algorithm against desynchronization attacks is proposed in this paper, and in this the audio statistics characteristics and synchronization code are utilized. Firstly, the optimal embedding positions are located adaptively by using the SVM theory. Secondly, the 16-bit Barker code is chosen as synchronization mark and embedded into the digital audio by modifying the statistics average value of several samples. Finally, the digital watermark are embedded into the statistics average value of low-frequency components in wavelet domain by making full use of auditory masking. Experimental results show that the proposed scheme is inaudible and robust against common signal processing such as MP3 compression, low-pass filtering, noise addition, equalization, etc., and is robust against desynchronization attacks such as random cropping, amplitude variation, pitch shifting, time-scale modification, jittering, etc.  相似文献   

7.
数字水印是信息隐藏技术的一个重要分支,是一种全新的数字产品保护技术。多功能水印克服了传统数字水印的不足,将多个功能水印嵌入到载体中,具有版权保护、用户跟踪和内容完整性认证三种功能。本文介绍了多功能水印的基本原理,并对典型的多功能水印算法进行了阐述。最后.分析指出了多功能水印技术的研究现状与发展前景。  相似文献   

8.
Inaudible watermarking via phase manipulation of random frequencies   总被引:1,自引:1,他引:0  
Watermarking technology can be beneficial in digital rights protection. However, the industry’s acceptance of the technology has been lukewarm as experts have been able to hear audible artifacts introduced during the watermarking process. In this paper, we present what we believe to be a truly inaudible solution to this problem. Our proposed watermarking technique embeds the watermark signal in the phase of an audio signal, with secrecy as to which frequency components carry the watermark bits, achieved via a pseudorandom generator. Inaudibility is realized by exploiting the human auditory system’s insensitivity to absolute phase. Further, our algorithm includes a novel mechanism for segmenting an audio signal into variable frame-lengths to provide robustness against de-synchronization attacks such as jitter and time-scaling. It uses a short-time Fourier transform to first characterize local changes in the frequency content of an audio signal, from which, pairs of frequencies satisfying specified conditions are identified, to mark the start and end of a segment. The insertion of synchronization marks adds further robustness against such attacks. Robustness against other common attacks may be further enhanced through the use of concatenated error-control codes which enable the correction of random and/or burst errors, which may be introduced during an attack.
M. A. ArmandEmail:
  相似文献   

9.
提出了一种基于混沌的DWT域多功能图像数字水印算法。原始水印分为鲁棒水印和半脆弱水印,分别用于版权保护和图像认证。根据不同的应用,鲁棒水印又分为容量小但鲁棒性要求相对高和容量大但鲁棒性要求相对低的两种,它们和半脆弱水印分别嵌入DWT域的不同部分。并利用广义猫映射置乱鲁棒水印和Logistic混沌系统生成半脆弱水印以提高安全性。实验表明,嵌入水印后的图像视觉质量好,其中鲁棒水印能抵抗各种常规图像处理,半脆弱水印能准确地检测并定位内容篡改。  相似文献   

10.
11.
Copyright violation and illegal manipulation of digital data have been acute challenges for many sectors since the very same set of enabling techniques for generating and processing digital data started to emerge. Although traditional protective methods, such as encryption and digital signatures, have been in use for decades, their inability to provide protection after decryption and locating tampering has prompted the development of digital watermarking. In this paper, a semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar coordinate mapping is proposed. Firstly, the vertices are divided into groups, and for each group, the vertices for carrying a watermark are mapped to the log-polar coordinate system. Then the watermark is embedded in the mantissa of the real-valued log-polar coordinates via bit substitution. Theoretical analysis and experimental results show that the proposed algorithm is not only robust against incidental global operations such as rotation, translation and scaling, but can also detect and locate malicious attacks such as entity modification and entity addition/deletion.  相似文献   

12.
提出了在小波域中改进的、多目的、同时嵌入认证水印和鲁棒性水印方案。通过一系列实验证明,提出的方法在图像证明和图像处理攻击中具有很高效率。  相似文献   

13.
一种兼具版权保护及窜改认证双重功能的数字水印算法   总被引:1,自引:0,他引:1  
针对目前较多数字水印功能单一的不足,提出了一种新的具有双重功能的数字图像水印,首先在原始图像的小波中频区域中,通过比较中心系数与邻域系数均值关系来嵌入版权水印;其次在低频区域中自适应地嵌入半脆弱水印作为认证水印,实现版权保护和窜改认证的双重功能。两种水印的检测和提取都不需要原始图像。采用常规的图像处理操作和恶意窜改操作进行实验,结果表明,该方法透明性好, 版权保护水印对JPEG压缩、裁剪、噪声等攻击抵抗力强, 内容认证水印能够精确地定位窜改,具有很好的应用前景。  相似文献   

