基于集群式版权保护和认证的音频水印技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机通信技术和互联网的迅速发展,数字多媒体的传播也越来越便捷,这使得数字作品非常容易被获取和篡改,严重危害了作品拥有者的权利,影响了社会上数字作品服务市场的正常秩序,因此,迫切需要解决数字产品的知识产权保护问题。多年来,数字水印技术作为解决数字产品知识产权保护问题最具优势的方法得到了广泛地研究和应用,并且应用到完整性认证等其它领域,应用的载体包括图像,音频,视频,文本等多媒体载体。一直以来音频水印方法都是以单个音频作品作为载体的,然而,音频作品在流通过程中则大多以专辑等集合形式存在,基于现实需求,本文将对以音频作品集合作为载体的水印算法进行探索和研究。
     本文基于集群式版权保护和认证的音频水印技术研究,工作和特点主要包括以下几个方面:
     1、系统地介绍了音频数字水印的概念,基本理论和发展现状,并通过对现有的音频水印算法和水印框架的分析,从全新的角度提出了针对音频集合的集群式水印算法,介绍了集群式水印算法的概念,提出其算法模型和基本框架,根据音频集合的特殊性,探索出对于音频集合的攻击方法。
     2、利用云模型的模糊性和随机性,提出了一种基于云模型的集群式版权保护算法。将音频集合中所有音频作品小波变换后的特征值映射为相当数量的云滴,将这些云滴组合为云图,并将该云图作为零水印,再根据逆向云发生器计算该云图的三个特征值期望Ex,熵En,超熵He,检测水印时利用这些参数的改变率来评估原始水印和提取水印之间的相似性。根据云模型的模糊性和随机性,其中部分云滴受攻击改变后对整个云图的特征值影响很小,该算法鲁棒性强。
     3、基于提升小波技术提出了一种既能保护音频集合版权又能对集合中单个音频作品分别进行版权保护的新算法,将音频集合中各个音频作品的提升小波系数分别构造零水印,这些零水印分别用来保护相对应的单个音频作品,为了保护音频集合的版权,则将这些零水印通过随机混合矩阵进行混合可得到整个音频集合的集合零水印。
     4、对ICA概念进行了深入的分析,探索总结出ICA在水印技术中的典型应用方案,并在此基础上提出了基于ICA的集群式版权保护算法,将ICA同时应用到提取音频集合特征值和水印检测过程中。利用ICA提取音频集合特征值时,把原始音频集合中各个音频的小波系数作为观测信号, ICA方法的特点保证这些音频在音频集合中的顺序不受限制,当顺序改变时,仍能提取出一样的独立分量,并且将水印嵌入到其中两个最重要的独立分量中,这不仅保证了源信号的相互独立性,而且构造了检测水印时需要的足够观测信号;另外将ICA应用到水印检测过程中不需要知道水印嵌入位置,水印嵌入强度等因素。
     5、提出一种基于ICA和小波包的集群式认证技术,将音频集合进行小波包分解,然后将ICA提取小波包系数的各个独立分量,最后根据分析选择一个合适的独立分量进行水印嵌入,该算法不仅可以在音频集合遭受攻击后进行完整性认证,而且可以对被攻击后的待测音频集合进行初步篡改恢复。
     6、对Shamir提出的(k, n)密钥分散管理方案进行探索和改进,提出一种基于(k, n/k=n)的集群式认证方法,该方法将水印图像的各个像素值分别进行(k, n)分配,并将各个像素值分配后的n个数值纵向排列为一个矩阵,再将这个矩阵的行向量分别嵌入音频集合中对应的单个音频作品,从而实现了将一个水印信息嵌入到整个音频作品中,提取水印时,设置k=n,只要待测音频集合中有音频被篡改攻击了,变化就能反映到提取的水印图像中,保证算法的脆弱性。
With the rapid development of computer communication technology and the internet, the spread of digital media has become more and more conveniently, which makes digital media be easy to be copied and pirated. This circumstance damages the rights of works’owners and impacts the normal service market of multimedia, therefore, it is urgent to protect the copyright of the digital media. In recent years, digital watermarking technology which is used for protecting copyright of the digital media effectively has been widely researched and applied. Digital watermarking technology is also applied for integrity Authentication and the other area. The aimed carrier of watermarking technology contains image, audio, video, text and other multimedia works. In generally, the existed audio watermarking technology is just used for a single audio, however, audio works are often published in the form of audio album(an aggregation), in view of practical needs, in this paper, we will probe and research the watermarking technology which is applied for audio aggregation.
