已阅读5页,还剩13页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
第1页外文文献资料ResearchandimplementationoftheaudioinformationhidingAbstract:Informationhidingtechniquehasbecomehotspotsresearchinrecentyears,themajorcontentofthehidingtechniqueisseektothealgorithmthatinsertthesecretinformationintothehostinformationThehostinformationmaybethetext,theimage,theaudioetcRecently,withthedevelopingofinformationhidingtechnique,theaudiodigitalwatermarktechniqueisbecomingahottopicItcanbeusedtoprotectingcopyright,hidingcommunicationbyembeddingthesecretinformationintotheaudiofileTheaudiodigitalwatermarktechniquesarediscussedindetailinthispaper.Inthispaperwepresentanoveltechniqueforembeddingdigitalwatermarksintodigitalaudiosignals.Watermarkingisatechniqueusedtolabeldigitalmediabyhidingcopyrightorotherinformationintotheunderlyingdata.Thewatermarkmustbeimperceptibleandshouldberobusttoattacksandothertypesofdistortion.Inaddition,thewatermarkalsoshouldbeundetectablebyallusersexcepttheauthorofthepiece.Finally,discussestheDWT(discretewavelettransform)domainofanaudiowatermarkembeddingandextractionalgorithm.Keywords:informationhiding;audioinformationhiding;wavelettransform;digitalwatermarking;1.IntroductionIntodaysdigitalandinformationtechnologyundertheconditionofmoremature,becauseoftherelationshiptotheinformationsecuritytothecountrySecuritytocommercialsecretsandpersonalprivacy,andmanyotheraspects,sotheinformationsecuritytechnologyfromthebeginningofbirthhasreceivedwidespreadattentionandconsiderableattention.Asanimportantbranchofinformationsecurity,theinformationhidingtechnologyhasgoodconcealmentandsimplicityandgraduallytobecomeoneofresearchhotspots第2页inthefieldofinformationsecurity.Informationhidingisanemerginginthefieldofinformationsecurityisalsoveryimportantfieldofstudy,mainlystudythespecificinformationhidingindigitalinformation(carrier)methodsinthehost.Undertheairspaceortransformdomain,thetechnologyismainlyinthehostinformationformat,size,qualityunchangedunderthepremiseoftheclearinformationtoacertainprocessingalgorithmfusiontothehostinformation,andthefusion,theexternalformofthehostinformation,inthecaseofwithoutspecialhandlingplaintextinformationisnotvisible.Onlywithclearinformationofhostseparationalgorithmtotheprocessingofinformationwilldefinitelyreturnallinformationcondition.Bookinformationtherearetextfiles,thebitmapfile,videoandaudiofiles,fornow,howaboutinatextfile,thebitmapfileandstudyalotofvideofileshiddeninformation,andforaudioinformationhidingtechnologyisverylittlereported.Digitalwatermarkingtechnologyistheinformationhidingtechnologyinthetypicalapplicationofcopyrightprotection,therearemanyscholarsinvariousacademicjournalsofstoriesaboutthedigitalwatermarkingtechnology,digitalwatermarkingtechnologyismainlydividedintotheairspace,transformdomainandspreadspectrumtechnology,buteachhasitsdrawbacks.Thispap-erdiscussestheDWT(discretewavelettransform)domainofanaudiowatermarkembeddingandextractionalgorithm.2.Digitalwatermarkingtechnology2.1.TheresearchbackgroundAlongwiththedevelopmentofdigitaltechnologyandInternet,variousformsofmultimediadigitalworksarepublishedintheformofnetwork,digitalworks,however,theconvenienceandsecurityiscoexist,itwouldbelowcost,highspeedcopyandspread,suchascreatorsandusersprovidesagreatconvenience,butthesefeaturesareeasytobeusedbythepirates,therefore,thedigitalworkstoprotect,byavarietyofmeanstopunishviolatorshasbecomeaveryurgentwork.Similarlegalworksinadditionto第3页thetraditionalcopyrightprotectionandmanagement,alsoshouldaccordingtothecharacteristicsofthedigitalworksitselftoprovidethetechnicalprotection.Theresearchofdigitalwatermarkingisdevelopedrapidlyunderthisapplicationneeds.Digitalwatermarkingisaneffectivedigitalproductscopyrightprotectionanddatasecuritymaintenancetechnology.Itisofparticularsignificanceoftag(watermark),themethodofusingdigitalembeddedhiddenindigitalimage,audio,documents,books,videoandotherdigitalproducts,inordertoprovetheownershipofthecreatorforitsproducts,andasevidenceofidentification,prosecutetheillegalinfringement,atthesametime,throughtothewatermarkdetectionandanalysistoensurereliabilityandintegrityofthedigitalinformationtointellectualpropertyprotectionanddigitalmultimediaanti-counterfeiteffectivemeans.Digitalwatermarkingtechnologybesidesshouldhavethegeneralcharacteristicsofinformationhidingtechnology,withitsinherentcharacteristicsandresearchmethods.2.2.ThecharacteristicsofdigitalwatermarkingDigitalwatermarkisembeddedintotheprotectedobjects(suchasstaticimages,video,audio,etc.),someofthecardtothecopyrightofdigitalinformation,canbetheauthorsname,serialnumber,companylogoetc.Digitalwatermarkingtechnologyhasitsinherentcharacteristicsandresearchmethods.Forexample,fromthepointoftheinformationsecurity,thehiddeninformationifiseroded,systemcanberegardedassafe,becausethesecretinformationdidnotleak,however,inthedigitalwatermarkingsystem,thelossofthehiddeninformationmeansthecopyrightinformationismissing,andlosethefunctionofcopyrightprotection.Sothedigitalwatermarkingsystemmusthavestrongerrobustness,securityandtransparency,etc.(1)Transparency(hidden):throughaseriesofhiddenprocessing,thetargetdatamustbenoobviousdropqualitativephenomenonandhiddendatacantpeopleseeorhear.(2)Robustness(robustness):referstoresistavarietyofprocessingoperationsandmaliciousattackswithoutcausingwatermarkinformationloss.Theso-calledoperationsinclude:intheprocessoftransmissionchannel第4页noise,filtering,enhanced,losscompression,geometrytransformation,D,A,orMDconversionandsoon.Theso-calledattackinclude:tamperedwith,forge,removethewatermark,andsoon.Digitalwatermarkingoriginatedininformationhidingtechnology;thiscanbeconfirmedfromitshiddenrequest.(3)Securityhiddenposition:referstothewatermarkinformationhidingwithinacontentofthetargetdata,ratherthanthefilesthefirstplace,thispreventsforfileformatconversionandruinedthewatermark.(4)Noambiguity:recoverthewatermarkorwatermarkjudgmentshouldbeabletodeterminethattheresultoftheownershipofthemultipleownershipdisputeswillnotoccur.(5)General(ease):referstothewatermarkalgorithmshouldbeapplicabletoavarietyoffileformatsandmediaformat.2.3.ThetraditionalaudiowatermarkinformationSofar,morematurerecognizedaudioinformationhidingtechnologyhasfourkinds:theleastimportantmethod;Echohidingmethod;Phaseencodingmethod;Spreadspectrummethod.