期刊文献+

用于内容认证的半脆弱音频零水印算法 被引量:7

Semi-fragile audio zero-watermarking algorithm for content authentication
在线阅读 下载PDF
导出
摘要 提出了一种可用于版权和内容认证的半脆弱音频零水印算法,该算法提取载体音频的中低频分量构造零水印,确保了水印算法的不可感知性,并可实现盲检测。采用自适应的音频分帧方法,合理地分配了水印图像的像素点,从而提高了算法的篡改定位能力和对于常规攻击的鲁棒性。同时利用多级置乱技术消除水印图像的相关性,提高了算法的安全性以及对于常规攻击的鲁棒性。算法不但可进行完整性认证,还可以通过篡改评估准确定位篡改区域。实验结果表明,该算法对于常规攻击具有较好的鲁棒性,对恶意攻击还体现了很强的篡改定位能力。 This paper proposed a new semi-fragile audio zero-watermarking algorithm which can be used to authenticate the copyright and content of digital data.This algorithm has the following features:(1) it extracted the low frequency components of host audio to construct zero-watermarking,ensured the imperceptibility of watermarking algorithm,and achieved blind detection;(2) it distributed the pixels of watermarking images rationally by adopting an adaptive audio segmentation frame method,and improved the capability of tampering localization and robustness of regular attacks;(3) it used multilevel scrambling technology to eliminate the correlation of the watermarking images,improved its safety and the robustness toward regular attacks.Meanwhile,this algorithm can not only conduct the integrity authentication,but also locate the tampering area accurately by tampering assessment.The experimental result shows that this algorithm has good robustness toward regular attacks and strong capability of tampering localization toward malicious attacks.
出处 《计算机应用》 CSCD 北大核心 2012年第4期976-980,共5页 journal of Computer Applications
关键词 零水印 半脆弱水印 内容认证 篡改定位 自适应分帧 zero-watermarking semi-fragile watermarking content authenticity tampering location adaptive frame
  • 相关文献

参考文献12

二级参考文献73

  • 1李伟,袁一群,李晓强,薛向阳,陆佩忠.数字音频水印技术综述[J].通信学报,2005,26(2):100-111. 被引量:73
  • 2全笑梅,张鸿宾.用于篡改检测及认证的脆弱音频水印算法[J].电子与信息学报,2005,27(8):1187-1192. 被引量:14
  • 3张兵路,姜建国,冯复科.基于DWT的音频“零数字”水印技术研究[J].计算机工程,2005,31(18):148-149. 被引量:13
  • 4陈金儿,王让定,王晓丽.数字音频双重水印算法[J].宁波大学学报(理工版),2006,19(1):54-58. 被引量:4
  • 5吴艺杰,杨晓元,魏立线,钮可.一种新颖的音频双水印算法[J].计算机工程与应用,2006,42(26):33-35. 被引量:4
  • 6Lahouari G, Ahmed B, Mohammad K I, and Said B. Digital image watermarking using balanced multiwavelets. IEEE Trans. on Signal Processing, 2006, 54(4): 1519-1536.
  • 7Yuan H and Zhang X P. Multiscale fragile watermarking based on the gaussian mixture model. IEEE Trans. on Image Processing, 2006, 15(10): 3189-3200.
  • 8Schlauweg M, Pr6frock D, Palfner T, and Mtlller E. Quantization-based semi-fragile public-key watermarking for secure image authentication. In Proc. of SPIE, San Diego, California, USA, 2005, 5915: 41-51.
  • 9Sharkas M, E1Shafie D, and Hamdy N. A dual digital-image watermarking technique. In Proc. of 3rd WOrld Enformatika Conference (WEC'05), Istanbul, Turkey, 2005: 136-139.
  • 10COX I, MILLER M, The first 50 years of electronic watermarking[J]. Journal of Applied Signal Processing, 2002, 2: 126-132.

共引文献371

同被引文献45

引证文献7

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部