     The watermarking technology in this paper based on audio aggregation contains some algorithms and features as follows:
     1, Digital audio watermarking technology, basic theory, and development status was systematically introduced, according to analyze existed audio watermarking algorithm and watermarking framework, we presented audio aggregation watermarking technology from a new point, introduced the concept of audio aggregation watermarking and algorithm model. And in terms of audio aggregation’s particularities, we probe some attacks aimed at audio aggregation.
     2, According to the fuzziness and randomness of cloud model, we proposed an audio aggregation algorithm based on Cloud model. Wavelet coefficients of original audio aggregate are mapped into Cloud drops, Cloud drops is zero-watermark. And then make use of Reverse-Cloud generator to calculate three numerical characteristics of Cloud model, these characteristics are used for assessing similarity of original watermark and existed watermark. After the attacks, a part of cloud drops have been changed, which has little impact on characteristics of the entire cloud model, so utilize Change rate of these characteristics to detect watermark, the robustness is strong.
     3, According to lift-wavelet, we propose an algorithm which not only protects copyright of a single audio but also protects copyright of the whole audio aggregation. Using fast lifting wavelet decomposition technique to extract features from every audio work in aggregation, the features are constructed as zero-watermark of every audio, which is used to implement copyright protection of corresponding audio; compose all zero-watermarks of all audio works into a zero-watermark matrix to get aggregate zero-watermark, which is used to implement copyright protection of the audio aggregation.
     4, Propose an audio watermarking algorithm based on ICA for implementing copyright protection of audio aggregation, the wavelet coefficients of each audio work in the audio aggregation are set as observation data, and independent components of the observation data are extracted using ICA separate matrix, and then two most important components are chosen to embed the common watermark; ICA is used to detect watermark, it is not necessary to know the embedding location and strength of watermark and other factors
     5, Propose an audio watermarking algorithm based on ICA for implementing integrity authentication, audio aggregation are put into wavelet packets decomposition, coefficients are extracted by ICA technology, and then a right component are chosen to be embedded watermark. The algorithm not only implements integrity authentication for audio aggregation but also recovers attacked audio aggregation.
     6, Improve the (k, n) method proposed by Shamir firstly, and propose an audio aggregation watermarking algorithm based on (k, n/k=n) for implementing integrity authentication. Every pixel in watermark image are distributed by (k, n) method, and then embedded into every audio work in audio aggregation, so one watermark image are embedded into an audio aggregation, when extracting watermark, set k=n, once there are audio works in aggregation are attacked, the extracted watermark image will change correspondingly, which enhances fragility of the algorithm.
引文
[1]刘瑞祯,谭铁牛.数字图像水印研究综述[J].通信学报. 2000, 21 (8): 39-45.
    [2] B. Chen, and G.W. Wornell. Achievable performance of digital watermarking systems[C]//Proc. IEEE Int. Conf. Multimedia Computing and Systems, pp. 13-18, 1999.
    [3] Hartung F., Kutter M.. Multimedia watermarking techniques[C]//Proceedings of the IEEE, 1999, 87 (7): 1062-1078.
    [4]李伟,袁一群,李晓强等.数字音频水印技术综述[J].通信学报, 2005, 26(2): 100-111.
    [5] M.D. Swanson, B. Zhu, A.H. Tewfik, and L. Boney. Robust audio watermarking using perceptual masking [J]. Signal Processing. 1998, vol. 66, 337-355.
    [6] A.Z.Tirkel, G.A.Rankin, R.M.van Schyndel. Electronic Water Mark. Digital image computing, Technology and Applications (DICTA’93), Macquarie University. 1993,1:666-673.
    [7] R.G.van Schyndel, A.Z.Tirkel, C.F.Osborne. A Digital Watermark[C]//First IEEE International Image Processing Conference (ICIP94). 1994,2:86-90.