(1)TheleastimportantmethodLeastsignificantbit(LSB)methodisoneofthesimplestdataembeddingmethod.Anysecretdatacanberegardedasastringofbinarybitstream,andaudiofilesofeachsamplingdataisalsoexpressedinabinarynumberto,socaneachsamplingvaluesoftheleastimportantbits(inmostcasesitslowest)replacewithrepresentativeofsecretdatabits,inordertoachievethepurposeofembeddingsecretdataintheaudiosignal.Thismethodadvantageis:easytoimplement;Audiosignalcanbeencodedinthelargeamountofdata;Instreamencryptionthedataitselfisencryptedandembeddedprocessrespectively,itssecurityreliesonthekey;Informationembeddingandextractionmethodissimple,fastspeed.Weakness:theresistancetochannelinterferenceanddatamanipulationisverypoor,noise,compression,filtering,theresamplewilldestroythewatermarkingdata,sothepracticalvalueissmaller.(2)WatermarkingalgorithmbasedontheechoEchoHidingistheuseoftheEchoareintroducedtothesecretdatais第5页embeddedintothecarrier.Itusesthecharacteristicsofhumanauditorysystem:shieldingeffectafteraudiosignalintimedomain,theweakbecomeimpossibletohearaftertheictusvanished.Vectordata,andaftertheechohidingsecretdatafortheear,theformerislikeheardthevoicefromtheheadset,noecho,andthelatteristohearthesoundfromthespeakerisproducedbythespaceoftheecho.Echoalgorithmisdifferentfromothermethods,therefore,istoputthesecretdataasthecarrierofenvironmentalconditions,ratherthanasarandomnoiseisembeddedintothecarrierdata,sothismethodhasgoodtransparencyandrobustness.(3)SpreadspectrummethodIntheusualcommunicationchannel,tomaintaineffectivebandwidthandreduceenergy,alwaysneedtheinformationfocusedonspectrumasnarrowaspossible.Anddrawlessonsfromtheideaofspreadspectrumcommunication,caninthecodingofaudiodatastreamwhendistributethesecretdatainspectralcomponentasmuchaspossible.Inthisway,evenif:thereiscertainfrequencyinterference,alsowontaffectthereceivingdata.TherearealotofSpreadSpectrumcommunicationway,commonlyusedhavewinSequenceSpreadSpectrumcode(DirectSequenceSpreadSpectrumEncodingtheDSSS).UsingsymmetrickeyalgorithmusedinDSSSsystem,whichUSESthesamekeytoencodeanddecode.Thekeyisapseudorandomnoise,theidealpseudorandomnoiseiswhitenoiseanditsfrequencyresponseinthefrequencyrangeisgood.Keyusedtocompileinformationandadjustthesequenceintoaspreadspectrumsequence.Secretdatawasamplifiedbycarrierandpseudorandomsequence,thelatterhasaverywidespectrum.Asaresult,thedataofspectrumissplitintopossiblewavelengths.Drawlessonsfromtheideaofspreadspectrumcommunication,hiddendataflowcanbeexpandedtoasmuchaspossible,oraspecifiedfrequencybandwidth,inordertoachievethepurposeofhiddendata.AtpresentUSESthespreadspectrumtechnologyisthedirectsequencespreadspectrum,treatedwitherrorcorrectioncodingsequenceofpseudorandombinarypulseforaudiosignalmodulation,makesthewatermarkdataextendacrosstheentireaudiospectrum,oronthespecifiedfrequencyband.Tocontrolelectricalnoisefrequency,notbythehumaneardetection,mustfirstmodulationsignal第6页attenuation,makeadditiverandomnoiseaddedtotheoriginalsignal,extractionusingmatchedfiltertothewatermarkinformationretrieval,matchedfiltercoefficientisconsistentwiththereversalofthespreadspectrumsequence.Thistechniquehashighrobustnessandsecurity.