In digital audio watermarking, the watermark's vulnerability to desynchronization attacks has long been a difficult problem. According to the audio statistics characteristics and synchronization code technique, a ...
详细信息
In digital audio watermarking, the watermark's vulnerability to desynchronization attacks has long been a difficult problem. According to the audio statistics characteristics and synchronization code technique, a new robust audio watermarking scheme against desynchronization attacks is proposed in this paper. Firstly, the original digital audio is segmented and then each audio segment is cut into two parts. Secondly, with the spatial watermarking technique, the synchronization code is embedded into the statistics average value of audio samples in the first part. Finally, the second part of audio segment is Cut into audio sections, the DWT is performed on the audio sections, and the watermark bit is embedded into the statistics average Value of low frequency components. Experimental results show that the proposed scheme is inaudible and robust against common signals processing, including MP3 compression, low-pass filtering, noise addition, and equalization, etc. Moreover, it also survives several desynchronization attacks, such as random Cropping, amplitude variation, pitch shifting, time-scale modification, and jittering, etc. (C) 2009 Elsevier Ltd. All rights reserved.
Based on the method of information hiding, a novel algorithm for security speech communication is designed in this paper,and the synchronization code can be used to search the embedded location. Firstly, the DWT is pe...
详细信息
ISBN:
(纸本)9781424429097
Based on the method of information hiding, a novel algorithm for security speech communication is designed in this paper,and the synchronization code can be used to search the embedded location. Firstly, the DWT is performed on each segment of the original carrier audio;Secondly, the embedding bits are constructed by the synchronization code and secret audio,and the secret bits are formed by chaotic encrypting;Thirdly, the secret bits are embedded into the low frequency point of Discrete Wavelet Transform (DWT) by quantization;Lastly,the IDWT are performed on each segment and the setgo audio are constructed. The original carrier audio is not required in the secret audio recovery. Experimental results show that the stego audio has transparent feature, and the quality of the recovered audio is satisfying. The algorithm is strongly robust to many attacks, such as resampling, cropping and so on..
It is a challenging work to design a robust digital audio watermarking scheme against desynchronization attacks. On the basis of support vector machines (SVMs), a new robust digital audio watermarking algorithm agains...
详细信息
It is a challenging work to design a robust digital audio watermarking scheme against desynchronization attacks. On the basis of support vector machines (SVMs), a new robust digital audio watermarking algorithm against desynchronization attacks is proposed in this paper, and in this the audio statistics characteristics and synchronization code are utilized. Firstly, the optimal embedding positions are located adaptively by using the SVM theory. Secondly, the 16-bit Barker code is chosen as synchronization mark and embedded into the digital audio by modifying the statistics average value of several samples. Finally, the digital watermark are embedded into the statistics average value of low-frequency components in wavelet domain by making full use of auditory masking. Experimental results show that the proposed scheme is inaudible and robust against common signal processing such its MP3 compression, low-pass filtering, noise addition, equalization, etc., and is robust against desynchronization attacks such as random cropping, amplitude variation, pitch shifting, time-scale modification, jittering, etc. (C) 2007 Elsevier Ltd. All rights reserved.
In concurrent object-oriented languages, the inheritance anomaly is an important and difficult problem which makes synchronization code difficult to reuse. Based on the two-layered-class model, this paper proposes a n...
详细信息
In concurrent object-oriented languages, the inheritance anomaly is an important and difficult problem which makes synchronization code difficult to reuse. Based on the two-layered-class model, this paper proposes a new approach to provide flexible and sufficient support for the reuse of synchronization code. (C) 2001 Elsevier Science B.V. All rights reserved.
暂无评论