期刊文献+

变换域内利用SVD的音频数字盲水印算法 被引量:6

A Digital Audio Blind Watermarking Algorithm Using SVD in Transform Domain
下载PDF
导出
摘要 为了有效地保护音频数字的版权,提出了一种基于离散小波变换(Discrete Wavelet Transformation,DWT)和奇异值分解(Singular Value Decomposition,SVD)并利用人耳听觉系统(Human Audio System,HAS)特性的音频数字水印算法。根据音频信号的特征选择短时能量大的音频段,利用局部最大值追踪算法选择最佳嵌入位置,并进行DWT变换,提取中频系数做奇异值分解,采用量化的思想嵌入水印。在提取水印阶段,只需要判断奇异值的奇偶性即可得到水印序列。验证结果表明,该算法具有良好的透明性和鲁棒性,对于常见的攻击都有较强的抵御能力。 For copyright protection of digital audio,a Discrete Wavelet Transform(DWT)-Singular Value Decomposition(SVD)based blind audio watermarking algorithm exploiting the Human Audio System(HAS)features is proposed.The algorithm finds the audio segments with highest short-term energy according to the characteristics of the audio signal.The optimal embedding position is selected from those segments by a local maximum tracking algorithm and the DWT is applied.The intermediate frequency coefficients are extracted for SVD,and the watermark is embedded based on quantization.In the extraction process,the watermark sequence can be obtained by judging the parity of the singular values.Validation results show that the proposed algorithm is transparent,robust and resistance to common attacks.
作者 彭飞 刘亮 高勇 PENG Fei;LIU Liang;GAO Yong(College of Electronics and Information Engineering,Sichuan University,Chengdu 610065,China)
出处 《无线电工程》 北大核心 2021年第6期446-452,共7页 Radio Engineering
关键词 音频盲水印 离散小波变换 奇异值分析 鲁棒性 透明性 audio blind watermarking discrete wavelet transformation singular value decomposition robustness transparency
  • 相关文献

参考文献5

二级参考文献46

  • 1钟西,唐向宏.基于音频特征的小波域零水印算法[J].杭州电子科技大学学报(自然科学版),2007,27(2):33-36. 被引量:2
  • 2钮心忻.信息隐藏与数字水印的研究及发展[J].计算机教育,2005(1):22-24. 被引量:17
  • 3卢欣,叶成荫,吴旭翔.一种基于能量特征的LSB方法设计[J].商场现代化,2007(04Z):37-38. 被引量:3
  • 4李文治.鲁棒性数字音频水印算法研究[D].北京:北京化工大学,2010:23-24.
  • 5张明.数字音频水印技术的研究[D].秦皇岛:燕山大学,2010:10-12.
  • 6LOUD C, HU C H. LSB steganographic method based on reversible histogram transformation function for resisting statisti- cal steganalysis[ J]. Information Sciences, 2012, 188(4) :346-358.
  • 7SAHA B, SHARMA S. Steganographic techniques of data hiding using digital images[ J]. Defence Science Journal, 2012, 62(1) :11-18.
  • 8Deepa M J, Karuppathal R,Vincent A K.Copyright pro- tection using digital watermarking[C]//National Conference on Advances in Computer Science and Applications (NCACSA 2012) ,2012:24-27.
  • 9Katariya S S.Digital watermarking: review[J].Intemational Journal of Engineering and Innovative Technology(IJEIT), 2012,1(2) : 143-153.
  • 10Adelsbach A, Sadeghi A R.Zero-knowledge watermark detec- tion and proof of ownership[C]//Lecture Notes in Computer Science: International Workshop on Information Hiding, Pittsburgh, PA, USA, 2001 : 273-288.

共引文献32

同被引文献36

引证文献6

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部