(4)PhaseencodingmethodPhasecodingisoneofthemosteffectivecodingmethods.Itmakefulluseofthehumanauditorysystem(HAS)acharacteristic:theearofabsolutephasesensitivityandsensitivitytotherelativephase.Basedonthischaracteristic,usethebehalfofthesecretdataofreferencephasetoreplacetheoriginalaudiosectionoftheabsolutephaseandtoadjustotheraudiosegments,tokeeptherelativephasebetweentheparagraphsnotchange.Phaseencodingadefectis:whenonbehalfofthesecretdatareferencephasechangesharply,therewillbeobviousphasedeviation.Itnotonlyaffectstheconfidentialityofconfidentialinformation,butalsowillincreasethedifficultyofthereceiverdecoding.Acauseofthephasedeviationistousethereferencephaseinsteadoftheoriginalphaseandthedeformation,anotherreasonisthattheoriginalaudiosignalfrequencyphasechangestoofast,soyoumusttrytomaketransformationgentlytodecreasethedeformationandphasedeviationofaudio.Gentlytomaketransformation,willhavetoleavesomespacebetweenthedatapoints,whichleadtoistoreducetheinfluenceoftheembeddedaudiobitrate,ontheotherhand,inordertoenhancetheanti-interferenceabilityofthecode,shouldbetomaximizethedifferencebetweenthereferencephase,thereforeusuallychoose-PI/2insteadof0,thePI/2insteadof1.Improvedinordertomaketheinfluenceofthephasedeviation,needtobeinwithacertainintervalbetweeneachdatapointtomaketheconversionflattensout,butitwillreducethebandwidth.Soyoumustcompromisebetweendataembeddingquantityandembeddingeffect.Generallyspeaking,theamountofembeddingphaseencodingis8BPS32BPS.2.4.AudiowatermarkinginformationhidingschemeObservethata“pirate”candefeatawatermarkingschemeintwoways.Hemaymanipulatetheaudiosignaltomakethewatermarkundetectable.第7页Alternatively,hemayestablishthatthewatermarkingschemeisunreliable,e.g.,thatitproducestoomanyfalsealarmsbydetectingawatermarkwherenoneispresent.Bothgoalscanbeachievedbyaddinginaudiblejammingsignalstotheaudiopiece.Therefore,theeffectivenessofawatermarkingschememustbemeasuredbyitsabilitytodetectawatermarkwhenoneispresent(probabilityofdetection)andtheprobabilitythatitdetectsawatermarkwhennoneispresent(probabilityofafalsealarm)inthepresenceofjammingsignalsandsignalmanipulations.Severaltechniquesfordatahidinginimageshavebeendeveloped1、3、4、5、6.Amethodsimilartooursisproposedin2,wheretheNlargestfrequencycomponentsofanimagearemodiedbyGaussiannoise.However,theschemeonlymodifiesasubsetofthefrequencycomponentsanddoesnottakeintoaccountthehumanvisualsystem(HVS).Theaudiowatermarkweproposehereembedsthemaximumamountofinformationthroughoutthespectrumwhilestillremainingperceptuallyinaudible.Itiswell-knownthatdetectionperformanceimproveswiththeenergyofthesignaltobedetected.Therefore,weeffectivelyimprovetheperformanceofthewatermarkingschemebyincreasingtheenergyofthewatermarkedsignalwhilekeepingitinaudible.In7、8,wepresentedanoveltechniqueforembeddingdigitalwatermarksintoaudiosignals.Notethatourapproachissimilartothatoftheapproachof1,inthatweshapethefrequencycharacteristicsofaPN-sequence.However,unlike1weuseperceptualmaskingmodelsoftheHAStogeneratethewatermark.Inparticular,ourschemeforaudioistheonlyonethatusesthefrequencymaskingmodelsoftheHASalongwiththetemporalmaskingmodelstohidethecopyrightinformationinthesignal.Wealsoprovideastudyofthedetectionperformanceofourwatermarkingscheme.OurresultsindicatethatourschemeisrobusttolosscodingdecodingDA-ADconversion,signalresembling,andfiltering.Inthispaper,wepresentfurtherresultsshowingthatourschemeisrobustwhenthewatermarkswhicharecomposedofmultiplePN-sequencesandisrobustinthepresenceofaudibledistortionsduetovectorquantization.Finally,observethattheapproachdescribedhereforwatermarkingaudiosignalscanalsobeusedtowatermarkimageandvideodatawithappropriate第8页modificationsandextensions(e.g.7,9).2.5.ThewatermarkdesignThebasicwatermarkingstepstartswithaPN-sequenceMaximumlengthPN-sequencesthatareusedinourwatermarkingschemebecausetheyprovideaneasywaytogenerateauniquecodeforanauthorsidentification.Likerandombinarysequences,PNsequenceshave0sand1sthatoccurwithequalprobabilities.Theautocorrelationfunction(ACF)ofsuchasequencehasperiodNandisbinaryvalued10.BecauseoftheperiodicityoftheACF,thePNsequenceisself-clocking.Thisallowstheauthortosynchronizewiththeembeddedwatermarkduringthedetectionprocess.Thisisimportantifthesignaliscroppedandresample.Togeneratethewatermark,wefirstcalculatethemaskingthresholdofthesignalusingtheMPEGAudioPsychoacousticModel1,11.Themaskingthresholdisdeterminedonconsecutiveaudiosegmentsof512samples.EachsegmentisweightedwithaHammingwindow.Consecutiveblocksoverlapby50%.Themaskingthresholdisthenapproximatedwitha10thorderall-polefilterM(w),usingaleastsquarescriterion.ThePN-sequenceseq(w),isfilteredwiththeapproximatemaskingfilter,M(w),inordertoensurethatthespectrumofthewatermarkisbelowthemaskingthreshold.SincethespectralcontentoftheaudiosignalchangeswithtimewatermarksaddedtodifferentblockswillbeingeneraldifferenteveniftheyaregeneratedfromthesamestartingPN-sequence.However,itispreferabletousedifferentPNsequencesfordifferentblockstomakethestatisticaldetectionbyanunauthorizeduserofthewatermarkmoredifficult.NotealsothatusinglongPN-sequencesorembeddinglongcryptographicdigitalsignaturesalsohelpsinthatrespect.Thetimedomainweightingoperationattenuatestheenergyofthecomputedwatermark.Inparticular,watermarksobtainedasabovehaveamplitudesthataretypicallysmallerthanthequantizationstepsize.Therefore,thewatermarkwouldbelostduringthequantizationprocess.Notealsothat,asobservedearlier,detectionperformanceisdirectlyproportionaltotheenergyofthewatermark.Wehavefoundthatitispossibletoprevent第9页watermarklossduringquantizationandimprovedetectionperformancebyamplifyingthewatermarkby40dBbeforeweightingitinthetimedomainwiththerelativeenergyofthesignal.Wehavefoundexperimentallythatthisamplificationdoesnotaffecttheaudibilityofthewatermarkbecauseoftheattenuationeffectofthetimedomainweightingoperation.3.Thedomainofwavelettransform(DWT)method3.1.Thegeneralprocessofusingwaveletsignalprocessing(1)Sampling:ifthesignaliscontinuous,somustbeabletocapturetheoriginalsignalnecessarydetailsofsamplingrate.Theapplicationofdifferentdecisionsamplingrates.SuchasinordertoreproduceBeethovensninthsymphony,lifelike,besuretocapturetoclosetothehumanearhearinglimitofabout20kHzfrequencysignal,thatistheNyquistfrequency.Knowbyexperiencethatthesamplingrateshouldbe2timesoftheNyquistfrequency,whichis40KHZ,thisstepintheexperimentwedontneedtodo,becauseweusetheaudiosamplinghadbeendone.