




已阅读5页,还剩13页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
第1页外文文献资料ResearchandimplementationoftheaudioinformationhidingAbstract:Informationhidingtechniquehasbecomehotspotsresearchinrecentyears,themajorcontentofthehidingtechniqueisseektothealgorithmthatinsertthesecretinformationintothehostinformationThehostinformationmaybethetext,theimage,theaudioetcRecently,withthedevelopingofinformationhidingtechnique,theaudiodigitalwatermarktechniqueisbecomingahottopicItcanbeusedtoprotectingcopyright,hidingcommunicationbyembeddingthesecretinformationintotheaudiofileTheaudiodigitalwatermarktechniquesarediscussedindetailinthispaper.Inthispaperwepresentanoveltechniqueforembeddingdigitalwatermarksintodigitalaudiosignals.Watermarkingisatechniqueusedtolabeldigitalmediabyhidingcopyrightorotherinformationintotheunderlyingdata.Thewatermarkmustbeimperceptibleandshouldberobusttoattacksandothertypesofdistortion.Inaddition,thewatermarkalsoshouldbeundetectablebyallusersexcepttheauthorofthepiece.Finally,discussestheDWT(discretewavelettransform)domainofanaudiowatermarkembeddingandextractionalgorithm.Keywords:informationhiding;audioinformationhiding;wavelettransform;digitalwatermarking;1.IntroductionIntodaysdigitalandinformationtechnologyundertheconditionofmoremature,becauseoftherelationshiptotheinformationsecuritytothecountrySecuritytocommercialsecretsandpersonalprivacy,andmanyotheraspects,sotheinformationsecuritytechnologyfromthebeginningofbirthhasreceivedwidespreadattentionandconsiderableattention.Asanimportantbranchofinformationsecurity,theinformationhidingtechnologyhasgoodconcealmentandsimplicityandgraduallytobecomeoneofresearchhotspots第2页inthefieldofinformationsecurity.Informationhidingisanemerginginthefieldofinformationsecurityisalsoveryimportantfieldofstudy,mainlystudythespecificinformationhidingindigitalinformation(carrier)methodsinthehost.Undertheairspaceortransformdomain,thetechnologyismainlyinthehostinformationformat,size,qualityunchangedunderthepremiseoftheclearinformationtoacertainprocessingalgorithmfusiontothehostinformation,andthefusion,theexternalformofthehostinformation,inthecaseofwithoutspecialhandlingplaintextinformationisnotvisible.Onlywithclearinformationofhostseparationalgorithmtotheprocessingofinformationwilldefinitelyreturnallinformationcondition.Bookinformationtherearetextfiles,thebitmapfile,videoandaudiofiles,fornow,howaboutinatextfile,thebitmapfileandstudyalotofvideofileshiddeninformation,andforaudioinformationhidingtechnologyisverylittlereported.Digitalwatermarkingtechnologyistheinformationhidingtechnologyinthetypicalapplicationofcopyrightprotection,therearemanyscholarsinvariousacademicjournalsofstoriesaboutthedigitalwatermarkingtechnology,digitalwatermarkingtechnologyismainlydividedintotheairspace,transformdomainandspreadspectrumtechnology,buteachhasitsdrawbacks.Thispap-erdiscussestheDWT(discretewavelettransform)domainofanaudiowatermarkembeddingandextractionalgorithm.2.Digitalwatermarkingtechnology2.1.TheresearchbackgroundAlongwiththedevelopmentofdigitaltechnologyandInternet,variousformsofmultimediadigitalworksarepublishedintheformofnetwork,digitalworks,however,theconvenienceandsecurityiscoexist,itwouldbelowcost,highspeedcopyandspread,suchascreatorsandusersprovidesagreatconvenience,butthesefeaturesareeasytobeusedbythepirates,therefore,thedigitalworkstoprotect,byavarietyofmeanstopunishviolatorshasbecomeaveryurgentwork.Similarlegalworksinadditionto第3页thetraditionalcopyrightprotectionandmanagement,alsoshouldaccordingtothecharacteristicsofthedigitalworksitselftoprovidethetechnicalprotection.Theresearchofdigitalwatermarkingisdevelopedrapidlyunderthisapplicationneeds.Digitalwatermarkingisaneffectivedigitalproductscopyrightprotectionanddatasecuritymaintenancetechnology.Itisofparticularsignificanceoftag(watermark),themethodofusingdigitalembeddedhiddenindigitalimage,audio,documents,books,videoandotherdigitalproducts,inordertoprovetheownershipofthecreatorforitsproducts,andasevidenceofidentification,prosecutetheillegalinfringement,atthesametime,throughtothewatermarkdetectionandanalysistoensurereliabilityandintegrityofthedigitalinformationtointellectualpropertyprotectionanddigitalmultimediaanti-counterfeiteffectivemeans.Digitalwatermarkingtechnologybesidesshouldhavethegeneralcharacteristicsofinformationhidingtechnology,withitsinherentcharacteristicsandresearchmethods.2.2.ThecharacteristicsofdigitalwatermarkingDigitalwatermarkisembeddedintotheprotectedobjects(suchasstaticimages,video,audio,etc.),someofthecardtothecopyrightofdigitalinformation,canbetheauthorsname,serialnumber,companylogoetc.Digitalwatermarkingtechnologyhasitsinherentcharacteristicsandresearchmethods.Forexample,fromthepointoftheinformationsecurity,thehiddeninformationifiseroded,systemcanberegardedassafe,becausethesecretinformationdidnotleak,however,inthedigitalwatermarkingsystem,thelossofthehiddeninformationmeansthecopyrightinformationismissing,andlosethefunctionofcopyrightprotection.Sothedigitalwatermarkingsystemmusthavestrongerrobustness,securityandtransparency,etc.(1)Transparency(hidden):throughaseriesofhiddenprocessing,thetargetdatamustbenoobviousdropqualitativephenomenonandhiddendatacantpeopleseeorhear.(2)Robustness(robustness):referstoresistavarietyofprocessingoperationsandmaliciousattackswithoutcausingwatermarkinformationloss.Theso-calledoperationsinclude:intheprocessoftransmissionchannel第4页noise,filtering,enhanced,losscompression,geometrytransformation,D,A,orMDconversionandsoon.Theso-calledattackinclude:tamperedwith,forge,removethewatermark,andsoon.Digitalwatermarkingoriginatedininformationhidingtechnology;thiscanbeconfirmedfromitshiddenrequest.(3)Securityhiddenposition:referstothewatermarkinformationhidingwithinacontentofthetargetdata,ratherthanthefilesthefirstplace,thispreventsforfileformatconversionandruinedthewatermark.(4)Noambiguity:recoverthewatermarkorwatermarkjudgmentshouldbeabletodeterminethattheresultoftheownershipofthemultipleownershipdisputeswillnotoccur.(5)General(ease):referstothewatermarkalgorithmshouldbeapplicabletoavarietyoffileformatsandmediaformat.2.3.ThetraditionalaudiowatermarkinformationSofar,morematurerecognizedaudioinformationhidingtechnologyhasfourkinds:theleastimportantmethod;Echohidingmethod;Phaseencodingmethod;Spreadspectrummethod.