期刊文献+

基于匹配滤波的脆弱数字音频水印盲检测算法

Blind Detect Algorithm Based on Matched Filtering for Fragile Digital Audio Watermarking
下载PDF
导出
摘要 根据原始水印构造匹配滤波器,并结合小波估计方法,提出脆弱音频水印的盲检测算法。在假定嵌入水印为噪声的情况下,利用小波不需要原始信号辅助信息即可估计该信号的特点,首先根据给定的估计门限估计了加入水印后的原始信号,从而实现了水印与音频信号分离。然后将水印与估计产生的噪声构成的混合信号送入构造的匹配滤波器作相关运算,根据滤波器的输出响应判断水印及载体是否受到攻击。实验结果表明,所提出方法对噪声、有损压缩、滤波、随机插入与删除等操作具有较高的敏感性。 Constructing matched filtering based on initial watermarking and combining with wavelet estimation method, this paper presents a blind detect algorithm. Assuming the watermarking as noise, the proposed method adopts the Wavelet Packet 1-D algorithm to estimate the audio signal using a selected threshold criterion without original audio signal. The mixed separated noise ,which includes embedded watermarking and estimation error,is sent into the constructed matched filter. Whether the audio signal has been attacked or not are detected by using the impulse response of the matched filter. Experimental results show that the proposed approach has highly sensitivity about add noise, lossy compression,filtering and insert or delete samples randomly.
作者 冯涛 韩纪庆
出处 《信号处理》 CSCD 北大核心 2006年第5期668-672,共5页 Journal of Signal Processing
基金 国家自然科学基金(项目号:60173044) 教育部跨世纪优秀人才培养计划基金的资助。
关键词 脆弱音频水印 盲检测 匹配滤波 小波估计 fragile audio watermarking blind detect matched filtering wavelet estimate
  • 相关文献

参考文献8

二级参考文献36

  • 1[1]I J Cox,J Kilian,T Leighton,T Shamoon.Secure spread spectrum watermarking for multimedia[J].IEEE Trans,1997,IP-6(12):1673-1687.
  • 2[2]M Yeung,F Mintzer.An invisible watermarking technique for image verification[A].Proc.Int.Conf.Image Processing[C].Barbara California,1997.680-683.
  • 3[3]Wong P W.A public key watermark for image verification and authentication[A].Proc.IEEE ICIP[C].Chicago,USA,1998.425-429.
  • 4[4]J Zhao,E Koch.Embedding robust labels into images for copyright protection,Intellectual Property Rights New Technologies[A].Proc.KnowRight'95 Conf[C].California,1995.242-251.
  • 5[5]Matth Holliman,Nasir Memon,Counterfeiting attacks on oblivious block-wise independent invisible watermark schemes[J].IEEE Trans,2000,IP-19(3):432-441.
  • 6[6]Fridrich J,Goljan M,Memon N.Further attacks on Yeung-Mintzer watermarking scheme[A].Proc.SPIE Security and Watermarking of Multimedia Contents[C].San Jose,California,2000.428-437.
  • 7[1]Arnold M.. Audio watermarking: features, applications and algorithms. In: Proceedings of IEEE International Conference on Multimedia & Expo, New York, USA, 2000, 2:1013~1016
  • 8[2]Swanson M.D., Bin Zhu, Tewfik A.H.. Current state of the art, challenges and future directions for audio watermarking. In:Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy,1999, 1:19~24
  • 9[4]Gerzon M.A., Graven P.G.. A high-rate buried-data channel for audio CD. Journal of the Audio Engineering Society, 1995, 43(1~2):3~22
  • 10[5]Gruhl D., Lu A., Bender W.. Echo hiding. In:Anderson R.J. ed.. Proceedings of the 1st Information Hiding Workshop. LNCS 1174, Berlin: Germany Springer-Verlag, 1996, 295~315

共引文献144

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部