期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
量化索引调制水印算法及其MATLAB实现
1
作者 江武志 钟乘强 《信息通信》 2015年第12期72-73,共2页
数字水印技术是确保数字产品版权的一种有效的手段。量化索引调制算法是一种经典的水印算法,它按照水印信息,应用不同的量化器将载体数据调制到不同的索引区间。文章利用Matlab软件,实现了数字水印的嵌入的和提取,具有较高的现实意义。
关键词 数字水印 量化索引调制算法 MATLAB
下载PDF
QIM digital watermarkingbased on LDPC code and messagepassingunder scalingattacks
2
作者 崔鑫 颜斌 +1 位作者 贾霞 王亚菲 《Journal of Measurement Science and Instrumentation》 CAS 2014年第1期37-40,共4页
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati... Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization. 展开更多
关键词 digital watermarking quantization index modulation (QIM) message passing algorithm based on factor graph low density parity check (LDPC) code amplitude scaling attack
下载PDF
Steganography in low bit-rate speech streams based on quantization index modulation controlled by keys 被引量:7
3
作者 HUANG YongFeng TAO HuaiZhou +1 位作者 XIAO Bo CHANG ChinChen 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2017年第10期1585-1596,共12页
Since low bit-rate speech codecs used for voice over internet protocol (VolP), such as iLBC (internet low bit-rate codec), G.723.1 and G.729A, have less redundancy due to high compression, it is more challenging t... Since low bit-rate speech codecs used for voice over internet protocol (VolP), such as iLBC (internet low bit-rate codec), G.723.1 and G.729A, have less redundancy due to high compression, it is more challenging to embed information in low bit-rate speech streams of VolP. In this study, a new method is proposed for steganography in low bit-rate speech streams of VolP. The core idea of this method is setting up a graph model for the codebook space of the quantizer. Based on the graph model, the method realises a quantization index modulation (QIM)-controlled algorithm for partitioning the codebook space. It can be proved that this method can minimize signal distortion while steganography taking place. Taking into account codeword partition balance and partition diversity, the proposed steganographic algorithm was based on QIM controlled by secret keys, i.e., mapping the ways of codebook division into secret keys, thereby significantly improving the undetectability and robustness of VolP steganography. Performance measurements and steganalysis experiments showed that the proposed QIM-controlled steganographic algorithm was more secure and robust than the QIM algorithm, the conventional RANDOM algorithm and the original codebook algorithm. 展开更多
关键词 STEGANOGRAPHY VOIP QIM graph theory QIM-controlled
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部