    [8] http://www.assuredigit.com/
    [9] http://www.yufei.net/
    [10] G. Cano Rodriguez, M.Nakano Miyatake, H.M.Perez Meana. Analysis of audio watermarking schemes[C]//2nd International Conference on Electrical and Electronics Engineering (ICEEE) and XI Conference on Electrical Engineering (CIE2005), 2005, 17-20.
    [11]孙圣和,陆哲明.数字水印处理技术[J].电子学报, 2000,28(8): 85-90.
    [12]俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报, 2005, 28(12):1957-1968.
    [13] R.B.Wolfgang and E.J.Delp. A watermark for Digital Images[C]//IEEE International Conference on Images Processings, Lausanne, Switzerland, 1996. III: 219-222.
    [14] A.Z.Tirkel, C.F.Osborne and T.E.Hall. Image and Watermark Registration [J]. Signal Processing, 1998, 66 (3): 319-335.
    [15] M.D.Swanson, B.Zhu, A.H.Tewfik and L.Boney. Robust Audio Watermarking using Perceptual Masking [J]. Signal Processing, 1998, 66 (3): 337-355.
    [16] Radhakrishnan R. Audio Content Authentication Based on Psycho-acoustic Model[C]//Proc. Of SPEC Security and Watermarking of Multimedia Contents. 2002.
    [17]王让定,徐达文.基于提升小波的多重数字音频水印[J].电子与信息学报. 2006, Vol.28 No.10:1820-1826.
    [18] Laftsidis, C. Tefas, A. Nikolaidis, N. . Robust multibit audio watermarking in the temporal domain [J]. Circuits and Systems, ISCAS '03. Proceedings of the 2003 International Symposium 2003, vol 2:944-947.
    [19] Lemma, A.N, Aprea, J, Oomen, W. A robustness and audibility analysis of a temporal envelopemodulating audio watermark[C]//Digital Signal Processing Workshop, and the 2nd Signal Processing Education Workshop, 2002, 62-67.
    [20] H.J.Yang, C.K.Alex, S.Rahardja, X.D.Jiang. High capacity data hiding for binary image in morphological wavelet transform domain [C]// IEEE International Conference on Multimedia and Expo, July 2007, pp.1239-1242.
    [21] I.Cox, M.Miller. Electronic Watermarking: the first 50 years. Proc. 4th IEEE Workshop on Multimedia Signal Processing, Cannes, France, October 2001, 225-230.
    [22] N.Cvejic, T.Seppanen. Reduced distortion bit-modification for LSB audio Steganography [C]// Proceedings of the 7th International Conference on Signal Processing (ICSP’04), Beijing, China, 2004, Vol.3, pp.2318-2321.
    [23] J.Tian. Reversible data embedding using a difference expansion [J]. IEEE Transactions on Circuits Systems and Video Technology, 2003, 13(8): 890-896.
    [24] M.U.Celik. Lossless generalized-LSB data embedding [J]. IEEE Transactions on Image Processing, Vol.14, No.2, 2005, pp.253-266.
    [25] C.C.Chang, J.Yuan, and Hsiao. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy [J]. Pattern Recognition, Vol.36, 2003, pp.1583-1595.
    [26] W.Bender, D.Gruhl, N.Morimoto. Techniques for data hiding. IBM Systems Journal. 1996, 35:313-336.
    [27] Yeo I K, Kim H J. Modified patchwork algorithm: a novel audio watermarking scheme[J]. IEEE Transactions on Speech and Audio processing, 2003, 11(4):381-386.
    [28]杨榆,白剑,徐迎晖,钮心忻,杨义先.回声隐藏的研究与实现,中山大学学报, 43卷2004,11 .
    [29] HYEM O O, HYUM, W KJNGW S.Transparent and robust audio watermarking with a new echo embedding technique[C]. Multimedia and Expo, 2001: 317-320.
    [30] Bender W., Gruhl D. and Morimoto N. Techniques for data hiding. IBM system Journal, 1996, 35:313~336.
    [31] Chou S A, Hsieh S F. An echo-hiding watermarking technique based on bilateral symmetric time spread kernel [J]. Acoustics, Speech and Signal Processing, 2006(3): 14-19.
