期刊文献+

基于心理声学模型的盲音频数字水印改进型算法 被引量:1

The Improved Blind Audio Digital Watermarking Algorithm Based on Psychoacoustic Model
下载PDF
导出
摘要 以往基于离散小波变换的音频数字水印算法鲁棒性不强,无法对数字音频信号的版权进行真正地保护,因此改进了算法,利用心理声学模型,控制水印信号的嵌入,通过计算音频信号的掩蔽阀值,在保证水印嵌入不可察觉的前提下,增大水印的嵌入强度。仿真实验证明,该算法具有较强的鲁棒性和不可感知性,能有效抵御各种常见攻击,并且能实现盲检测。 Because the robustness of the old audio digital watermarking algorithm based on DWT transform is not strong enough to offer efficacious copyright protection for digital audio signals, this paper presents an improved algorithm. Using psychoacoustic model and calculating the masking threshold of the audio signal, this improved algorithm can control embedding the watermark signal and increase embedding strength in an undiscoverable way. The experimental results show that this watermarking algorithm has good robustness and imperceptibility. It can resist various usua.] attacks and implement blind detection.
出处 《计算机安全》 2008年第8期8-12,共5页 Network & Computer Security
关键词 心理声学模型 小波变换 音频数字水印 盲检测 鲁棒性 Psychoacoustic model Wavelet transform Audio digital watermarking Blind detection Robustness
  • 相关文献

参考文献1

二级参考文献16

  • 1A.Z. Tirkel. C.E Osborne, T.E. Hall, Image and watermark registration, Signal Processing 66(1998)373-383.
  • 2P.W. Wong, A public key watermark for image verification and authentication, in: Proceedings of the IEEE International Conference on Image Processing. ICIF98,Chicago, IL, 4-7 October 1998.
  • 3W. Zeng, B.Liu, On resolving rightful ownerships of digital images by invisible watermarks, in: Proceedings of the IEEE International Conference on Image Processing,ICIP'97, Vol.1, Santa Barbara, CA, 1997, pp.552~555.
  • 4W. Zeng, B. Liu, A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images, IEEE Trans. Image Process. 8(1) (November 1999) 1534-1548.
  • 5I. Cox, J. KiUian, T. Leighton, T. Shamoon, Secure spread spreetrum communication for multimedia, Technical Report, NEC research institute, 1995.
  • 6I. Cox, J. KiUian, T. Leighton, T Shamoon, Secure spread spectrum watermarking for images, audio and video, in:Proce.exiings of the IEEE International Conference on Image Processing, ICIF96, Laussane, Switzerland, 16-19 September 1996, pp.243-246.
  • 7R. Barnett, D. Pearson, Attack operators for digitally watermarked images, IEE Proc. Vis. Image Signal Process. 145 (4) (August 1998) 271-279.
  • 8S. Craver, N. Memon, B. Yeo, M. Yeung, Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks and implications, IEEE J.Selected Areas Commun. 16(4) (May 1998) 573-586.
  • 9D. Kunder, D. Hatzinakos, Improved robust watermarking through attack characterization Opt. Express3 (12)(December 1998) 485-490.
  • 10G. Langelaar, R. Lagendijk, T. Biemond, Removing spatial spread spectrum watermarks by non-linear filtering, in: Proceedings of the European Signal and Image Processing Conference, EUSIPCO'98 Rhodes,~e, 1998, pp.2281-2284.

共引文献3

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部