期刊文献+

基于量化小波变换的双同步音频水印方法 被引量:2

Bisynchronous approach in audio watermarking based on quantization discrete wavelet transform
下载PDF
导出
摘要 在音频水印技术中提出了一种双同步方法,包括了自同步和外同步两个环节。抽取音频的5个特征来设计同步峡谷标记,用于水印信息的嵌入定位。紧随着各峡谷的是外同步技术,用于确定可用水印。同时,设计了一种自适应匹配方法,从多个侯选水印中计算出最终水印。提出的算法能够抵抗大多数信号处理和攻击,包括重采样、重量化、MP3编码、回声延迟、高斯噪声和大面积剪切攻击,对低通滤波攻击也具有一定的抵抗能力。 A bisynchronous approach was proposed for audio watermarking. The bisynchronous process consisted of selfsynchronization and additive synchronization. A kind of synchronous valley was created for watermark location through five features drawn from audio carrier. Following the synchronous valleys, the additive synchronous approach was adopted to locate the usable watermarks. Meanwhile, all adaptive matching approach was stated to obtain the final watermark from several candidates. The bisynchronous algorithm was robust against most common signal processing and attacks, such as re-sampling, re-quantization, MP3 compression, echo delay, Gaussian noise corruption and cropping. It also can be against some of low pass filtering attacks.
作者 张晓明 殷雄
出处 《计算机应用》 CSCD 北大核心 2008年第12期3171-3174,共4页 journal of Computer Applications
基金 北京市教育委员会科技发展计划面上项目(KM200510017006) 北京市属市管高等学校人才强教计划资助项目
关键词 音频水印 双同步方法 同步峡谷 自适应匹配 离散小波变换 audio watermarking bisynchronous approach synchronization valley adaptive matching discrete wavelet transform
  • 相关文献

参考文献10

二级参考文献58

  • 1王俊杰,张晓明,梅东霞.一种DCT域的音频信息隐藏方法[J].计算机应用与软件,2006,23(6):33-35. 被引量:8
  • 2[1]HARTUNG F, KUTTER M. Multimedia watermarking techniques[J]. Proceedings of IEEE, 1999,87(7):1079-1107.
  • 3[2]VOYATZIS G, PITAS I. The use of watermarks in the protection of digital multimedia products[J]. Proceedings of IEEE, 1999,87(7):1197-1207.
  • 4[3]BONCELET X X C, ARCE G. A multiresolution watermark for digital images[A]. Proc IEEE Int Conf Image Processing[C]. Santa Barbara, CA: Oct 1997.1097-1100.
  • 5[4]BARTOLINI M B F,CAPPELLINI V, PIVA A. A DCT-domain system for robust image watermarking[A].Signal Processing[C]. 1998.1202-1206.
  • 6[5]TAO,DICKINSON B. Adaptive watermarking in the DCT domain[A]. Proc Int Cong Image Processing (ICIP)[C]. Lausanne, Switzerland: Sept 1996.540-543.
  • 7[6]COX I J, LINNARTZ J P. Some general methods for tampering with watermarks[J]. IEEE J Selct Areas Commun (Special Issue on Copyright and Privacy Protection), 1998,16(5) :587-593.
  • 8[7]NIKOLAIDIS A,TSEKERIDOU S. A survey on watermarking application scenarios and related attacks[A]. Signal Processing[C]. 2001.991-995.
  • 9[8]STONE H S. Analyis of Attacks on Image Watermarks with Randomized Coefficients[M]. NJ: NEC RES Inst Princeton, 1996 .
  • 10[9]HARTUNG F. Difital Watermarking and Fingerprinting of Uncompressed and Compressed Video[D]. Erlangen, Germany: Telecommun Lab, Univ Erlangen-Nuremberg, 1999.

共引文献99

同被引文献8

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部