    [32] J.F.Tilki, A.A.Beex. Encoding a hidden digital signature onto an audio signal using psychoacoustic masking [C]//The 7th International Conference on Signal Processing Applications and Technology: vol. 2, 1996: 476~480.
    [33] Cox I J,Kilian J,Leighton F T,et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Trans on Image Processing, 1997, 6(12): 1673-1687.
    [34]纪震,张基宏.小波域的扩频数字图像水印算法[J].电子与信息学报,2001,23(8).
    [35] Swanson M D, Zhu B, Tewfik A H. Robust audio watermarking using perceptual mask [J]. IEEE Transactions on Signal Processing, 1998, 66(3):337-355.
    [36] Hyoung J K, Taehoon K, In-Kwon Y. A robust audio watermarking scheme. ISCAS 2004, 696-699.
    [37] David Megias, Jordi Herrera-Joancomarti, Julia Minguillion. A robust frequency domain audio watermarking scheme for monophonic and stereophonic PCM formats. Proceeding of the 30th EUROMICRO Conference, 2004, 39-43.
    [38] Haitsma J, Veen M, Kalker T. Audio watermarking for monitoring and copy protection. Proceedings of the 2000 ACM workshops on Multimedia, Los Angeles. California, USA, 2000. 119-122.
    [39]孙中伟,冯登国. DCT变换域嵌入图像水印的检测算法[J].软件学报,2005, 16(10): 1799-1804.
    [40] HERNANDEZ J R, MADO M A, PEREZ-GONZALEZ F. DCT domain watermarking techniques for still images: Detector performance analysis and a new structure [J].IEEE Tram on Image Processing, 2000, 9(1): 55-68.
    [41] WANG XIANG-YANG, ZHAO HONG.A. novel synchronization invariant audio watermarking scheme based on DWT and DCT [J]. IEEE transactions on signal processing, 2006, 54(12):4835-4840.
    [42]吴绍权,黄继武,黄达人.基于小波变换的自同步音频水印算法[J].计算机学报,2004,27(3):365-370.
    [43]陈金儿,王让定,徐霁.基于小波域的均值量化数字音频水印算法[J].计算机应用研究,2006,23(4):107-111.
    [44] Shaoquan Wu, Jiwu Huang, Daren Huang. Self-synchronized audio watermark in DWT domin. ISCAS 2004, 712-715.
    [45] Chin-SuKo, Ki-Young Kim, Rim-Wo Hwang. Robust audio watermarking in wavelet domain using pseudorandom sequences [C]//Proceeding of the Fourth Annual ACIS International Conference on Computer and Information Science (ICIS’05), 2005.
    [46]赵春晖,李福昌.一种DWT与DCT结合的盲音频水印算法[J].电子与信息学报, 2003, 25(11):1570-1574.
    [47]钮心忻,杨义先.基于小波变换的数字水印隐藏与检测算法[J].计算机学报, 2000, 23(1):21-27.
    [48]许君一,熊昌镇,齐东旭等.量化水印算法分析[J].通信学报, 2006, 27(3):15-27.
    [49]王秋生,孙圣和.基于量化数字音频信号频域参数的水印嵌入算法[J].声学学报, 2002, 27(4): 379-385.
    [50] DAUBECHIES I, SWELDENS W. Factoring wavelet transforms into lifting step[J]. Journal ofFourier Analysis and Applications, 1998, 4(3):247-269.
    [51]黄松,韦鹏程,张伟.基于SVD图像数字水印算法研究[J].计算机工程与设计, 2006, 27(17): 3117-3118.
    [52] Yiqun Xiong, Rangding Wang. An Audio Zero-watermark Algoritm Combined DCT with Zenike Moments[C]//Processing of International Conference on Cyberworlds 2008(CW 2008). pp11-14. Sep22-24, 2008.
    [53] Lintian Qiao, Klara Nahrstedt. Non-invertible watermarking methods for MPEG encoded audio[C]. SPIE proceedings on Security and Watermarking of Multimedia Contents, 1999, 194-202.