(1)TheleastimportantmethodLeastsignificantbit(LSB)methodisoneofthesimplestdataembeddingmethod.Anysecretdatacanberegardedasastringofbinarybitstream,andaudiofilesofeachsamplingdataisalsoexpressedinabinarynumberto,socaneachsamplingvaluesoftheleastimportantbits(inmostcasesitslowest)replacewithrepresentativeofsecretdatabits,inordertoachievethepurposeofembeddingsecretdataintheaudiosignal.Thismethodadvantageis:easytoimplement;Audiosignalcanbeencodedinthelargeamountofdata;Instreamencryptionthedataitselfisencryptedandembeddedprocessrespectively,itssecurityreliesonthekey;Informationembeddingandextractionmethodissimple,fastspeed.Weakness:theresistancetochannelinterferenceanddatamanipulationisverypoor,noise,compression,filtering,theresamplewilldestroythewatermarkingdata,sothepracticalvalueissmaller.(2)WatermarkingalgorithmbasedontheechoEchoHidingistheuseoftheEchoareintroducedtothesecretdatais第5页embeddedintothecarrier.Itusesthecharacteristicsofhumanauditorysystem:shieldingeffectafteraudiosignalintimedomain,theweakbecomeimpossibletohearaftertheictusvanished.Vectordata,andaftertheechohidingsecretdatafortheear,theformerislikeheardthevoicefromtheheadset,noecho,andthelatteristohearthesoundfromthespeakerisproducedbythespaceoftheecho.Echoalgorithmisdifferentfromothermethods,therefore,istoputthesecretdataasthecarrierofenvironmentalconditions,ratherthanasarandomnoiseisembeddedintothecarrierdata,sothismethodhasgoodtransparencyandrobustness.(3)SpreadspectrummethodIntheusualcommunicationchannel,tomaintaineffectivebandwidthandreduceenergy,alwaysneedtheinformationfocusedonspectrumasnarrowaspossible.Anddrawlessonsfromtheideaofspreadspectrumcommunication,caninthecodingofaudiodatastreamwhendistributethesecretdatainspectralcomponentasmuchaspossible.Inthisway,evenif:thereiscertainfrequencyinterference,alsowontaffectthereceivingdata.TherearealotofSpreadSpectrumcommunicationway,commonlyusedhavewinSequenceSpreadSpectrumcode(DirectSequenceSpreadSpectrumEncodingtheDSSS).UsingsymmetrickeyalgorithmusedinDSSSsystem,whichUSESthesamekeytoencodeanddecode.Thekeyisapseudorandomnoise,theidealpseudorandomnoiseiswhitenoiseanditsfrequencyresponseinthefrequencyrangeisgood.Keyusedtocompileinformationandadjustthesequenceintoaspreadspectrumsequence.Secretdatawasamplifiedbycarrierandpseudorandomsequence,thelatterhasaverywidespectrum.Asaresult,thedataofspectrumissplitintopossiblewavelengths.Drawlessonsfromtheideaofspreadspectrumcommunication,hiddendataflowcanbeexpandedtoasmuchaspossible,oraspecifiedfrequencybandwidth,inordertoachievethepurposeofhiddendata.AtpresentUSESthespreadspectrumtechnologyisthedirectsequencespreadspectrum,treatedwitherrorcorrectioncodingsequenceofpseudorandombinarypulseforaudiosignalmodulation,makesthewatermarkdataextendacrosstheentireaudiospectrum,oronthespecifiedfrequencyband.Tocontrolelectricalnoisefrequency,notbythehumaneardetection,mustfirstmodulationsignal第6页attenuation,makeadditiverandomnoiseaddedtotheoriginalsignal,extractionusingmatchedfiltertothewatermarkinformationretrieval,matchedfiltercoefficientisconsistentwiththereversalofthespreadspectrumsequence.Thistechniquehashighrobustnessandsecurity.