期刊文献+

基于音频特征的自嵌入数字水印技术 被引量:4

Technique of characteristic-based self-embedded watermark using in audio
下载PDF
导出
摘要 论文提出一种用于音频数据内容认证与恢复的数字水印算法。该算法基于音频主要特征生成水印,并自嵌入到原始音频数据,使得水印能检测和定位对音频的篡改,并能对篡改部分进行近似恢复。其基本思路是把音频分段,每段的主要DCT系数经过量化和加密后,作为水印嵌入另一个音频段的LSB最低位之中。这样能保证音频恢复时有较好的质量。水印是使用音频的主要特征DCT系数及其位置,故能实现盲提取。 In this paper,a technique of watermark using in audio authentication and recovery is presented.The arithmetic is based on audio characteristic to create watermark,and make this watermark embedded in the audio itself.It can not only check and locate tamper to the audio,but also similarly recover.The main idea of this arithmetic is to divide audio into blocks,and make each block DCT transformed.And the main DCT coefficients are quantized and encrypted to be the watermark.It is then be embedded to LSB bit of the audio itself.This idea can guarantee the recovery quality.The watermark is based on main DCT coefficients and its position ,therefore ,it can recover with blind source.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第1期192-194,203,共4页 Computer Engineering and Applications
基金 广东省自然科学基金团队研究项目(04205783)。
关键词 多媒体认证 数字水印 音频特征 RSA公钥算法 自嵌入 multimedia authentication digital watermarking audio character RSA public key encryption self-embedding
  • 相关文献

参考文献6

二级参考文献46

  • 1[1]Ching-Yung Lin, Shih-Fu Chang. Semi-fragile watermarking for authenticating JPEG visual content. SPIE Security and Watermarking of Multimedia Contents, EI'00, San Jose, CA, 2000
  • 2[2]J Fridrich. Image watermarking for tamper detection. ICIP'98, Chicago, 1998
  • 3[3]M Holliman, N Memon. Counterfeiting attacks for block-wise independent watermarking techniques. IEEE Trans on Image Processing, 2000, 9(3): 432~441
  • 4[4]J Fridrich, M Goljan, N Memon. Further attacks on Yeung-Mintzer watermarking scheme. SPIE Security and Watermarking of Multimedia Contents, EI '00, San Jose, CA, 2000
  • 5[5]G L Friedman. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Trans on Consumer Electronics, 1993, 39(4): 404~408
  • 6[6]R G Schyndel, A Z Tirkel, C F Osborne. A digital watermark. ICIP'94, Austin, Texas, 1994
  • 7[7]M Yeung, F Mintzer. An invisible watermarking technique for image verification. ICIP'97, Santa Barbara, California, 1997
  • 8[8]J Fridrich, M Goljan, A C Baldoza. New fragile authentication watermark for images. ICIP'00, Vancouver, Canada, 2000
  • 9[1]Podichuk C I, Delp E J. Digital watermarking: algorithms and applications[J].IEEE Signal Processing Magazine,2001,18(4):33-46.
  • 10[2]Bassia P, Pitas I, Nikolaidis N. Robust audio watermarking in the time domain[J] .IEEE Trans. on Multimedia,2001,3(2):232-241.

共引文献77

同被引文献145

引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部