期刊文献+

抗恒特征攻击的音频内容认证算法 被引量:2

Audio Content Authentication Algorithm Robust Against Constant-feature Attack
下载PDF
导出
摘要 对于基于音频自身特征或内容生成水印的音频水印算法,恒特征攻击是一种新的攻击方法。针对该问题,本文提出一种抗恒特征攻击的音频内容认证算法。对音频质心的计算方法做了修改,使其与密钥密切相关,提高水印系统的安全性。由修改后的质心生成水印,给出一种基于伪Zernike矩的水印嵌入方法,该方法具有较好的不可听性和容忍常规信号处理的能力。本文算法对恶意攻击能够篡改定位,同时能够抵抗恒特征攻击。与现有的音频内容认证算法相比,本文算法提高了水印系统的安全性,增大了水印的嵌入容量。 Constant-feature attack is a new method of attack for the content feature-based audio watermarking. To solve the problem, the audio content authentication algorithm robust against constant-feature attack was proposed in this paper. In the proposed algorithm, the audio centroid was modified and was made closely relat- ed to the key, which improved the security of the watermarking system. The watermark was generated by the modified centroid, and then the new watermark embedding method based on pseudo-Zernike moments was given, which was inaudible and had good ability of tolerance against some common signal processing operations. The proposed scheme not only has excellent ability of tamper detection, but also is robust against constant-feature attack. Compared with the existing audio content authentication algorithms, the algorithm improves the security of the watermarking system and increases the watermarking embedding capacity.
出处 《铁道学报》 EI CAS CSCD 北大核心 2013年第3期76-82,共7页 Journal of the China Railway Society
基金 国家自然科学基金(61170226 60970122) 中央高校基本科研业务费专项资金(SWJTU11CX047)
关键词 内容认证 篡改定位 恒特征攻击 质心 伪ZERNIKE矩 content authentication tamper localization constant-feature attack centroid pseudo-Zernike tooments
  • 相关文献

参考文献13

  • 1YAMAMOTO K, IWAKINI M. Robust Audio Water marking with Time and Frequency Division[C]//Proeeed- ings of IEEE International Conference on Intelligent Infor- mation Hiding and Multimedia Signal Processing. New York: IEEE Press, 2009 : 76-81.
  • 2SALMA M, MAHA C, CHOKRI B A. A Robust Audio Watermarking Technique Based on the Perceptual Evalua- tion of Audio Quality Algorithm in the Multiresolution Do main[C]//Proceedings of IEEE International Symposium on Signal Processing and Information Technology. New York: IEEE Press, 2010 : 326-331.
  • 3HUANG Xiong-hua, JIANG Wei-zhen, JING Xing-xing. Robust Audio Watermarking Based Non-uniform DCT [C]//Proceedings of IEEE International Conference on In- telligent Computing and Intelligent Systems. New York: IEEE Press, 2010..585-588.
  • 4CHEN Ning,ZHU Jie. A Multipurpose Audio Watermark- ing Scheme for Copyright Protection and Content Authenti-cation[C]//Proceedings of IEEE International Conference on Multimedia and Expositions. New York: IEEE Press, 2008:221-224.
  • 5WANG HongXia & FAN MingQuan School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China.Centroid-based semi-fragile audio watermarking in hybrid domain[J].Science China(Information Sciences),2010,53(3):619-633. 被引量:14
  • 6范明泉,王宏霞.基于音频内容的混合域脆弱水印算法[J].铁道学报,2010,32(1):118-122. 被引量:14
  • 7LI Juan, WANG Rang-ding. Audio Aggregation Zero wa- termarking Algorithm Based on(k, n/k =n) [ C]//Proceed- ings of IEEE International Conference on Signal Processing Systems. New York: IEEE Press, 2010.. 644-648.
  • 8JIANG Wei-zhen. Fragile Audio Watermarking Algorithm Based on SVD and DWT[C]//Proceedings of IEEE Inter national Conference on Intelligent Computing and Integrat- ed Systems. New York: IEEE Press, 2010: 83-86.
  • 9ZHANG Xiao-ming, YIN Xiong. Audio Watermarking AI gorithm Based on Centroid and Statistical Features[C] // Proceedings of International Conference on Information and Communications Security. Berlin: Springer-Verlag Press, 2007:153-163.
  • 10WANG Xiang-yang, MA Tian-xiao, NIU Pan-pan. A Pseudo-Zernike Moments Based Audio Watermarking Scheme Robust Against Desynchronization Attacks [J].Computers and Electrical Engineering, 2011,37 (4) : 425- 443.

