首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper presents a new approach for audio watermarking using the Singular Value Decomposition (SVD) mathematical technique. The proposed approach can be used for data hiding in the audio signals transmitted over wireless networks and for multi-level security systems as will be stated in the applications section. This approach is based on embedding a chaotic encrypted watermark in the singular values of the audio signal after transforming it into a 2-D format. The selection of the chaotic encryption algorithm for watermark encryption is attributed to its permutation nature, which resists noise, filtering, and compression attacks. After watermark embedding, the audio signal is transformed again into a 1-D format. The transformation between the 1-D and 2-D formats is performed in the well-known lexicographic ordering method used in image processing. The proposed approach can be implemented on the audio signal as a whole or on a segment-by-segment basis. The segment-by-segment implementation allows embedding the same watermark several times in the audio signal, which enhances the detectability of the watermark in the presence of severe attacks. Experimental results show that the proposed audio watermarking approach maintains the high quality of the audio signal and that the watermark extraction and decryption are possible even in the presence of attacks.  相似文献   

2.
This paper presents a secure, robust, and blind adaptive audio watermarking algorithm based on singular value decomposition (SVD) in the discrete wavelet transform domain using synchronization code. In our algorithm, a watermark is embedded by applying a quantization-index-modulation process on the singular values in the SVD of the wavelet domain blocks. The watermarked signal is perceptually similar to the original audio signal and gives high quality output. Experimental results show that the hidden watermark data is robust to additive noise, resampling, low-pass filtering, requantization, MP3 compression, cropping, echo addition, and denoising. Performance analysis of the proposed scheme shows low error probability rates. The data embedding rate of the proposed scheme is 45.9 bps. The proposed scheme has high payload and superior performance against MP3 compression compared to the earlier audio watermarking schemes.  相似文献   

3.
离散小波变换(DWT)和奇异值分解都可以作为数字水印算法有效的工具.提出了一种基于离散小波变换和奇异值分解联合的数字水印算法,先将整个图像分成4个区域,然后再对每个区域运用奇异值分解方法,通过修改奇异值来嵌入水印信息.实验结果表明,该算法具有很好的稳健性,在经过了一般的信号处理操作和JPEG压缩后,嵌入的水印能被可靠的提取和检测.  相似文献   

4.
为了提高传统基于奇异值变换(SVD)的数字水印抗几何攻击能力,提出一种在小波变换域将Radon变换和奇异值变换相结合的抗旋转攻击鲁棒性水印算法。将宿主图像进行小波变换,对变换后的低频子带进行奇异值分解,将经过仿射变换置乱后的二值水印图像嵌入到奇异值中。在水印嵌入操作上采用了奇偶量化嵌入算法从而实现了二值水印图像在水印检测时的盲提取;同时在水印检测之前,利用Radon变换检测算法对待检测图像进行几何校正,然后提取水印信息。实验结果表明,该算法对于噪声感染、滤波、JPEG压缩等常规信号处理的鲁棒性优于传统的基于SVD的数字水印算法,同时对于旋转几何变换具有很好的鲁棒性。  相似文献   

5.
多重水印嵌入的DWT-SVD音频公开水印算法   总被引:1,自引:0,他引:1  
提出了一种基于离散小波变换(Discrete Wavelet Transform,DWT)域与奇异值分解(Singular Value Decomposition,SVD)的多重嵌入数字音频水印算法.算法在嵌入水印前采用混沌加密与图像置乱对水印进行双重加密,在选取音频载体的多段数据中,利用DWT的多分辨率特性与SVD值稳定特性的特点,先对各段数据进行多级DWT变换,然后在低频部分选取连续的若干个系数组成矩阵,并对矩阵进行SVD分解,再把加密后的每位水印信息采用量化方法嵌入到SVD值中,实现了水印的多重嵌入.实验表明,该水印方法效率高,透明性好,对常见的音频信号处理具有较强的鲁棒性.  相似文献   