(4)PhaseencodingmethodPhasecodingisoneofthemosteffectivecodingmethods.Itmakefulluseofthehumanauditorysystem(HAS)acharacteristic:theearofabsolutephasesensitivityandsensitivitytotherelativephase.Basedonthischaracteristic,usethebehalfofthesecretdataofreferencephasetoreplacetheoriginalaudiosectionoftheabsolutephaseandtoadjustotheraudiosegments,tokeeptherelativephasebetweentheparagraphsnotchange.Phaseencodingadefectis:whenonbehalfofthesecretdatareferencephasechangesharply,therewillbeobviousphasedeviation.Itnotonlyaffectstheconfidentialityofconfidentialinformation,butalsowillincreasethedifficultyofthereceiverdecoding.Acauseofthephasedeviationistousethereferencephaseinsteadoftheoriginalphaseandthedeformation,anotherreasonisthattheoriginalaudiosignalfrequencyphasechangestoofast,soyoumusttrytomaketransformationgentlytodecreasethedeformationandphasedeviationofaudio.Gentlytomaketransformation,willhavetoleavesomespacebetweenthedatapoints,whichleadtoistoreducetheinfluenceoftheembeddedaudiobitrate,ontheotherhand,inordertoenhancetheanti-interferenceabilityofthecode,shouldbetomaximizethedifferencebetweenthereferencephase,thereforeusuallychoose-PI/2insteadof0,thePI/2insteadof1.Improvedinordertomaketheinfluenceofthephasedeviation,needtobeinwithacertainintervalbetweeneachdatapointtomaketheconversionflattensout,butitwillreducethebandwidth.Soyoumustcompromisebetweendataembeddingquantityandembeddingeffect.Generallyspeaking,theamountofembeddingphaseencodingis8BPS32BPS.2.4.AudiowatermarkinginformationhidingschemeObservethata“pirate”candefeatawatermarkingschemeintwoways.Hemaymanipulatetheaudiosignaltomakethewatermarkundetectable.第7页Alternatively,hemayestablishthatthewatermarkingschemeisunreliable,e.g.,thatitproducestoomanyfalsealarmsbydetectingawatermarkwherenoneispresent.Bothgoalscanbeachievedbyaddinginaudiblejammingsignalstotheaudiopiece.Therefore,theeffectivenessofawatermarkingschememustbemeasuredbyitsabilitytodetectawatermarkwhenoneispresent(probabilityofdetection)andtheprobabilitythatitdetectsawatermarkwhennoneispresent(probabilityofafalsealarm)inthepresenceofjammingsignalsandsignalmanipulations.Severaltechniquesfordatahidinginimageshavebeendeveloped1、3、4、5、6.Amethodsimilartooursisproposedin2,wheretheNlargestfrequencycomponentsofanimagearemodiedbyGaussiannoise.However,theschemeonlymodifiesasubsetofthefrequencycomponentsanddoesnottakeintoaccountthehumanvisualsystem(HVS).Theaudiowatermarkweproposehereembedsthemaximumamountofinformationthroughoutthespectrumwhilestillremainingperceptuallyinaudible.Itiswell-knownthatdetectionperformanceimproveswiththeenergyofthesignaltobedetected.Therefore,weeffectivelyimprovetheperformanceofthewatermarkingschemebyincreasingtheenergyofthewatermarkedsignalwhilekeepingitinaudible.In7、8,wepresentedanoveltechniqueforembeddingdigitalwatermarksintoaudiosignals.Notethatourapproachissimilartothatoftheapproachof1,inthatweshapethefrequencycharacteristicsofaPN-sequence.However,unlike1weuseperceptualmaskingmodelsoftheHAStogeneratethewatermark.Inparticular,ourschemeforaudioistheonlyonethatusesthefrequencymaskingmodelsoftheHASalongwiththetemporalmaskingmodelstohidethecopyrightinformationinthesignal.Wealsoprovideastudyofthedetectionperformanceofourwatermarkingscheme.OurresultsindicatethatourschemeisrobusttolosscodingdecodingDA-ADconversion,signalresembling,andfiltering.Inthispaper,wepresentfurtherresultsshowingthatourschemeisrobustwhenthewatermarkswhicharecomposedofmultiplePN-sequencesandisrobustinthepresenceofaudibledistortionsduetovectorquantization.Finally,observethattheapproachdescribedhereforwatermarkingaudiosignalscanalsobeusedtowatermarkimageandvideodatawithappropriate第8页modificationsandextensions(e.g.7,9).2.5.ThewatermarkdesignThebasicwatermarkingstepstartswithaPN-sequenceMaximumlengthPN-sequencesthatareusedinourwatermarkingschemebecausetheyprovideaneasywaytogenerateauniquecodeforanauthorsidentification.Likerandombinarysequences,PNsequenceshave0sand1sthatoccurwithequalprobabilities.Theautocorrelationfunction(ACF)ofsuchasequencehasperiodNandisbinaryvalued10.BecauseoftheperiodicityoftheACF,thePNsequenceisself-clocking.Thisallowstheauthortosynchronizewiththeembeddedwatermarkduringthedetectionprocess.Thisisimportantifthesignaliscroppedandresample.Togeneratethewatermark,wefirstcalculatethemaskingthresholdofthesignalusingtheMPEGAudioPsychoacousticModel1,11.Themaskingthresholdisdeterminedonconsecutiveaudiosegmentsof512samples.EachsegmentisweightedwithaHammingwindow.Consecutiveblocksoverlapby50%.Themaskingthresholdisthenapproximatedwitha10thorderall-polefilterM(w),usingaleastsquarescriterion.ThePN-sequenceseq(w),isfilteredwiththeapproximatemaskingfilter,M(w),inordertoensurethatthespectrumofthewatermarkisbelowthemaskingthreshold.SincethespectralcontentoftheaudiosignalchangeswithtimewatermarksaddedtodifferentblockswillbeingeneraldifferenteveniftheyaregeneratedfromthesamestartingPN-sequence.However,itispreferabletousedifferentPNsequencesfordifferentblockstomakethestatisticaldetectionbyanunauthorizeduserofthewatermarkmoredifficult.NotealsothatusinglongPN-sequencesorembeddinglongcryptographicdigitalsignaturesalsohelpsinthatrespect.Thetimedomainweightingoperationattenuatestheenergyofthecomputedwatermark.Inparticular,watermarksobtainedasabovehaveamplitudesthataretypicallysmallerthanthequantizationstepsize.Therefore,thewatermarkwouldbelostduringthequantizationprocess.Notealsothat,asobservedearlier,detectionperformanceisdirectlyproportionaltotheenergyofthewatermark.Wehavefoundthatitispossibletoprevent第9页watermarklossduringquantizationandimprovedetectionperformancebyamplifyingthewatermarkby40dBbeforeweightingitinthetimedomainwiththerelativeenergyofthesignal.Wehavefoundexperimentallythatthisamplificationdoesnotaffecttheaudibilityofthewatermarkbecauseoftheattenuationeffectofthetimedomainweightingoperation.3.Thedomainofwavelettransform(DWT)method3.1.Thegeneralprocessofusingwaveletsignalprocessing(1)Sampling:ifthesignaliscontinuous,somustbeabletocapturetheoriginalsignalnecessarydetailsofsamplingrate.Theapplicationofdifferentdecisionsamplingrates.SuchasinordertoreproduceBeethovensninthsymphony,lifelike,besuretocapturetoclosetothehumanearhearinglimitofabout20kHzfrequencysignal,thatistheNyquistfrequency.Knowbyexperiencethatthesamplingrateshouldbe2timesoftheNyquistfrequency,whichis40KHZ,thisstepintheexperimentwedontneedtodo,becauseweusetheaudiosamplinghadbeendone.