期刊文献+

基于EMD的音频水印算法研究 被引量:5

Research on Audio Watermarking Algorithm Based on EMD
下载PDF
导出
摘要 提出了一种基于经验模态分解(Empirical Mode Decomposition,EMD)的音频水印算法,选择EMD分解得到的冗余信号分量作为水印的嵌入位置,并证明了冗余信号分量按照提出的算法嵌入水印以后仍然是冗余信号分量,从而为水印嵌入提取提供了理论基础.通过粒子群优化算法求解出适用于EMD分解的最优音频水印嵌入强度,按此强度嵌入水印,可以同时满足水印的健壮性和不可感知性.仿真结果表明,使用计算出的最优嵌入强度嵌入水印,嵌入水印后的音频信号在受到大部分攻击的情况下可以确保水印的不可见性和健壮性. An audio watermarking algorithm based on EMD( Empirical Mode Decomposition) was proposed. Residual signal components decomposed from EMD were selected to embed watermark by the proposed algorithm and the watermarked components are proved to be still residual signal components,which provides the theoretical basis for the watermark embedding and extraction. The optimal audio watermark embedding strength in EMD was solved by particle swarm optimization algorithm. The robustness and imperceptibility of watermarking can be satisfied according to this embedding strength.The simulation results showthat using the optimal embedding strength to embed watermark can guarantee the imperceptibility and robustness of the watermark in most attack conditions.
出处 《电子学报》 EI CAS CSCD 北大核心 2015年第7期1457-1464,共8页 Acta Electronica Sinica
基金 国家自然科学基金(No.60803157 No.90812001 No.61272519 No.61170271)
关键词 经验模态分解 粒子群优化 音频数字水印 嵌入强度 EMD (empirical mode decomposition) particle swarm optimization audio digital watermarking embedding strength
  • 相关文献

参考文献13

  • 1Baghel R,Sharma P.Increasing robustness of LSB audio steganography using a novel embedding method[A].National Conference on Security Issues in Network Technologies (NCSI-2012)[C],Gwalior:IEEE Press,2012.1-5.
  • 2杨榆,雷敏,钮心忻,杨义先.基于回声隐藏的VDSC隐写分析算法[J].通信学报,2009,30(2):83-88. 被引量:8
  • 3张金全,王宏霞.DCT和DWT域音频水印幅值变化规律分析[J].电子学报,2013,41(6):1193-1197. 被引量:6
  • 4Chen S T,Wu G D,Huang H N.Wavelet-domain audio watermarking scheme usingoptimization-based quantisation[J].IEEE Transactions on Signal Processing,2013,4(6):720-727.
  • 5Wu S,Huang J,Huang D,et al.Efficiently self-synchronized audio watermarking for assured audio data transmission[J].IEEE Transactions on Broadcasting,2005,51(1):69-76.
  • 6Bhat K V,Sengupta I,Das A.An adaptive audio watermarking based on the singular value decomposition in the wavelet domain[J].Digital Signal Processing,2010,20(6):1547-1558.
  • 7Khaldi K,Boudraa A.Audio watermarking via EMD[J].IEEE Transactions on Audio,Speech,and Language Processing,2013,21(3):675-680.
  • 8Bi N,Sun Q,Huang D,et al.Robust image watermarking based on multiband wavelets and empirical mode decomposition[J].IEEE Transactions on Image Processing,2007,16(8):1956-1966.
  • 9Huang N E,Shen Z,Long S R,et al.The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis[J].Proceedings of the Royal Society of London(Series A:Mathematical,Physical and Engineering Sciences),1998,454(1971):903-995.
  • 10Wang L,Emmanuel S,Kankanhalli M S.EMD and psychoacoustic model based watermarking for audio[A].2010 IEEE International Conference on Multimedia and Expo (ICME)[C].Suntec City:IEEE Press,2010.1427-1432.

二级参考文献46

  • 1宋华,幸丘林,李维奇,戴一奇.MP3Stego信息隐藏与检测方法研究[J].中山大学学报(自然科学版),2004,43(A02):221-224. 被引量:9
  • 2马翼平,韩纪庆.DCT域音频水印:嵌入对策和算法[J].电子学报,2006,34(7):1260-1264. 被引量:33
  • 3DUMITRESCU S, WU X L,WANG Z. Detection of LSB steganography via sample pair analysis[J].IEEE Trans on Signal Processing, 2003 51 (7): 1995-2007.
  • 4AVCIBAS I, MEMON N, SANKUR B. Steganalysis using image quality metrics[J]. IEEE Trans on Image Processing, 2003, 12(2):221- 229.
  • 5LYU S W, FARID H. Steganalysis using higher-order image statistics[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(1):111-119.
  • 6ZENG W, AI H J, HU R M, et al. Steganalysis of LSB embedding in audio signals based on sample pair analysis[A]. WICOM2007[C]. 2007. 2960 - 2963.
  • 7OZER H, AVCIBACS I, SANKUR B, et al. Steganalysis of audio based on audio quality metrics[A]. Proceedings of SPIE, Security and Watermarking of Multimedia Contents V[C]. Santa Clara, CA, US, 2003.55-66.
  • 8AVCIBAS I. Audio steganalysis with content-independent distortion measures[J]. Signal Processing Letters, 2006, 13(2):92-95.
  • 9RU X M, ZHANG H J, HUANG X. Steganalysis of audio: attacking the Steghide[A]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics[C]. 2005.3937-3942.
  • 10JOHNSONG M K, LYU S, FARID H. Steganalysis of recorded speech[A]. Security, Steganography, and Watermarking of Multimedia Contents Ⅶ[C]. CA, USA, 2005.664-672.

共引文献373

同被引文献30

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部