6.
Digital watermarking technology is concerned with solving the problem of copyright protection, data authentication, content identification, distribution, and duplication of the digital media due to the great developments in computers and Internet technology. Recently, protection of digital audio signals has attracted the attention of researchers. This paper proposes a new audio watermarking scheme based on discrete wavelet transform (DWT), singular value decomposition (SVD), and quantization index modulation (QIM) with a synchronization code embedded with two encrypted watermark images or logos inserted into a stereo audio signal. In this algorithm, the original audio signal is split into blocks, and each block is decomposed with a two-level DWT, and then the approximate low-frequency sub-band coefficients are decomposed by SVD transform to obtain a diagonal matrix. The prepared watermarking and synchronization code bit stream is embedded into the diagonal matrix using QIM. After that, we perform inverse singular value decomposition (ISVD) and inverse discrete wavelet transform (IDWT) to obtain the watermarked audio signal. The watermark can be blindly extracted without knowledge of the original audio signal. Experimental results show that the transparency and imperceptibility of the proposed algorithm is satisfied, and that robustness is strong against popular audio signal processing attacks. High watermarking payload is achieved through the proposed scheme.  相似文献   

7.
基于混沌和SVD DWT的稳健数字图像水印算法*   总被引:6,自引:1,他引:5  
针对现有适用于图像的数字水印对信号处理和几何失真比较敏感的问题,提出一种稳健的数字图像水印算法。该算法先对整个图像应用三级离散小波变换,再对低频域运用奇异值分解,并通过修改奇异值,嵌入经过混沌置乱的水印图像的奇异值,在小波变换域的中频系数上嵌入水印信息。水印检测时,分别在中频区域和低频提取水印并进行比较,采用效果较好的水印作为检测水印。实验结果表明,该方法对一般的信号处理操作及几何攻击等均具有较好的鲁棒性。  相似文献   

8.
This paper presents an audio watermarking scheme in fast Fourier transform (FFT) domain based on singular value decomposition (SVD) and Cartesian-polar transformation (CPT). In our proposed scheme, initially the original audio is segmented into nonoverlapping frames. FFT is applied to each frame and low frequency FFT coefficients are selected. SVD is applied to the selected FFT coefficients of each frame represented in a matrix form. The highest singular values of each frame are selected and are decomposed into two components using CPT. Watermark information is embedded into each of these CPT components using an embedding function. Experimental results indicate that the proposed watermarking scheme is highly robust against various signal processing attacks. In addition, the proposed scheme has a high data payload. Moreover, it outperforms state-of-the-art audio watermarking methods in terms of imperceptibility, robustness, and data payload.  相似文献   

9.
Niu  Pan-Pan  Wang  Xiang-Yang  Yang  Hong-Ying  Li  Li 《Multimedia Tools and Applications》2020,79(19-20):13351-13377

Imperceptibility, robustness, and payload are three main requirements of any audio watermarking systems to guarantee desired functionalities, but there is a tradeoff among them from the information-theoretic perspective. Generally, in order to enhance the imperceptibility, robustness, and payload simultaneously, the human auditory system and the statistical properties of the audio signal should be fully taken into account. The statistical model based transform domain multiplicative watermarking scheme embodies the above ideas, and therefore the detection and extraction of the multiplicative watermarks have received a great deal of attention. Although much effort has been made in recent years, improving the ability of imperceptibility, watermark capacity, and robustness at the same time remains a challenge within the audio watermarking community. In this paper, we propose a blind audio watermark decoder in stationary wavelet transform domain based on bivariate generalized Gaussian distributions, wherein both the local statistical properties and inter-scale dependencies of the stationary wavelet transform coefficients of digital audio are taken into account, and also the adaptive nonlinear watermark embedding strength functions are designed. The results of our tests with different host audios, digital watermarks, and various attacks, we experimentally confirm that the proposed approach performs well compared to the state-of-the-art audio watermarking methods.

