用户名: 密码: 验证码:
一种双盲音频数字水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着数字技术和因特网的发展,数字水印技术成为一种有效的数字产品版权保护和数据安全维护技术,是信息隐藏技术研究领域的一个重要分支。它通过将具有特定意义的标记嵌入到数字产品中来确定数字产品的所有权或验证其原始性与完整性。
     本文首先回顾了数字水印技术的发展历史,介绍了数字水印的一些基本问题,归纳了数字水印系统的基本框架,并分析了现有的一些音频数字水印技术的工作原理。
     在此基础上,为了达到版权保护和内容认证的双重目的,本文提出了一种新颖的音频双水印算法。首先对音频信号进行小波分解,然后对低频系数进行量化处理,嵌入置乱后的鲁棒水印,达到对音频作品版权保护的目的。同时对小波分解后的高频系数进行奇异值(SVD)处理,并采取模2取余的方法作为脆弱水印嵌入策略,实现对音频作品内容认证的目的。在提取水印时不需要原始信号的参与,提高了算法的适用性。实验结果表明:文中提出的双盲水印算法具有很强的鲁棒性和较好的脆弱性。
     最后,总结全文,对音频数字水印的发展趋势作了展望。
     本文提出的音频数字水印算法,改进了现有水印算法的一些不足,在鲁棒性和隐蔽性之间达到了较好的平衡,对研究音频数据版权保护的问题是一个有益的尝试。
With the development of digital technology and internet, digital watermark technology becomes one kind of effective protection technology for digital product copy right and maintenance technology for data security, and it is one of the branches of research aspect of information hiding technology.
     First we review the development history of digital watermark, introduce some basic issues and conclude the framework of embedding and detection system. Secret information can be embed into audio files with these techniques, so as to achieve copyright protection and cover communication about digital watermarking and Wavelet analysis and then focused on the principles of those techniques.
     According to the theory presented above, a novel dual watermarking of digital audio scheme is proposed in which robust and fragile watermarking are simultaneously embedded for copyright protection and content authentication. First the robust watermark is embedded by quantizing amplitude of DWT low frequency coefficients of digital audio. Then, singular value decomposition is used to extract the DWT high frequency coefficients value that embedded fragile watermark based on modular arithmetic. And embeds watermarks into original signals with out modifying the audio data. Experimental results show that the watermarking scheme is indeed superb in terms of robustness and fragility.
     At last, a conclusion of this paper is given, and a prospect for the future of audio digital watermarking is also presented
     The new audio digital watermarks algorithm presented in this thesis can get better results and better trade off between the robustness and imperceptible. It is a very significant attempt for researching on the protection of audio copy right.
引文
[1]KIM H J,KIM T,YEO IK.A robust audio watermarking scheme[C].In:IEEE International Symposium on Circuits and Systems(ISCAS 2004),2004:696-699
    [2]王丽娜,董晓梅,梅哲等.图像及声音的数字水印嵌入研究与实现.东北大学学报(自然科学版).2002,23(3):217-220
    [3]Frank Hartung,Martin Kutter.Watermarking Techniques.Proceeding of the IEEE,1999,87(7):1079-1107
    [4]Bender W,etal.Techniques for data hiding.IBM System Journal,1996,35(3&4):313-336
    [5]Bassiap,Pitasi.Robust audio watermarking in the time domain[A].Proceedings of EUSIPCO'98[C].Rhodesk,Greece,1998.
    [6]GruhlD.,LuA.,Bender W..Echohiding.In:Anderson R.J.ed..Proceedings of the 1st Information Hiding Workshop.LNCS1174,Berlin:Germany Springer Verlag,1996,295-315.
    [7]Cox I J,etal.Secure spread spectrum watermarking for multimedia.Technical Report 95-10,1995,NEC Research Institute,Princeton,NJ
    [8]付兴槟.基于均值量化的音频脆弱水印算法研究.应用科技,2005,32(8):17-19
    [9]王向阳,杨红颖.基于人类听觉系统的DCT域数字音频脆弱水印算法.大连理工大学学报,2003,43(1):23-26
    [10]彭玉华著.小波变换与工程应用,科学出版社,2000
    [11]Daubechies I.Ten lectures on wavelets.Society for Industrial and Applied Mathematics.Philadelphia,PA,1992.
    [12]Daubechies I.The wavelet transform,time-frequency localization and signal analysis.IEEE Transactions on Information Theory,1990,36(5):961-1005.
    [13]秦前清,杨宗凯.实用小波分析[M].西安:西安电子科技大学出版社.1998,1.
    [14]Mallat S著,杨力华,戴道清,黄文良等译.信号处理的小波导引[M].中国机械工业出版社.2002年.
