音频数字水印技术的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
当前的一场信息革命正席卷全球,网络化浪潮汹涌而来,势不可挡,特
    别是互联网的爆炸性发展正改变着经济、社会、文化的结构和运行方式,改
    变着人的思维方式,其广度和深度都是以往任何一次产业革命所无法比拟
    的。在综合国力竞争十分激烈、国际局势瞬息万变的形势下,一个国家支配
    信息资源能力越强,就越有战略主动权,而一旦丧失了对信息的控制权和保
    护权,就很难把握自己的命运,就没有国家主权可言。
    由于近几年来数字产品知识产权的问题越发突出,数字水印技术也随之
    倍受科研工作者的关注。数字水印技术的应用非常广泛,可以应用在数字产
    品的知识产权保护,追踪非法用户,防止篡改原始产品等方方面面。可以预
    见随着互联网络越来越盛行,数字信息将是未来人们的主要信息交流形式,
    数字产品给人们带来方便的同时也存在很多不得不解决的问题,如非法盗版
    以及非法篡改等问题。目前很多学者认为这些问题将随着数字水印技术的完
    善而得到解决,由此可见数字水印技术在将来信息社会的重要性。而且,当
    前我国社会信息化正以一日千里的速度前进,对网络与信息安全的需求日益
    增大。与其它领域不同,网络与信息安全问题必须依靠我国自己的力量来解
    决。引进国外产品或照搬国外先进技术来解决信息安全问题无异于引狼入
    室。为此,国家已经明确规定:“信息安全产品一定要立足国内,自主开发”。
    所以我国学者有责任对数字水印这门学科进行深入的研究,建立自己的一套
    理论体系,并开发自己的数字水印产品。传统的信息保护手段(例如,密码
    学等)已经不能满足目前数字化媒体的安全保护。因此,以数字化的信息隐
    藏理论为核心的技术应运而生。这就是本文的研究背景。
    本文的主要贡献在于:
    一 . 搜集整理了大量关于音频数字水印的文献、资料;
    瑞. 在此基础上,仿真了许多前人的音频水印算法,并将这些算法进行
     整理归类,在本文中将这些算法分为了两类:时间域水印算法和变
     换域水印算法,同时分析了这两类水印算法的优缺点。
    江 . 将语音分析中用到的倒谱技术应用到音频数字水印中,并在前人工
     97
    
    
    摘 要
    作的基础上,提出了基于倒谱域的三种数字水印算法:基于信号能
    量特征算法;基于统计均值调制算法;基于混沌差分 DCSK 调制算
    法。这三种算法分别针对目前三种不同水印(混沌序列;二值图像;
    文本信息)的应用而提出,具有很好的不可感知性和鲁棒性。水印的
    检测过程均为盲检测,符合实际应用的需要,因此具有很好的实用
    价值。
    四. 研究了基小波域音频数字水印算法。提出了基于 Sathidevi 的音频压
    缩方法的水印算法,该算法根据载体信号自身特性,自适应的给出
    判断阈值,对于抵抗音频压缩攻击(如 MP3)具有很好的鲁棒性。归
    纳总结了国际音频编码标准 ISO 11172-3 (MPEG-1)标准,借鉴了其
    中的音频感知模型,提出了基于小波域的水印算法。该算法同样是
    一个盲检测算法,与已有的时域算法相比,该算法具有较好的鲁棒
    性和检测精度的准确性。
    本文的主要工作及其内容安排归纳如下:
    本论文共分六章。
    在第一章中,论述了数字水印的研究意义,说明数字水印是信息隐藏这
    门学科的一个分支。具体介绍了数字水印概念,历史起源,发展现状以及数
    字水印的特性及其主要应用。
    第二章是基础知识部分。介绍数字音频水印的基础知识。给出数字水印
    的嵌入模型和检测模型,音频水印的评估标准。接下来介绍了论文中引用的
    倒谱的概念,性质及应用。小波的概念,多分辨分析及 Mallat 算法。
    第三章,介绍经典的数字音频水印算法,将算法分类为:时域和变换域
    两大类。仿真了其中的最低比特位(LSB)算法,相位编码算法,回声隐藏算
    法,离散余弦变换(DCT)算法。最后指出目前音频水印算法中存在的问题。
    第四章,将语音分析中的倒谱技术应用到音频数字水印中,根据嵌入的
    水印信号的特性不同,提出三种盲检测水印算法,分别为:基于信号能量特
    征算法,基于统计均值算法,以及基于混沌扩频调制的水印算法。
    第五章,介绍两种基于小波变换的音频数字水印算法。
    ①提出了基于多分辨分析,及音频压缩的理论的音频水印算法。判断阈
    值是通过载体信号的特征自适应给出,该算法对于抵抗 MP3 压缩具有很好
    的鲁棒性。
     - 98 -
    
    
    摘 要
    ②介绍了一种音频感知模型,并通过该模型得到水印系统密钥,在此基
    础上,提出了小波域水印算法。实验结果表明,该系统较好的满足了不可感
    知性和鲁棒性的要求,与已有的时域算法比较,具有较好的鲁棒性和检测精
    度的准确性。
    第六章,对全文进行了总结,同时指出研究中尚有待解决的若干问题,
    指出下一步将研究的方向,。
Currently the revolution of information is sweeping all over the world, the
    tide of network is becoming inundanta, and it is changing our custom of
    economic, society, culture, people’s thought and so on. The characteristic is
    wider and deeper than any other industry revolution. The competition among
    states is fury, international situation is fluky, the more information a country
    control, the better situation for that country.
