期刊文献+

一种抗特征分析替换攻击的数字语音取证算法 被引量:4

A Content Authentication Algorithm for Digital Speech Signal Robust Against Feature-Analyzed Substitution Attack
下载PDF
导出
摘要 本文基于数字语音信号的保密特征,提出一种抗特征分析替换攻击的语音取证算法。给出语音信号保密特征——能量比的定义,讨论基于该特征水印嵌入的理论依据,将各帧帧号映射为整数序列的水印信息,通过量化能量比的方法嵌入到语音信号中。实验分析结果表明,本文提出的算法具有较好的不可听性和抗信号处理的能力,同时能够抵抗特征分析替换攻击,提高水印系统的安全性。 Based on the security feature of the digital speech signal, a content authentication algorithm for speech signal against feature-analyzed substitution attack was proposed.The definition of energy ratio as a se-curity feature of the speech signal was given,and the theoretical basis of the watermarking embedding is dis-cussed.Frame number was mapped to a sequence of integers and embedded by quantifying the energy ratio. The performance analysis demonstrates that the proposed schemeis inaudible,robust against feature-analyzed substitution attack,and improves the security of the watermark system.
作者 王静 刘正辉 祁传达 王宏霞 WANG Jing;QI Chuanda;LIU Zhenghui;WANG Hongxia(College of Mathematics and Information. Science, Xinyang Normal University, Xinyang 464000, China;College of Computer and Information. Technology, Xinyang Normal University, Xinyang 464000,China;School of Information. Science and Technology, Southwest Jiaotong University, Chengdu 610031, China)
出处 《铁道学报》 EI CAS CSCD 北大核心 2016年第6期73-78,共6页 Journal of the China Railway Society
基金 国家自然科学基金(61272465 61502409 11547122) 信阳师范学院"南湖学者奖励计划"青年项目
关键词 数字水印 内容取证 篡改定位 特征提取 Algorithms Authentication Digital watermarking Feature extraction Security systems
  • 相关文献

参考文献11

  • 1PUN C M ,YUAN X C. Robust Segments Detector for DesynchronizationResilient Audio Watermarking [J ]. IEEETransactions on Audio, Speech, and Language Processing,2013,21(11) : 2 412-2 424.
  • 2XIANG S J,K IM H J, HUANG J W. Audio WatermarkingRobust Against Time-sc ale Modification and MP3 Compression[J]. Signal Processing,2008,88(10) : 2 372-2 387.
  • 3WANG X Y ,M A T X ,N IU P P. A Pseudo-zernike MomentsBased Audio Watermarking Scheme Robust AgainstDesynchronization Attacks [J]. Computers and ElectricalEngineering ,2011,37 (4):425-443.
  • 4WANG Y, WU S Q, HUANG J W. Audio WatermarkingScheme Robust Against Desynchronization Based on theDyadic Wavelet Transform [J]. Journal of Advances in SignalProcessing,2010(13) :1-17.
  • 5王宏霞,范明泉.基于质心的混合域半脆弱音频水印算法[J].中国科学:信息科学,2010,40(2):313-326. 被引量:12
  • 6宁超魁,和红杰,陈帆,尹忠科.基于近似分量能量的半脆弱音频水印算法[J].铁道学报,2013,35(1):46-50. 被引量:7
  • 7ZHAO H,M ALIK H. Audio Recording Location IdentificationUsing Acoustic Environment Signature [ J]. IEEETransaction on Information Forensics and Security, 2013,8(11) : 1 676-1 759.
  • 8LIU Z H,W ANG H X. Pseudo-zernike Moments-based AudioContent Authentication Algorithm Robust Against Feature-analysed Substitution Attack [ J ] . Multimedia Toolsand Applications,2014,70(3) : 2 271-2 291.
  • 9LIU Z H,W ANG H X. A Novel Speech Content AuthenticationAlgorithm Based on Bessel-fourier M oments[J]. DigitalSignal Processing,2014,24(1) : 197-208.
  • 10黄诚,易本顺.喷泉码的Logistic映射实现[J].北京邮电大学学报,2009,32(1):103-107. 被引量:11

二级参考文献34

  • 1王宏霞,范明泉.基于质心的混合域半脆弱音频水印算法[J].中国科学:信息科学,2010,40(2):313-326. 被引量:12
  • 2李伟,袁一群,李晓强,薛向阳,陆佩忠.数字音频水印技术综述[J].通信学报,2005,26(2):100-111. 被引量:73
  • 3全笑梅,张鸿宾.用于篡改检测及认证的脆弱音频水印算法[J].电子与信息学报,2005,27(8):1187-1192. 被引量:14
  • 4Castura J, Mao Yongyi. Rateless coding over fading channels[J]. IEEE Communication Letters, 2006, 10 (1) : 46-48.
  • 5Ma Yuanyuan, Yuan Dongfeng, Zhang Haixia. Fountain codes and applications to reliable wireless broadcast system [ C] // Proceedings of IEEE Information Theory Workshop. Chengdu: IEEE Press, 2006: 66-70.
  • 6Tee R Y S, Nguyen T D, Yang Lieliang, et al. Serially concatenated luby transform coding and bit-interleaved coded modulation using iteratlive decoding for the wireless internet [ C ] //Vehicular Technology Conference, VTC 2006-Spring. IEEE 63^rd. Melbourne: IEEE Press, 2006 : 22-26.
  • 7Venkiah A, Piantanida P, Poullia C, et al. Rateless coding for quasi-static fading channels using channel estimation accuracy [ C ]//IEEE International Symposium on Information Theory. Toronto: IEEE Press, 2008:2257- 2261.
  • 8Luby M. LT codes[C]//Proceedings of The 43^rd Annual IEEE Symposium on Foundations of Computer Science. Vancouver; IEEE Press, 2002. 271-282.
  • 9Shokrollah M A. Raptor codes[J]. IEEE Transactions on Information Theory, 2006, 52(6) : 2551-2567.
  • 10Makay D J. Fountain codes [J]. Proceedings of IEEE Communications, 2005, 152(6): 1062-1068.

共引文献23

同被引文献14

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部