    [54] Ching-Te Wang, Tung-Shou Chen, Wen-Hung Chao. A new audio watermarking based on modified discrete cosine transform of MPEG/audio layer III[C]//Networking, Sensing and Control, 2004 IEEE International Conference, 2004, Vol. 2: 984-989.
    [55] David Megías, Jordi Herrera-Joancomarti, Julia Minguillon. A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression[J], Lecture Notes in Computer Science, 2003, Volume 2828:226-238.
    [56] http://www.petitcolas.net/fabien/steganography/mp3stego/
    [57] D K Koukopoulos, Y C Stamatiou. A compressed-domain watermarking algorithm for MPEG audio layer 3[C]//the ninth ACM Multimedia Conference, Ottawa, Canada, 2001.
    [58]马建湖,何甲兴.基于小波变换的零水印算法[J].中国图象图形学报,2007,12(4):581-585.
    [59]季称利,杨晓元,张崇等.结合空域不变量的变换域零水印二次检测方案[J].计算机工程,2004,30(14):105-115.
    [60]杨树国,李春霞,孙枫等.小波域内图象零水印技术的研究[J].中国图像图形学报, 2003, 8(6):664-669.
    [61] Wang Na, Li Xia. RST invariant zero-watermarking scheme based on matching pursuit [J]. Chinese Journal of Electronics, 2006, 15(2):269-272.
    [62]王成儒,李段.利用小波零树结构和PCA构造图像零水印[J].光电工程, 2005, 32(4):75-77.
    [63]张兵路,姜建国.基于DWT的音频零数字水印研究[J].计算机工程,2005,31(18):148-152.
    [64]温泉,孙锬锋, ,王树勋.零水印的概念与应用[J].电子学报, 2003, 33(2):214-216.
    [65] Qu Zhiguo, Jin Cong. Self-Restoring Dual Watermarking Technology[C]//IEEE International Conference on System of Systems Engineering, 2007, 1-5.
    [66] Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, etc. Cocktail watermarking for digital image protection[J]. IEEE Transactions on multimedia, 2000, 2(4):209-224.
    [67] ITU-R Rec. BS.1116-1. Methods for the subjective assessment of small impairments in audio systems including multi-channel sound system. Oct.1997.
    [68] R.Ni, Q.Ruan. A new judgement method used in information hiding system[C]//The 6thInternational Conference on Signal Processing, Aug.2002, 1: 896-899.
    [69] G.Wu, Y.Zhuang, F.Wu, Y.Pan. Adaptive audio watermarking based on SNR in localized regions. Journal of Zhejiang University Science, Aug.2005, 6A: 53-57.
    [70]陈亮,张雄伟.基于语音参数模型的语音隐藏算法[J].计算机学报, 2003, 26(8): 974-981.
    [71] H.Ozer, I.Avcibas, B.Sankur, and N.Memon. Steganalysis of audio quality metrics[C]// Proceedings of SPIE 5020, June 2003: 55-66.
    [72] ITU-R Rec. BS.1387. Methods for objective measurements of perceived audio quality[C]// International Telecommunications Union, Geneva, Switzerland, 1998.
    [73] T.Thiede, et at. PEAQ– The ITU Standard for Objective Measurement of Perceived Audio Quality [J]. Journal of the Audio Engineering Society. 2000, 48(1&2): 3-29.
    [74]项世军,黄继武,王永雄.一种抗D/A和A/D变换的音频水印算法[J].计算机学报, 2006, 29(2):308-316.
    [75] Wei Li, Xiangyang Xue, Peizhong Lu. Localized audio watermarking technique robust against time-scale modification [J]. IEEE Transactions on Multimedia, 2006, 8(1):60-69.
    [76] Deyi LI, Haijun MENG, Xuemei SHI. Membership clouds and membership clouds generator [J]. Journal of Computer Research and Development, 42(8): 32-41, 1995.
    [77]李德毅,杜鹢,著.不确定性人工智能(M) (Artificial Intelligence with Uncertainty) ISBN 7-118-03921-7北京:国防工业出版社, 2005, 7.
    [78]熊和金,陈德军.智能信息处理..北京:国防工业出版社, 2006.