     Recently, the problem of Intellectual Property Rights become more and
    more important, and watermarking technology get more and more attention of
    scholar. The application of Digital Watermarking technology is wide, which can
    be applied in digital product copyright, tracing illegal user, preventing from
    modify original product. With the rapid development of Internet, we can forecast
    that the digital information will be the main communication in people. Digital
    product bring a ot of conveniency for people, but at the same time a lot of
     l
    problem that must be solved. For example, the problem of illegal copying and
    illegal modifying. By now, many scholars think that those problem can be solved
    with the mature of the Digital Watermarking. For this reason, we can see the
    importance of the Digital Watermarking in the future. Furthermore, the speed of
    our country information society is fast, need more and more security of network
    and information. The information security domain is different from other
    domain , which must be done by our own strength. It is dangerous that
    introducing foreign product or advanced technology. For this reason, our country
    regulate definitely: The product of information security must be based ourselves
    upon. So, the scholars of China have the duty for studying Digital Watermarking,
    establishing own theory and exploring own Digital Watermarking product. The
    tradition means of protection can’t satisfy the requirement for security of digital
    media, such as cryptography. Accordingly, the technique based on information
    hiding emerges as the times require. The above is the research background for
    this paper.
    The creativity task of this paper focuses on the four aspects.
    1. Collect and clean up a lot of literature about Aduio Digital Watermarking.
     - 100-
    
    
    Abstract
    2. On this base, simulate a lot of algorithm of old man, and these algorithm are
     sorted by us. In this paper, two class audio watermarking algorithms are
     sorted: time domain watermarking algorithm and transformation domain
     watermarking algorithm. At the same time, the virtue and defect of these
     algorithms are analysed.
    3. The mature cepstrum technology that used in speech analysis is applied in
     audio watermarking. Based on the ole man research, proposed three kinds of
     algorithms, they are: based on singal energy character algorithm; based on
     statistical mean modulation algorithm; Based on DCSK (Differential Chaos
     Shift Key) algorithm. The three algorithms proposed aims at different
     watermarks (Chaos, Binary image, text information) application separately,
     with good imperceptible and robust. The watermarks detection are blind
     without original signal, answer for the need of practice, so the proposed
     algorithms have good practicality value.
    4. Research the audio watermarking in wavelet domain. In the paper proposed a audio
     watermarking algorithm based on Sathidevi compression. The algorithm based on
     carry signal character, derive the judge threshold, so have good robust
     character with the attack of MP3.Sum up the international audio coding and
     decoding standard ISO 11172-3 (MPEG-1), summarize the audio perceptive
     model, propose a blind detection algorithm, compare with the existing
     algorithm in time domain, the proposed scheme can detect watermark
     accurately.
     The paper is divided into six chapters:
     In Chapter one, the study meaning of Digital Watermarking is described. It
    explain that Digital Watermarking is part of
引文
[1] F. L. Bauer, “Decrypted Secrets—Methods and Maxims of Crpy-tology”.
     Berlin, Heidelberg, Germany: Springer-Verlag, 1997.
    [2] Fabien A.P, Petitcolas, Ross J. Anderson and Markus G..Kuhn. “Information
     hiding –a survey”, Proceedings of the IEEE, July 1999,87(7): 1062-1078.
    [3] I.J. Cox and M.L. Miller, "A review of watermarking and the importance of
     perceptual modeling," Proc. SPIE Conf. on Human Vision and Electronic
     Imaging II, February 1997, Vol 3016, 92-99.
    [4] M. Kutter and F. Hartung, "Introduction to Watermarking Techniques", in: S.
     Katzenbeisser, F.Petitcolas (Eds), Information Hiding Techniques for
     Steganography and Digital Watermarking, Artech House, 2000.