  相似文献   

10.
基于混沌序列的多重数字图像水印算法   总被引:18,自引:0,他引:18  
纪震  肖薇薇  王建华  张基宏 《计算机学报》2003,26(11):1555-1561
采用一维混沌映射,根据不同的混沌初始条件生成多个互不相关的混沌实值序列,进而得到性能良好的多重数字图像水印信号,有效地解决了多重数字图像水印信号的构造问题.同时采用二维混沌映射将各水印信号置乱,随机均匀地叠加在图像小波变换的中低频系数上,各水印信号的嵌入和提取可以互不干扰,解决了多重数字图像水印的嵌入问题.实验结果表明,该算法对各种常见的攻击均具备了一定的抵抗能力,可有效地解决数字图像产品的多著作权问题.  相似文献   

11.
给出一种基于小波和倒谱域的强鲁棒数字音频水印算法。该算法利用人耳听觉模型和频率掩蔽效应,选择出音频小波变换后对人耳听觉不敏感的低频系数,对其进行分帧并作倒谱变换。再利用倒谱域能量集中在零点附近的特性,将一段伪随机序列嵌入在每帧相对稳定的倒谱系数中,从而实现水印的嵌入。采用相关检测的方法,根据相关值的极性来提取水印信息。实验表明,嵌入水印后的音频信号不仅具有良好的不可感知性,而且对诸如加噪、低通滤波、重采样、重量化、回声、MP3压缩和去同步等攻击具有很强的鲁棒性。  相似文献   

12.
基于DCT和SVD联合的数字水印算法   总被引:1,自引:0,他引:1  
离散余弦变换(discrete cosine transform,DCT)和奇异值分解(singular value decomposition,SVD)都可以作为数字水印算法有效的工具,现提出了一种基于离散余弦变换和奇异值分解联合的数字水印算法,先对整幅图像运用离散余弦变换,将离散余弦系数按照"之"字型顺序绘制成4个象限,然后再对每个象限运用奇异值分解方法.实验结果表明本算法具有很好的稳健性,在经过了一般的信号处理操作和JPEG压缩后,嵌入的水印能被可靠的提取和检测.  相似文献   

13.
阐述了曲波变换(Curvelet Transform)的基本原理,并提出采用基于曲波变换的人类视觉模型来优化数字水印的稳健性;还利用EMD(Exploiting Modification Direction)算法所特有的高效大容量嵌入方法来扩展水印的嵌入容量,使得数字水印在稳健性和透明性之间的平衡性上有了明显的提高。该算法不仅可以有效地应对各种常规的信号处理攻击,而且还可以防止大部分的恶意水印攻击。同时由于曲波变换的特点,算法的抽取和检测不需要原始水印和原始载体的参与,是一种全盲水印算法。最后的实验结果证明该算法相比于其他多种变换域类稳健水印算法,稳健性和透明性都有明显提高。  相似文献   

14.
基于DCT变换及SVD处理的音频数字水印算法   总被引:1,自引:0,他引:1  
赵静  周明全 《微机发展》2005,15(2):50-52
提出了一种基于离散余弦变换及奇异值分解的音频水印算法。首先对二值水印图像进行奇异值分解求出奇异值,然后对所得奇异值进行基于音频信号变换域性质的调制,并对音频信号进行离散余弦变换并计算水印嵌入点,最后将经过调制的水印信号嵌入。仿真试验证明这种自适应音频数字水印算法具有稳健性和不可觉察性。  相似文献   

15.
一种新的基于奇异值分解的小波域盲水印*   总被引:3,自引:1,他引:2  
目前,如何增强鲁棒性水印抵抗几何攻击尤其是旋转攻击的鲁棒性,仍是水印研究者研究的难点。为此,结合奇异值分解的特性和小波变换的优点,提出一种新的基于奇异值分解的小波域盲水印算法,对于常见的几何攻击具有很强的鲁棒性。首先对小波分解后的低频子带分块以提高水印的嵌入容量,再对各子块进行奇异值分解,将Arnold置乱后的水印嵌入到奇异值中,并使用量化方法增强水印的鲁棒性。实验表明,该算法对于常见的几何攻击特别是旋转攻击具有很强的鲁棒性,也能够抵抗JPEG2000压缩等信号处理。  相似文献   