二级参考文献17

  • 1全笑梅,张鸿宾.用于篡改检测及认证的脆弱音频水印算法[J].电子与信息学报,2005,27(8):1187-1192. 被引量:14
  • 2Castura J, Mao Yongyi. Rateless coding over fading channels[J]. IEEE Communication Letters, 2006, 10 (1) : 46-48.
  • 3Ma Yuanyuan, Yuan Dongfeng, Zhang Haixia. Fountain codes and applications to reliable wireless broadcast system [ C] // Proceedings of IEEE Information Theory Workshop. Chengdu: IEEE Press, 2006: 66-70.
  • 4Tee R Y S, Nguyen T D, Yang Lieliang, et al. Serially concatenated luby transform coding and bit-interleaved coded modulation using iteratlive decoding for the wireless internet [ C ] //Vehicular Technology Conference, VTC 2006-Spring. IEEE 63^rd. Melbourne: IEEE Press, 2006 : 22-26.
  • 5Venkiah A, Piantanida P, Poullia C, et al. Rateless coding for quasi-static fading channels using channel estimation accuracy [ C ]//IEEE International Symposium on Information Theory. Toronto: IEEE Press, 2008:2257- 2261.
  • 6Luby M. LT codes[C]//Proceedings of The 43^rd Annual IEEE Symposium on Foundations of Computer Science. Vancouver; IEEE Press, 2002. 271-282.
  • 7Shokrollah M A. Raptor codes[J]. IEEE Transactions on Information Theory, 2006, 52(6) : 2551-2567.
  • 8Makay D J. Fountain codes [J]. Proceedings of IEEE Communications, 2005, 152(6): 1062-1068.
  • 9Palanki P, Yedidia J S. Rateless codes on noisy channels [C] // IEEE International Symposium on Information Theory. Chicago: IEEE Press, 2004: 1-12.
  • 10LI Wei, XUE Xiang-yang, LU Pei-ahong. Localized audio watermarking technique robust against time-scale modification[J].IEEE Transactions on Multimedia, 2006, 8(1): 60-69.

共引文献32

同被引文献24

  • 1王宏霞,范明泉.基于质心的混合域半脆弱音频水印算法[J].中国科学:信息科学,2010,40(2):313-326. 被引量:12
  • 2PARKC M , THAPA D, WANG G N. Speech Authentica tion System Using Digital Watermarking and Pattern Re covery[J]. Pattern Recognition Letters, 2007, 28(8):931 -938.
  • 3ZHAO H, MALIK H. Audio Recording Location Identifi- cation Using Acoustic Environment Signature[J]. IEEE Transaction on Information Forensics and Security, 2013, 8(11) : 1476-1759.
  • 4KHALDI K, BOUDRAA A O. Audio Watermarking Via EMD[J]. IEEE Transactions on Auido, Speech, and Lan- guage Processing, 2013, 21(3) :675-680.
  • 5SHEN Jun-wei, PAN Feng, GUO Yao. Digital Audio Wa- termark Sharing Based on the Chinese Remainder Theorem [C]//Proceedings of 5th International Congress on Image and Signal Processing (CISP). New York: IEEE Press, 2012: 572-576.
  • 6KUTTER M, BHATTACHARJEE S K, EBRAHIMI T. Towards Second Generation Watermarking Schemes[C] // Proceedings of International Conference on Image Process- ing(ICIP'99). New York.. IEEE Press, 1999:320-323.
  • 7MALLAT S,ZHONG S. Characterization of Signals from Multiscale Edges[J]. IEEE Transaction on Pattern Analy- sis and Machine Intelligence, 1992, 14(7) : 710-732.
  • 8BAHJA F, EI H I E, JOSEPH D M. On the Use of Wavelets and Cepstrum Excitation for Pitch Determina- tion in Real-Time[C]//Proceedings of International Con- ference on Multimedia Computing and Systems(ICMC). New York: IEEE Press, 2012:150-153.
  • 9WANG Xiang-yang, ZHAO Hong. A Novel Synchroniza- tion Invariant Audio Watermarking Scheme Based on DWT and DCT[J]. IEEE Transaction on Signal Process- ing,2006, 54(12) :4835-4840.
  • 10LEI B Y, SOON I Y, ZHEN Li. Blind and Robust Audio Watermarking Scheme Based on SVD-DCT[J]. Signal Processing, 2011, 91(8): 1973-1984.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部