期刊文献+

用于版权保护与内容认证的多功能音频水印算法 被引量:6

Multifunctional Audio Watermarking Algorithm for Copyright Protection and Content Authentication
下载PDF
导出
摘要 针对现有的多功能音频水印算法恢复篡改区域的能力较弱问题,提出了一种多功能双音频水印算法.首先对原始音频信号分帧,结合Mel频谱倒谱系数计算每帧的相似帧,并将其作为鲁棒水印嵌入经过Torus映射的帧的低频小波系数的绝对平均值中;然后将高频小波系数的平均值作为初始值,利用Logistic序列生成认证水印信息,并通过单个量化高频系数的方法将其嵌入到音频信号中.仿真结果表明:所提出的算法具备很强的抗攻击性;脆弱水印对篡改敏感,而且篡改定位精确. The multifunctional audio watermarking algorithm cannot recover the tampered region. This paper designed a multifunction audio watermarking algorithm to solve the issue. First, the original audio signal was segmented into frames, and the similar frame of per frame was computed by using the Mel frequency spectrum coefficient. The similar frames as the robust watermark were embedded into the absolute mean value of audio low-frequency wavelet coefficients by using the Torus auto-morphism. Second, the average value of the high-frequency wavelet coefficients were taken as the initial value. The authentication watermark was generated by using the logistic sequence, and the watermark was embedded into the audio signal by quantifying high-frequency coefficients method. Simulation results show that the robust watermark possesses strong robustness to resist the attacks, the fragile watermark is very sensitive to tamper, and it can localize the tampered region and tamper recovery.
出处 《北京工业大学学报》 CAS CSCD 北大核心 2015年第1期68-75,共8页 Journal of Beijing University of Technology
基金 国家自然科学基金资助项目(61370092) 湖北省自然科学基金资助项目(2013CFC005) 湖北省高等学校优秀中青年科技创新团队计划资助项目(T201410)
关键词 多功能音频水印 版权保护 内容认证 篡改定位 篡改恢复 multifunctional audio watermarking copyright protection content authentication tamper localization tamper recovery
  • 相关文献

参考文献9

二级参考文献55

  • 1李伟,袁一群,李晓强,薛向阳,陆佩忠.数字音频水印技术综述[J].通信学报,2005,26(2):100-111. 被引量:73
  • 2陈金儿,王让定,王晓丽.数字音频双重水印算法[J].宁波大学学报(理工版),2006,19(1):54-58. 被引量:4
  • 3王让定,李倩.一种抵抗去同步攻击的音频隐藏信息的方法[J].传感技术学报,2006,19(4):1023-1028. 被引量:4
  • 4吴艺杰,杨晓元,魏立线,钮可.一种新颖的音频双水印算法[J].计算机工程与应用,2006,42(26):33-35. 被引量:4
  • 5Wu Chung Ping,Jay Kuo C C.Fragile speech water-marking for content integrity verification[A]. Proc IEEE[C]. 2002.436~439.
  • 6Cox I J. Public watermarks and resistance to tam-pering[A]. Proceeding ICIP′97[C]. 1997.26~29.
  • 7Lahouari G, Ahmed B, Mohammad K I, and Said B. Digital image watermarking using balanced multiwavelets. IEEE Trans. on Signal Processing, 2006, 54(4): 1519-1536.
  • 8Yuan H and Zhang X P. Multiscale fragile watermarking based on the gaussian mixture model. IEEE Trans. on Image Processing, 2006, 15(10): 3189-3200.
  • 9Schlauweg M, Pr6frock D, Palfner T, and Mtlller E. Quantization-based semi-fragile public-key watermarking for secure image authentication. In Proc. of SPIE, San Diego, California, USA, 2005, 5915: 41-51.
  • 10Sharkas M, E1Shafie D, and Hamdy N. A dual digital-image watermarking technique. In Proc. of 3rd WOrld Enformatika Conference (WEC'05), Istanbul, Turkey, 2005: 136-139.

共引文献60

同被引文献33

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部