16.
文章提出了一个新的基于矢量量化的数字水印算法,与基于DCT(DiscreteCosineTransform)、DFT(DiscreteFourierTransform)及DWT(DiscreteWaveletTransform)等的传统水印算法不同,该算法利用码书分割方法和矢量量化索引的特点,在矢量量化的不同阶段分别嵌入水印来保护原始图像的版权,水印检测不需要原始图像。实验结果表明,该方法实现的水印具有良好的不可见性,并对JPEG压缩、矢量量化压缩、旋转以及剪切等空域操作也具有较好的稳健性。  相似文献   

17.
基于奇异值分解的、抗几何失真的数字水印算法   总被引:49,自引:1,他引:49       下载免费PDF全文
许多现有的适用于图像的数字水印对几何失真都是很敏感的。尤其是此类失真会严重妨碍对水印的盲提取。为此,提出了一种基于奇异值分解的数字水印算法,它对常见的几何失真是稳健的。此水印是被嵌入到图像分解后的奇异值之中。根据奇异值分解的代数性质,严格证明了嵌入了水印的图像在受到转置、镜像、旋转、放大和平移等几何失真后,其奇异值是不变的。在经过了上述的几何失真、一般的信号处理操作或JPEG压缩以后,嵌入的水印能够被可靠地提取和检测。实验结果表明本算法具有很好的稳健性。  相似文献   

18.
This paper presents a new semi-blind reference watermarking scheme based on discrete wavelet transform(DWT) and singular value decomposition(SVD) for copyright protection and authenticity. We are using a gray scale logo image as watermark instead of randomly generated Gaussian noise type watermark. For watermark embedding, the original image is transformed into wavelet domain and a reference sub-image is formed using directive contrast and wavelet coefficients. We embed watermark into reference image by modifying the singular values of reference image using the singular values of the watermark. A reliable watermark extraction scheme is developed for the extraction of watermark from distorted image. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks. We show that the proposed scheme also stands with the ambiguity attack also.  相似文献   

19.
数字水印在应用中可能会受到很多攻击,最难对付的一种攻击是协议攻击。提出了一种基于奇异值分解(SVD)的数字水印算法,用媒体哈希序列对二值水印图像进行加密调制,然后通过随机选取分块,嵌入多份调制后的水印到宿主图像分块SVD的奇异值中,加大了嵌入容量和减少了可能的替换攻击。图像质量评价用适合于SVD的算法,可以较好地符合人眼的主观评价。理论分析表明所提算法具有抵抗协议攻击的能力,实验结果表明,所提算法对各种攻击具有很好的鲁棒性。  相似文献   

20.
In the field of audio watermarking, reliably embedding the large number of watermarking bits per second in an audio signal without affecting the audible quality of the host audio with good robustness against signal processing attacks is still one of the most challenging issues. In this paper, a high payload, perceptually transparent and robust audio watermarking solution for such a problem by optimizing the existing problem using genetic algorithm is presented. The genetic algorithm in this paper is used to find the optimal number of audio samples required for hiding each watermarking bit. The embedding is done using the imperceptible properties of LU (lower upper) factorization in wavelet domain. This paper addresses the robustness within perceptual constraints at high payload rate in both mathematical analysis and experimental testing by representing behavior of various attacks using attack characterization. Experimental results show that the proposed audio watermarking algorithm can achieve 1280 bps capacity at an average Signal-to-noise ratio (SNR) of 31.02 dB with good robustness to various signal processing attacks such as noise addition, filtering, and compression. In addition, the proposed watermarking algorithm is blind as it does not require the original signal or watermark during extraction. The comparison of the proposed algorithm with the existing techniques also shows that the proposed algorithm is able to achieve high payload with good robustness under perceptual constraints.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号