    [15]胡昌华,张军波,夏军等.基于matlab的系统分析与设计:小波分析[M].西安:西安电子科技大学出版社.1999,12
    [16]王秋生,孙圣和,郑为民.数字音频信号的脆弱水印嵌入算法[J].计算机学报,2002,25 (5):520-525
    [17]侯启槟,杨晓帆,王海涛,等.奇异值分解与PKI结合点鲁棒图像认证方法[J].计算机科学,2004,31(3):145-149
    [18]王剑.基于模数运算的DWT域数字音频水印[J].计算机工程,2004,30(6):44-45
    [19]Li Xin,YU H H.Transparent and robust audio data hiding in cepstrum domain:IEEE Press,2000,1:397-399
    [20]谢志文,尹俊勋.音频掩蔽效应的研究及发展方向.电声技术,2002,12:4-7
    [21]杨行峻,迟惠生等编著.语音信号数字处理,北京:电子工业出版社,1995
    [22]戴跃伟,茅耀斌,王执拴等.音频信息隐藏技术及其发展方向,信息与控制,2001,30(5):385-391
    [23]杨行峻等.语音信号数字处理.北京:电子工业出版社,1995
    [24]王炳锡.语音编码.西安:西安电子科技大学出版社,2002
    [25]王炳锡,陈琦.数字水印技术.西安:西安电子科技大学出版社.2003
    [26]TIRKEL A Z,RANKIN G.A,SCHYNDEL R V.Electronic watermark[A].Digital Image Computing Technology and Applications[C].1993.666-672
    [27]Changsheng Xu,Yongwei Zhu,David Dagan Feng.Digital Audio Watermarking Based-on Multiple-Bit Hopping and Human Auditory System.International Multimedia Conference September 2001-October 2001 Ottawa Canada.
    [28]Ken C.Pohlmann.数字音频原理与应用.电子工业出版社.2002
    [29]Wang Ye.A new watermarking method of digital audio content for copyright protection.Proceedings of ICSP'98,1998,1:1420-1423
    [30]钮心忻,杨义先.基于小波变换的数字水印隐藏与检测算法.计算机学报,2000,23(1)
    [31]Siebenhaar F,etal.New results on combined audio compression/Watermarking.111th Audio Engineering Society Convention,November 30-December 2,2001,New York USA,Preprint 5442
    [32]李跃强.数字音频水印算法研究[硕士学位论文].湖南:湖南大学,2006
    [33]汪小帆,戴跃伟,茅耀斌.信息隐藏技术.机械工业出版社.2001
    [34]Voyatzis G.Pitas I.The use of watermarks in the protection of digital multimedia products.Proceedings of IEEE,1999,1:666-673
    [35]Michael Arnold.Audio watermarking:feature,applications and algorithms[C].IEEE International Conference Multimedia Expo,2000,vol.2,pp.1013101
    [36]陈旭.基于语音信息隐藏的隐蔽通信系统[硕士学位论文].广州:中山大学,2005
    [37]R.Barnet and D.E.Pearson "Frequency mode LR attack operator for digitally watermarked images," Electron.Lett..vol.34,no 19 pp.1837-1839Sept.
    [38]M.Swanson,M.Kobayashi,and A.Tewfik," Multimedia data-embedding and watermarking strategies," Pros.IEEE,vol.86,pp.1064-1087,June 199
    [39]刘长青.音频数字水印技术的研究与应用.湖南文理学院学报(自然科学版),2005,Vol.17(1):40-41
    [40]王让定,徐达文,陈金儿.基于频率掩蔽效应的自适应音频数字水印技术.计算机工程与应用.2004,15:31-33
    [41]王向阳,杨红颖,赵红.一种新的自适应量化数字音频水印算法.声学技术,2004,3:117-120
    [42]ZHAO J,KOCHE,LU O C.In business today and tomorrow.Communications of the ACM,1998,41(7):67-62
    [43]陈明奇,钮心忻.数字水印的研究进展和应用.通信学报,2001,22(5)
    [44]Cox I J,Miller M.L.The first 50 years of electronic watermarking.EURASIP J.of Applied Signal Processing,2002,2:126-132
    [45]于帅珍.基于混沌加密和小波变换的数字水印算法研究和实现[硕士学位论文],上海:华东师范大学,2006
    [46]A.Okasasoglu,T.A.Akgul.A linear inverse system approach in the context of chaotic communications.IEEE Trans on Circuits and Systems(1),1997,44(1):75-79.
    [47]May,R.M.Simple mathematical model with very complicated dynamics,Nature,261,459-281,1976
    [48]丁伟,齐东旭.数字图像变换及信息隐藏与伪装技术[J]计算机学报,1998,21(9):838-843.
    [49]张华熊,仇佩亮.置乱技术在数字水印中的应用[J]电路与系统学报,2001,9(6):32-36
    [50]王丽娜,郭迟,李鹏.信息隐藏技术实验教程.武汉:武汉大学出版社,2004
    [51]Liu RZ,Tan TN.SVD-based watermarking scheme for protecting rightful ownership.IEEE Trans.On Multimedia,2002,4(1):121-128

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700