    [5] D.Kilburn.“DirtyLinen,Dark ecrets,”. Adweek, October 6,1997,volume
     38,no.40, pp.35-40.
    [6] J.Abbate, “Inventing the Web,”Proceedings of the IEEE,1999,87(11):
     1999-2002.
    [7] B.M.Macq and J-J.Quisquater. “Cryptology for Digital TV Broadcasting,”
     Proceedings of the IEEE, 1976,64(12): 1715-1729.
    [8] “Epson Introduces Revolutionary Image Authentication System for Epson
     Digital Cameras,”Business Wire,April 5,1999.
    [9] W. Szepanski.“ A Signal Theoretic Method for Creating Forgery-proof
     Documents for Automatic Verification,” in J.S.Jackson, editor, 1979
     Carnahan Conference, 1990.MILCOM’90, Conference Record, A New
     Era.1990 IEEE, 1990,volume 1, pp. 216-220.
    [10]L. Holt, B.G. Maufe, and A.Wiener. “Encoded Marking of a Recording
     Signal,”U.K. Patent GB 2196167A,1998.
    [11]N.Komatsu and H.Tominaga.“Authentication System Using Concealed
     Images in Telematics,”Memoirs of the School of Science and Engineering,
     Waseda University, 1988,52:45-60.
    [12]Mehtodology for the Subjective Assessment of the Quality of Television
     Pictures: Recommendation ITU-RBT.500-10 .ITU Radiocommunication
     Assembly, 2000.
     - 91 -
    
    
    参考文献
    [13]Van den Branden Lambrecht, C.J., and J.E.Farrell, “Perceptual Quality
     Metric for Digitally Coded Color Images,”in Proceedings of the European
     Signal Processing Conference, Trieste, Italy, Sep.1996,pp.1175-1178.
    [14]Westen, S., R.Lagendijk, and J.Biemond, “Perceptual Image Quality Based
     on a Multiple Channel HVS Model,” in Proceedings of the IEEE
     International Conference on acoustics, Speech, and Signal Processing,
     vol.4,1995, pp.2351-2354.
    [15]Winkler,S., “A Perceptual Distortion Metric for Digital Color Images,”in
     Proceedings of the International Conference on Image Processing, vol.3,
     Chicago, IL, Oct. 1998, pp.399-403.
    [16]Winkler.S., “Distortion Metric for Digital Color Video,”in Proceedings of
     the SPIE 3644, Human Vision and Electronic Imaging, 1999.pp.175-184
    [17]Bender, W.D. Gruhl, and N. Morimoto, “Techniques for Data Hiding,”in
     Proceedings of the SPIE 2420, Storage and Retrieval for Image and Video
     Database III, 1995, pp.164-173.
    [18]D.Gruhl, A.Lu, W.Bender, “Echo hiding”, in Proc. Information Hiding
     Workshop , University of Cambridge, U.K., pp. 295-315, 1996.
    [19]L.Boney, A.H.Tewfik, and K.N. Hamdy, “Digital watermark for audio
     signals”, In International Conference on Multimedia Computing and Systems,
     IEEE, Hiroshima, Japan, pp.473-480, June, 1996.
    [20]Won2gyum Kim, Jong chan Lee, Won Donl Ee. An audio watermarking
     scheme with hidden signatures. International Conference on Signal
     Processing. Beijing, 2000.
    [21]P.Bassia,I.Pitas, and N. Nikolaidis, “Robust audio watermarking in the time
     domain”IEEE Transactions on Multimedia, vol. 3, pp. 232-241, June 2001.
    [22] P.Bassia,I.Pitas, and N. Nikolaidis, “Robust audio watermarking in the time
     domain”IEEE Transactions on Multimedia, vol. 3, pp. 232-241, June 2001.
    [23]马田,张新鹏,王朔中,“数字音频信号中的频域扰动调制水印嵌入”,
     信号处理 Vol.18.No.3, 2002.
    [24]B.Chen, and G..Wornell, Dither Modulation: “A New Approach to Digital
     Watermarking and Information Embedding” [C], San Jose, Ca. SPIE
     - 92 -
    
    
    参考文献
     Vol.3657, Jan.1999,342-353
    [25]BoneyL, Tewfik A H, Handykn. “Digitalwatermarks for audio signals”[A].
     International Conferenceon Multimedia Computing and Systems[C].
     Hiroshima, Japan, 1996.
    [26]SwansonM D, Zhu B, Tewfik A H, et al. “Robust audio watermarking using
     perceptual masking”[J]. Signal Processing. 66 (3): 337 - 335, 1998.