14.
混沌同步的发现为有关混沌的保密通讯研究提供了新的拓广空间。根据广义混沌同步的基本理论构建了一个新的广义混沌同步系统(GCS);利用GCS,提出了一个基于小波变换的鲁棒性数字水印算法。数值模拟实例对该文的理论结果进行了验证,理论分析及实验结果表明,给出的数字水印算法对常用的图像处理方法有较好的鲁棒性。  相似文献   

15.
We proposed a novel discrete fractional Sine transform (DFRST) based watermarking scheme for audio data copyright protection. Chaotic sequences were adopted to improve the security of the proposed watermarking scheme. Simulations under various conditions were given to verify the effectiveness of the audio watermarking scheme. The results show the proposed scheme is secure, and the watermark is imperceptible and robust against various audio signal processing attacks.  相似文献   

16.
Commutative Watermarking and Encryption (CWE) provides a solution for interoperation between watermarking and encryption. It realizes the challenging operation that embeds a watermark into the encrypted multimedia data directly, which avoids the decryption–watermarking–encryption triples. Till now, few CWE schemes have been reported. They often obtain the commutative property by partitioning multimedia data into independent parts (i.e., the encryption part and the watermarking part). Since the two parts are isolated, it can not keep secure enough against replacement attacks. To avoid the disadvantage, a novel quasi-commutative watermarking and encryption (QCWE) scheme based on quasi-commutative operations is proposed in this paper. In the proposed scheme, the encryption operation and watermarking operation are applied to the same data part. Since the two operations are homogenous with commutative properties, their orders can be commutated. As an example, the scheme for MPEG2 video encryption and watermarking is presented. In this example, the DCs in intra macroblocks are encrypted or watermarked based on random module addition, while the DCs in other macroblocks and all the ACs’ signs are encrypted with a stream cipher or block cipher. Analysis and experiments show that the scheme obtains high perceptual security and time efficiency, and the watermarking and encryption operations can be commutated. These properties make the scheme a suitable choice for efficient media content distribution. Additionally, the paper shows the availability of constructing the commutative watermarking and encryption scheme with homogenous operations, which is expected to activate the new research topic.
Shiguo LianEmail:
  相似文献   

17.
复合式的多功能数字水印算法   总被引:2,自引:1,他引:2  
提出了一种鲁棒性数字水印和脆弱性数字水印相结合的复合式水印算法,具有较好的双重保护性能,即鲁棒性数字水印用于版权认证方面和脆弱性数字水印用于图像内容的保护.首先,在原始载体图像的DCT中频域上嵌入不可见水印;其次,再根据LSB算法在空域自适应地嵌入脆弱性数字水印.实验结果表明,该方法不可见性好,对一般的图像处理和攻击,如JPEG压缩、滤波、加噪声、旋转、缩放等都有良好的鲁棒性,同时还能对图像中细微的篡改进行有效精确的定位,并且作为一种盲水印算法有着良好的安全性.  相似文献   

18.
基于奇异值分解的三维网格模型数字水印算法   总被引:1,自引:0,他引:1  
艾青松  周祖德  刘泉 《计算机应用》2007,27(12):2931-2933
针对三维网格模型的版权保护提出了一种新的基于奇异值分解(SVD)的数字水印算法。算法利用几何信号处理框架将三维几何信号转换成平面规则采样信号,再用SVD技术嵌入水印。实验结果表明,算法具有较好的透明性和鲁棒性。  相似文献   

19.
Most existing digital watermarking algorithms, which are based on the Discrete Wavelet Transform, are not robust to geometric distortions, even if for some special distortions, such as multiples of 90° rotation of integers and image flipping, which change the location of pixels but have no effect on the value of the image. Therefore, to solve the problem, according to Haar wavelet transform theory, the redistributed invariant wavelet domain is constructed and proofed in this paper; a novel image watermarking algorithm, based on the invariant domain, is proposed to eliminate such distortions. The experimental results showed that the proposed algorithm not only can resist the common image processing operations, but also successfully resist the distortions that result from multiples of 90° rotations of integers and image flipping.  相似文献   

20.
一种基于量化DCT域音频水印新算法   总被引:1,自引:2,他引:1       下载免费PDF全文
提出一种新的基于量化DCT域的音频水印算法,根据DC分量和AC分量在水印的鲁棒性和不可听性中起着不同的影响来设计水印算法,使水印的鲁棒性和不可听性得到更好的权衡。首先,把音频数据分成含有8个数据的不重叠块,然后,对每个数据块进行DCT变换;通过对DCT系数中DC分量和第四AC分量进行轮流调制来完成水印嵌入,每个数据块嵌入1 bit信息。实验表明该水印算法对于叠加噪声,有损压缩,重量化等常见的数字信号处理具有较好的鲁棒性,同时,水印系统具有很好的不可听性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号