(2)Decomposition:aftersampling,anappropriatelevelofdecomposition,thewaveletcoefficientatalllevelsandtheapproximatecoefficientforaminimumlevel,isthenextsteptodealwiththeobjectofthefactorset.(3)Signalprocessing:byabandoningthesignificantcoefficientscanbecompressedsignal,orinsomeway,makethesignalfilteringanddenoising,theoutputcanbestoredandreconstructiontorestoreimmediatelyafterprocessingthesignal.3.2.Themaincontentofthealgorithm(1)TochooseapairofM1*M2binaryimageaswatermarking,canbeexpressedasP=P(i,j),0iM1,0jM2,P(i,j)(0,1).Becauseoftheaudiosignalisone-dimensional,totheimagewatermarkembeddedwatermarkimagemustbereducedtoonedimension,namelyS=S(k)=P(i,j),0iM1,0jM2,K=i*M1+j,0kM1*M2-1.(2)Foraudiosignalwaveletdomaintransformationinthefirstplace,in第10页thispaper,theaudiosignalisthreelayerswavelettransform,high-frequencycoefficientsandlow-frequencycoefficientsobtainedrespectively,andthenextractthehighfrequencycoefficientsandlow-frequencycoefficients.Herecanusewavelettransformfunction,wavedec(),appdeof(),detcoef()transformationandextractioncoefficient().Afterthedimensionofwatermarkcanmakeactualwatermarkembedding,heresetbysettingaquantitativefactortodeterminethespecificwayofembedded.Bymeansofaudiosignallowfrequencycoefficientandtheratioofquantizedcoefficientsintegermodulo2,comparingwithwatermarkimageofeachjudgment,todeterminetheembeddingform.Willworkwithallembeddedwatermarkimagesizeofthenumberoflowfrequencycoefficient,andthenthewavelethigh-frequencycoefficientswithlowfrequencycoefficient,whichcontainsthewatermarktoinversewavelettransform,getcontainaudiowatermarking,thisprocessbywaverec()functionimplementation.(3)Correspondstothewatermarkembedding,watermarkextractionprocessisbasicallytheinverseprocessofwatermarkembeddingprocess.Becausethealgorithmistoextract,sodontneedtheoriginalaudioinformation,butneedthewatermarkinformation.Toembedwatermarkaudioinformationwavelettransform,extractthelowfrequencycoefficientandarresttransform,embeddingprocedurecanextracttheembeddedinformation,ldtransformagain,youcangetthewatermarkinformation.第-11-页中文翻译稿音频信息隐藏算法的研究和实现【摘要】:信息隐藏技术已经成为近年来的研究热点,信息隐藏技术的研究内容主要是寻求向载体对象中添加嵌入信息的算法。载体对象可以是文本、图像或音频等,随着信息隐藏技术的发展,目前,音频数字水印技术是近年来的研究热点之一,该技术通过向音频文件中嵌入秘密信息以达到版权保护、隐蔽通信等目的。本文对音频数字水印技术做了全面的研究,
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 沙漠变绿洲的方案
- 2025浙江杭州市人才集团有限公司招聘16人考前自测高频考点模拟试题附答案
- 厨师职业性烫伤的愈合促进方案
- 2026年二级建造师之二建水利水电实务考试题库300道附答案(夺分金卷)
- 2026年投资项目管理师之宏观经济政策考试题库300道附答案【培优a卷】
- 2025江西景德镇陶瓷大学管理助理、教学助理、科研助理岗位招聘22人参考题库附答案
- 2025江西吉安市政府经济发展研究中心遴选工作人员3人备考题库附答案
- 2025湖北宜昌市部分县市区面向服务期满且考核合格“三支一扶”人员专项招聘事业单位工作人员23人备考题库附答案
- 2025辽宁沈阳盛京资产管理集团有限公司所属子公司沈阳盛京大笔试备考试题附答案
- 2026年一级注册建筑师之建筑结构考试题库300道附完整答案【各地真题】
- 协议婚约解除协议书
- 认知语言学视角下跨境电商平台产品营销策略研究-以亚马逊电商平台为例(英文论文)
- 成守珍护理质量敏感指标体系构建与应用
- 2025年中小学学校教辅材料违规征订专项整治自查自纠报告
- 清华大学介绍
- 2025扬州高端装备制造行业市场现状供需分析及投资评估规划分析研究报告
- 25年国开电大习概专题测验1-17参考答案
- 农业种植项目计划与农产品销售方案
- 梁截面加高加固施工方案
- 骨干教师绩效考核制度实施细则
- 2025年低空经济「无人机农业」应用场景与解决方案报告
评论
0/150
提交评论