期刊文献+

基于(t,n)门限的自同步小波域音频盲水印技术

Self-synchronization blind audio watermarking based on (t,n) threshold
下载PDF
导出
摘要 提出一种基于(t,n)门限的自同步小波域音频数字盲水印技术,水印嵌入过程是在小波变换域中进行的.按照秘密共享技术将水印信号分解为n份水印影子,只有t个或大于t个用户才能同时恢复水印,而t-1或更少的用户均不能恢复水印,在增加信息安全性的同时可防止信息泄漏.利用语音信号小波变换自身特点,根据小波变换系数进行基音周期检测,并以此作为水印过程的同步点,水印检测前先搜索同步点,实现水印检测和嵌入过程的自同步.检测过程采用独立分量分析技术,在不需要任何原始音频、水印、嵌入过程信息以及可能经历的攻击信息的情况下可精确恢复水印,实现盲检测.为防止欺骗攻击,在信息恢复前,利用单向散列函数抵抗欺骗攻击.该算法中水印采用的是具有实际意义的语音信号.实验表明,该算法具有很好的鲁棒性. A self-synchronization blind audio watermarking based on (t, n) threshold in wavelet transform is proposed in this paper. This technique can extract the watermark without using the original watermark and the host audio during the detection. It is a completely blind method during watermark detection. Watermark was divided into n shadows signal according to secret sharing scheme before the embedding process, and Shamir's (t, n) threshold scheme was used to distribute the watermark shadows to the users. Lagrange interpolation polynomial was used to realize it. Results show that t or more of those signal shadows can reconstruct the secret watermark, while t - 1 or less signal shadows could not do it. The watermark used in this paper is meaningful speech and it was produced independent of the original audio. The watermark embedded intensity depended on the masking effect of human audio system. Audio processing such as time shift and time scaling modification can cause displacement between embedding and detection process and it is hence difficult for watermark to survive. The pitch detection is done using the coefficients of wavelet transform of the host audio, which is used as the synchronization point. Before watermark detection, the detector finds the synchronization point to realize the synchronization between the watermark embedding and detection process. Recently, blind source separation by independent component analysis (ICA) has received attention because of its potential applications in signal processing. ICA is adopted during the watermark detection to realize the true blind detection without any information about the host audio, watermark, embedding information and attacks. The accuracy of the watermarking extraction also depends on the statistical independence of original audio and watermark signal. To resist the cheating attacks, we use the one way hashing function before watermark reconstruction. Only t or more honest users can work collectively to reconstruct the secret, while dishonest users could not do it. The detailed performance analysis of the proposed watermarking method is presented. Different audio signals are used to test the robustness of the method. Experimental results show that the proposed audio watermarking technique is robust against many audio processing performed by popular watermark test software-Stirmark, such as low-pass filtering, median filtering, additive Gaussian noise, mp3 compression, time scaling, time shift, dithering and quantization.
出处 《深圳大学学报(理工版)》 EI CAS 北大核心 2006年第3期252-257,共6页 Journal of Shenzhen University(Science and Engineering)
基金 国家自然科学基金资助项目(60502027)
关键词 水印技术 (T N)门限 自同步 独立分量分析 鲁棒性 watermarking (t, n) threshold self-synchronization independent component analysis robustness
  • 相关文献

参考文献7

  • 1吴绍权,黄继武,黄达人.基于小波变换的自同步音频水印算法[J].计算机学报,2004,27(3):365-370. 被引量:67
  • 2Chin-Chen Chang,Iuon-Chang Lin.一种新型(t,n)门限彩色图像隐藏算法[DB/OL].纽洋西:IEEE,2003-04-30,[2006-06-06].http:∥ieeexplore.ieee.org/ iel5/8586/27215/01209067.pdf?arnumber=1209067(英文版).
  • 3Huiping Guo,Nicolas D Georganas.无可信任方时图像水印联合版权证实方法[EB/OL].[2006-06-01].http:∥www.discover.uottawa.ca/publications/guoICME.pdf (英文版).
  • 4Feng Hsing Wang,Lakhmi C Jain,Jeng Shyang Pan,基于水印系统实现的多用户水印分级密钥的设计[DB/OL].纽洋西:IEEE,2004,[2006-06-06].http:∥ieeexplore.ieee.org/servlet/opac?punumber=9605 (英文版).
  • 5Hyvarinen A,Oja E.独立分量分析综述1999 国际神经网络会议(IJCNN99)[EB/OL].(1999-07-01)[2006-06-01]http:∥www.cis.hut.fi/projects/ica/ (英文版).
  • 6Donald E Knuth.计算过程[M].波士顿:Addison Wesley出版社,1981(英文版).
  • 7张力 SamKwong MarianChoy 等.基于独立分量分析实现智能水印检测器的设计[J].计算科学论坛:英文版,2004,2939:223-234.

二级参考文献15

  • 1[1]Arnold M.. Audio watermarking: features, applications and algorithms. In: Proceedings of IEEE International Conference on Multimedia & Expo, New York, USA, 2000, 2:1013~1016
  • 2[2]Swanson M.D., Bin Zhu, Tewfik A.H.. Current state of the art, challenges and future directions for audio watermarking. In:Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy,1999, 1:19~24
  • 3[4]Gerzon M.A., Graven P.G.. A high-rate buried-data channel for audio CD. Journal of the Audio Engineering Society, 1995, 43(1~2):3~22
  • 4[5]Gruhl D., Lu A., Bender W.. Echo hiding. In:Anderson R.J. ed.. Proceedings of the 1st Information Hiding Workshop. LNCS 1174, Berlin: Germany Springer-Verlag, 1996, 295~315
  • 5[6]Bender W., Gruhl D., Morimoto N.. Techniques for data hiding. IBM Systems Journal, 1996, 35(3~4):313~336
  • 6[7]Yeo Kwon, Kim H.J.. Modified patchwork algorithm: A novel audio watermarking scheme. IEEE Transactions on Speech and Audio Processing, 11(6):381~386
  • 7[8]Huang Ji-Wu, Wang Yong, Shi Y.Q.. A blind audio watermarking algorithm with self-synchronization. In:Proceedings of IEEE International Symposium on Circuits and Systems, Arizona, USA,2002, 3:627~630
  • 8[9]Lee Sang-Kwang, Ho Yo-Sung.. Digital audio watermarking in the cepstrum domain. IEEE Transactions on Consumer Electronics, 2000, 46(3):744~750
  • 9[10]Bassia P., Pitas I., Nikolaidis N.. Robust audio watermarking in the time domain. IEEE Transactions on Multimedia, 2001, 3(2):232~241
  • 10[11]Ko Byeong-Seob, Nishimura R., Suzuki Y.. Time-spread echo method for digital audio watermarking using pn sequences. In:Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Florida,USA,2002, 2: 2001~2004

共引文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部