(2)Decomposition:aftersampling,anappropriatelevelofdecomposition,thewaveletcoefficientatalllevelsandtheapproximatecoefficientforaminimumlevel,isthenextsteptodealwiththeobjectofthefactorset.(3)Signalprocessing:byabandoningthesignificantcoefficientscanbecompressedsignal,orinsomeway,makethesignalfilteringanddenoising,theoutputcanbestoredandreconstructiontorestoreimmediatelyafterprocessingthesignal.3.2.Themaincontentofthealgorithm(1)TochooseapairofM1*M2binaryimageaswatermarking,canbeexpressedasP=P(i,j),0iM1,0jM2,P(i,j)(0,1).Becauseoftheaudiosignalisone-dimensional,totheimagewatermarkembeddedwatermarkimagemustbereducedtoonedimension,namelyS=S(k)=P(i,j),0iM1,0jM2,K=i*M1+j,0kM1*M2-1.(2)Foraudiosignalwaveletdomaintransformationinthefirstplace,in第10页thispaper,theaudiosignalisthreelayerswavelettransform,high-frequencycoefficientsandlow-frequencycoefficientsobtainedrespectively,andthenextractthehighfrequencycoefficientsandlow-frequencycoefficients.Herecanusewavelettransformfunction,wavedec(),appdeof(),detcoef()transformationandextractioncoefficient().Afterthedimensionofwatermarkcanmakeactualwatermarkembedding,heresetbysettingaquantitativefactortodeterminethespecificwayofembedded.Bymeansofaudiosignallowfrequencycoefficientandtheratioofquantizedcoefficientsintegermodulo2,comparingwithwatermarkimageofeachjudgment,todeterminetheembeddingform.Willworkwithallembeddedwatermarkimagesizeofthenumberoflowfrequencycoefficient,andthenthewavelethigh-frequencycoefficientswithlowfrequencycoefficient,whichcontainsthewatermarktoinversewavelettransform,getcontainaudiowatermarking,thisprocessbywaverec()functionimplementation.(3)Correspondstothewatermarkembedding,watermarkextractionprocessisbasicallytheinverseprocessofwatermarkembeddingprocess.Becausethealgorithmistoextract,sodontneedtheoriginalaudioinformation,butneedthewatermarkinformation.Toembedwatermarkaudioinformationwavelettransform,extractthelowfrequencycoefficientandarresttransform,embeddingprocedurecanextracttheembeddedinformation,ldtransformagain,youcangetthewatermarkinformation.第-11-页中文翻译稿音频信息隐藏算法的研究和实现【摘要】:信息隐藏技术已经成为近年来的研究热点,信息隐藏技术的研究内容主要是寻求向载体对象中添加嵌入信息的算法。载体对象可以是文本、图像或音频等,随着信息隐藏技术的发展,目前,音频数字水印技术是近年来的研究热点之一,该技术通过向音频文件中嵌入秘密信息以达到版权保护、隐蔽通信等目的。本文对音频数字水印技术做了全面的研究,
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年甘肃三支一扶特岗教师考试真题
- 2024年阿坝职业学院辅导员考试真题
- 两株特境真菌次级代谢产物及其抗肿瘤活性研究
- 2025届浙江省桐乡市高三5月模拟测试数学试题(解析)
- 石大学前儿童卫生学教案
- 2025年二手奢侈品鉴定技术革新与市场规范研究报告
- 2025年二手奢侈品鉴定标准与交易市场规范化路径研究报告
- 2025年二手交易电商信用风险识别与防控策略研究报告
- 2025年二手交易电商平台信用评级与信用评级机构监管报告
- 历史文化旅游线路定制服务行业跨境出海项目商业计划书
- 村文书考试题及答案
- 电气技术及其应用试题及答案
- 大数据驱动的人才招聘分析-洞察阐释
- 2025年护理三基知识必考重点题库及答案(共720题)
- 统编版(2024)语文一年级下册第七单元综合素质测评A卷(含答案)
- 人工智能导论智慧树知到期末考试答案章节答案2024年哈尔滨工程大学
- 医疗废物管理相关法律、法规介绍
- 手把手教华为PTN设备业务配置
- 工程施工安全保证体系新版
- 政审在校证明
- 燕房线电缆技术规范
评论
0/150
提交评论