    [27]Swanson MD, Zhu B, Tewfik A H. “Audio watermarking and data
     embedding current state of the art”[A]. Challenges and Future Directions.
     Multimediaand Security Workshop at ACM Multimedia’98 [C].Bristol, U
     K,1998.
    [28]王秋生,孙圣和.“一种在数字音频信号中嵌入水印的新算法”[J ]. 声
     学学报, 26(5):464 - 467,2001.
    [29] Xu Chang Sheng, Wu Jian Kang, Sun Qibin, et al. “Applications of digital
     watermarking technology in audio signals”[J]. Journal of the Audio
     Engineering Society, 47 (10): 805 –812, 1999.
    [30]RuizF J, Deller J R. “Digital watermarking ofspeech signals for the national
     gallery of the spoken word”[A] . Proceedings of the 2000 IEEE International
     Conference on Acoustics, Speech, and Signal Process2ing (ICASSP - 2000)
     [C]. Istanbul, Turkey, 2000.
    [31]陈  琦,王炳锡.“一种基于 DCT 变换的语音数字水印算法研究”[J]. 信
     号处理,17(3):238 - 241,2001.
    [32]孙  锐,孙  洪,姚天任.“基于量化的小波域数字音频水印算法”[J]. 
     华中科技大学学报, 30(5):24- 27,2002.
    [33]钮心忻,杨义先. 基于小波变换的数字水印隐藏与检测算法[J ] . 计算
     机学报,23(1):21 - 27,2000.
    [34]R. Preuss, S. Roukos, A. Huggins, H. Gish, M. Bergamo, and P. Peterson,
     “Embedded signaling,”U.S.Patent 531735,1994.
    [35]R. Petrovic, “Audio signal watermarking based on replica modulation ”,
     Telecomfmunications in Modern Satellite, Cable and Broadcasting Service,
     TELSIKS 2001. 5th International Conference on vol 1. pp. 227-234, 2001.
    [36]J.Tilki and A.Beex, “Encoding a hidden digital signature onto an audio
     signal using psychoacoustic masking,”in Proc.1996 7th Int. Conf.Sig. Proc.
     Appls. Tech., pp.476-480, 1996.
     - 93 -
    
    
    参考文献
    [37]杨洋,戴跃伟,“一种基于块分类的 DCT 域音频水印技术”。第三届信息
     隐藏-全国学术研讨会。129-134,2001.
    [38]袁中兰,温巧燕,钮心忻,杨义先,“基于量化编码技术的声音隐藏算
     法”,通信学报,23(5),2002.
    [39]H. O. Oh, J. W. Seok, J.W. Huang and D. H. Youn, “New echo embedding
     technique for robust and imperceptible audio watermarking”, Acoustics,
     Speech, and Signal Processing, Proceedings. 2001 IEEE International
     Conference on, Volume: 3, pp.1341-1344, 2001.
    [40]P. S .Sathidevi, Y. Venkataramani, "Speech Compression and Encryption",
     Proceedings of International Conference on Robotics, Vision and Parallel
     Processing, ROVPIA '99, Malaysia.
    [41]P. S. Sathidevi, Y. Venkataramani, "Speech and Audio Coding Using Wavelet
     Transforms", Proceedings of National Seminar on Applied Systems
     Engineering and Soft Computing, Dayalbagh Educational Institute, Agra,
     March 2000.
    [42]汪小帆等,《信息隐藏技术-方法与应用》,机器工业出版社,第一版,
     2001 年.
    [43]吴秋新,钮心忻,杨义先等译,《信息隐藏技术-隐写术与数字水印》,
     人民邮电出版社,第一版,2001 年.
    [44]C.P.Wu,P.C.Su,and C.-C.J.Kuo, “Roubust audio watermarking for copyright
     protection” SPIE’s 44th Annual Meeting Advanced Signal Processing
     Algorithms, Architectures, and Implementations IX(SD39),1999.
    [45]I.J. Cox, M.L. Miller, J.A. Bloom, "Watermarking Applications and Their
     Properties", Proceedings of the International Conference on Information
     Technology: Coding and Computing - ITCC2000, pp. 6-10, (2000).
     Copyright (c) 2000 by IEEE.
    [46]Tanfeng Sun, Quan Wen, Shuxun Wang, “Based on HVS chaos array
     watermarking algorithm to still image”, ICICS2001, the 3rd International
     Conference on Information, Communication, and  Signal Processing
     (CDROM), Singapore,15-18, October, 2001.
    [47] 孙锬锋,崔丽莉,DCSK 技术在数字水印中的应用研究,全国第四届信
     息隐藏学术研讨会,大连,2002 年 8 月 24-26 日.
