期刊文献+

基于小波和倒谱域的数字音频水印算法 被引量:1

DIGITAL AUDIO WATERMARKING ALGORITHM BASED ON WAVELET AND CEPSTRUM DOMAIN
下载PDF
导出
摘要 给出一种基于小波和倒谱域的强鲁棒数字音频水印算法。该算法利用人耳听觉模型和频率掩蔽效应,选择出音频小波变换后对人耳听觉不敏感的低频系数,对其进行分帧并作倒谱变换。再利用倒谱域能量集中在零点附近的特性,将一段伪随机序列嵌入在每帧相对稳定的倒谱系数中,从而实现水印的嵌入。采用相关检测的方法,根据相关值的极性来提取水印信息。实验表明,嵌入水印后的音频信号不仅具有良好的不可感知性,而且对诸如加噪、低通滤波、重采样、重量化、回声、MP3压缩和去同步等攻击具有很强的鲁棒性。 A strong robust digital audio watermarking algorithm based on wavelet transform and cepstrum domain is proposed in this paper.First,the audio wavelet-transformed imperceptible low frequency coefficients are selected using the human ear hearing model and the masking effect on the frequency,then these coefficients are frame-separated and are conducted the cepstrum transformation.According to the characteristic that the energy in cepstrum domain focuses on both sides of the centre,the pseudorandom sequence is embedded into relatively stable cepstrum coefficients in each segment so as to achieve watermark embedding.The watermarks are extracted out using the method of correlation detection according to the polarity of the correlated value.Experiments show that the audio signal with embedded watermarks has good imperceptibility and strong robustness against various common signal processing attacks,such as noise adding,low-pass filtering,resampling,requalisation,echo,MP3 compression and desynchronisation,etc.
机构地区 重庆通信学院
出处 《计算机应用与软件》 CSCD 北大核心 2012年第3期163-167,182,共6页 Computer Applications and Software
基金 重庆市自然科学基金(CSTC2008BB2296)
关键词 盲音频水印 相关检测 倒谱变换 离散小波变换 Blind audio watermarking Correlation detection Cepstrum transform Discrete wavelet transform
  • 相关文献

参考文献5

二级参考文献20

  • 1张敏,杨慧.基于混沌加密的盲音频水印算法[J].中国民航学院学报,2005,23(3):37-41. 被引量:10
  • 2李跃强,孙星明,周天亮.基于复倒谱变换的数字音频水印研究[J].计算机工程,2006,32(23):145-147. 被引量:7
  • 3Li Xin, Yu H H. Transparent and Robust Audio Data Hiding in Cepstrum Domain[C]//Proceedings of IEEE International Conf. on Multimedia and Expo.. New York, USA: IEEE Press, 2000: 397-400.
  • 4XIN L,HEATHER Y H.Transparent and Robust Audio Data Hiding in Cepstrum Domain[C]//Proceedings of IEEE International Conference on Multimedia and Expro 2000,New York,2000:397-400.
  • 5KWANG LS,SUNG H Y.Digital Audio Watermarking in the Cepstrum Domain[J].IEEE Trans.On Consumer Electronics 2000,46(3):744-750.
  • 6SHI-CHENG LIU,SHINFENG D LIN.BCH Code-Based Robust Audio Watermarking in the Cepstrum Domain[J].Journal of Information Science and Engineering 2006,22:535-543.
  • 7KALIAPPAN GOPALAN.Audio Stegnography by Cepstrum Modification[C]//Conference on Acoustice,Speech,and Signal Processing.Philadelphia,2005:481-484.
  • 8Katzenbeisser S, Petitcolas FAP. Information Hiding Techniques for Stangraphy and Digital Watermarking[M]. England:Artech House,1999.1-60.
  • 9Petitcolas FAP, Anderson R J, Kuhn M G. Information Hiding: A Survey[J]. Proceedings of the IEEE, 1999, 87(7): 1062-1078.
  • 10Bender W,Gruhl D,Morimoto N. Techniques for Data Hiding[J]. IBM Systems Journal, 1996,35:131-336.

共引文献11

同被引文献10

  • 1郑立华,冀荣华.C++程序设计与应用[M].北京.清华大学出版社,2011.
  • 2Bennett K.Linguistic Steganography:Survey,Analysis,and Robustness Concerns for Hiding Information in Text[R].CERIAS Technical Report 2004-13:Purdue University,2004.
  • 3Udit Budhia,Deepa Kundur,Takis Zourntos.Digital video steganalysis exploiting statistical visibility in the temporal domain[J].IEEE Transactions on Information Forensics and Security,2006,1(4):502-516.
  • 4Yuling Liu,Xingming Sun,Can Gan,et al.An efficient linguistic steganography for Chinese text[C]//U.S.A:the Proceedings of 2007IEEE International Conference on Multimedia and Expo.2007:2094-2097.
  • 5Brian Chen,Gregory W.Wornell.Quantization index modulation:A class of provably good methods for digital watermarking and information embedding[J].IEEE Transactions on Information Theory,2011,47(4):1423-1443.
  • 6Ehsan Nezhadarya,Z Jane Wang,Rabab Kreidieh Ward.Robust Image Watermarking Based on Multiscale Gradient Direction Quantization[J].IEEE Transactions on Information Forensics and Security,2011,6(4):1200-1213.
  • 7陈至立.语言隐写术的分析与设计研究[D].合肥:中国科学与技术大学,2008.
  • 8付东来,陈够喜,杨秋翔.基于XML文档切片的隐秘通信[J].计算机应用与软件,2011,28(9):106-108. 被引量:1
  • 9张广斌,岳云天,张传富.基于Hilbert的快速湿纸码自适应隐写算法[J].计算机工程,2013,39(7):161-164. 被引量:4
  • 10曹卫兵,戴冠中,夏煜,慕德俊.基于文本的信息隐藏技术[J].计算机应用研究,2003,20(10):39-41. 被引量:36

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部