     - 94 -
    
    
    参考文献
    [48]Alfred Karl Louis,Peter Ma and Andreas Rieder, “Wavelets.”B.G. Teubner,
     ISBN3-519-12094-1. Stuttgart, German 1998.
    [49] Stéphane Mallat “A Wavelet Tour of Signal”Processing. AcademicPress,
     ISBN0-12-466605-1. San Diego, CA, USA, 1998.
    [50]D.Kirovski and H.Malvar, “Robust spread–spectrum audio watermarking”
     IEEE International Conference on Acoustics, Speech, and Signal processing,
     vol. 3, pp. 1345-1348, 2001.
    [51]Homg.Oh. Kim, Bae. Keun Lee, Nam-Yong Lee “Wavelet-based Audio
     Watermarking Techniques: Robustness and Fast Synchronization”,
     Proceedings of National Seminar on Applied Systems Engineering and Soft
     Computing, Dayalbagh Educational Institute, Agra, March 2000.
    [52]Davis Pan, “A Tutorial on MPEG/Audio Compression”, IEEE Multimedia
     Journal, volume 2, summer 1995, pp60-74.
    [53]Ted Painter, Andreas Spanias, “A Review of Algorithms for Perceptual
     Coding of Digital Audio Signals”13th International Conference on DSP,
     1997, volume 1, pp 179-208
    [54]ISO/IEC 11172-3, Information Technology –Coding of Moving Pictures
     and Associated Audio for Digital Storage Media at up to about 1.5Mbits/s,
     Part 3:Audio.
    [55]E. Terhardt, “Calculating virtual pitch,”Hearing Res., vol. 1, pp.155–182,
     1979.
    [56]E. Zwicker and H. Fastl, Psychoacoustics Facts and Models. Berlin,
     Germany: Springer-Verlag, 1990.
    [57]钟玉琢,蔡莲红,李树青,史元春.多媒体计算机技术基础及应用.北京:
     高等教育出版社,1999.6.
    [58]刘兵,杨鉴.基于心心理声学模型的音频信号数字水印技术. 第三届信
     息隐藏-全国学术研讨会。2001,110-121.
    [59]S. W. Foo, T. H. Yeo, and D. Y. Huang, “An Adaptive Audio Watermarking
     System”, Electrical and Electronic Technology, TENCON. Proceedings of
     IEEE Region 10 International Conference on, Volume:2, pp.509-513, 2001.
    [60]S. Shin, J. W. Kim, J. Choi, “Audio watermarking using Digital Filter”,
     - 95 -
    
    
    参考文献
     Korea Information Security, Conference, vol. 11. No.1 pp.464-468, 2001.
    [61]X. Li, H. H. Yu, “Tranfsparent and Robust Audio Data hiding in cepstrum
     Domain,”ICME2000, vol. 1, pp.397-400, 2000.
    [62]刘瑞祯,谭铁牛.数字图像水印研究综述[J].通信学报.2000,21(8):39 - 
     45.
    [63]赵春晖. 基于优化检测原理的鲁棒非加性水印算法[J ]. 哈尔滨工程大
     学学报,2002,23(4):14 - 20.
    [64]赵春晖,李福昌. 基于小波变换的自适应音频数字水印算法[J]. 应用
     科技,2002 ,29 (5):14 - 16.
    [65]赵春晖,王小辉,孙兵. 基于分块 DCT 变换的 HVS 模型加权数字水印算
     法[J].应用科技,2001,28(5):10 - 12.
    [66]赵春晖,张立和,王小辉,等. 基于维纳滤波的数字水印算法[J].信息技
     术,2001,7 :4 - 5.
    [67]ISO/IEC, JTC1/SC29/WG11 MPEG, “Information technology— Generic
     coding of moving pictures and associated audio— Part 3: Audio,”IS13818-3
     1994 ("MPEG-2").
    [68]N. Jayant, “High quality coding of telephone speech and wideband audio,”
     in Advances in Speech Signal Processing, S. Furui and M.M. Sondhi, Eds.
     New York: Dekker, 1992.
    [69]J. L. Hall, “Auditory psychophysics for coding applications,”in TheDigital
     Signal Processing Handbook, V. Madisetti and D. Williams, Eds. Boca
     Raton, FL: CRC Press, 1998, pp. 39.1–39.25.
    [70] J. Egan and H. Hake, “On the masking pattern of a simple
     auditorystimulus”J. Acoust. Soc. Amer, vol. 22, pp. 622–630, 1950. 
    [71]刘秉正,《非线性动力学与混沌基础》,东北师范大学出版社,1994
     年,第一版。
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.