    [79] Yue Yan, Zhi-hao Zhang, Jian-min Wang, DeYi Li. Clouds, Watermarking Natural Language Text[C]//The 11th World Congress of International Fuzzy Systems Association (IFSA2005), Beijing, China, Vol.3 P.1529.
    [80]王让定,胡文吉.基于云模型的音频水印技术[J].光电工程. 2007, 34(11): 114-119.
    [81] Daubechies I.Sweldens W. Factoring wavelet tran sforms into lifting steps[J]. Journal ofFourier Analysis and Applications, 1 998, 4(3): 245-267.
    [82] Sweldens W. The lifting scheme: A custom-design construction of biorthogonal wavelets [J]. Journal of Applied Computing and Harmonic Analysis, l 996, 3(2): l 86-200.
    [83] Sweldens W Schroder P. Building your own wavelets at home [J]. Wavelets in Computer Graphics,ACM SIGGRAPH Course Notes,l996: l5-87.
    [84] Comon, P. . Independent component analysis—a new concept?[J]. Signal Processing, 1996, 36, 287-314.
    [85] Jutten, C., & Herault, J. . Blind separation of sources, part I: an adaptive algorithm based on neuromimetic architecture [J]. Signal Processing, 1997, 24, 1-10.
    [86] Hyv?rinen, A. (1999e). Survey on independent component analysis [J]. Neural ComputingSurveys, 2, 94-128.
    [87] A.Hyv?rinen and E. Oja. Independent Component Analysis: A Tutorial. http://www.cis.hut.fi/projects/ica/, April 1999.
    [88] J. F. Cardoso, .Blind signal separation: Statistical principles[C]//Proceedings of the IEEE, vol. 86(10), pp. 2009-2025, 1998.
    [89] Thang Viet Nguyen, Jagdish Chandra Patra. A simple ICA-based digital image watermarking scheme [J]. Digital Signal Processing 2007.
    [90] D. Yu, F. Sattar, K.-K. Ma, Watermark detection and extraction using independent component analysis method [J]. EURASIP J. Appl. Signal Process.—Special Issue on Nonlinear Signal Image Process. II 2002 (1) (2002) 92–104.
    [91] D. Yu, F. Sattar. A New Blind ImageWatermarking Technique Based on Independent Component Analysis. in: Springer-Verlag Lecture Notes Comput. Sci., vol. 2613, 2003, pp. 51–63.
    [92]李海峰,王树勋,温泉,宋巍巍,基于SVD和ICA的鲁棒水印算法[J]. ACIA SCIENTIARUM NATURALIUM UNIVERSITATIS SUNYATSENI,中山大学学报(自然科学版).Vol.43 Suppl.(2) Nov.2004. pp:53-57.
    [93] Thai Duy Hien, Zensho Nakao, Yen-Wei Chen. Robust multi-logo watermarking by RDWT and ICA [J]. Signal Processing 86(2006) 2981-2993.
    [94] Thai D Hien, Zensho Nakao &Yen-Wei Chen. ICA Based Robust Logo Image Watermarking [J]. SPIE-IS&T/ Vol. 5306 162-172.
    [95] S. Bounkong, B. Toch, D. Saad, D. Lowe, ICA for watermarking digital images [J]. J. Mach. Learn. Res. 4 (2003) 1471–1498.
    [96] B. Toch, D. Lowe, and D. Saad. Watermarking of audio signals using independent component analysis[C]//International conference on WEB delivering of music, pages 71–74, September 2003.
    [97] Wei Lu, Jian Zhang, Xiaobing Sun, and Kanzo Okada. A Digital Watermarking Technique Based on ICA Image Features. ICA 2004, LNCS 3195, pp. 906–913, 2004.
    [98] Hyv?rinen, A, & Oja, E. (1997). A fast fixed-point algorithm for independent component analysis [J]. Neural Computation, 9 (7), 1483–1492.
    [99] Hyv?rinen, A. (1999a). Fast and robust fixed-point algorithms for independent component analysis [J]. IEEE Transactions on Neural Networks, 10(3), 626–634.
    [100] Hyv?rinen, A. (1999b). The fixed-point algorithm and maximum likelihood estimation for independent component analysis [J]. Neural Processing Letters, 10 (1), 1–5.
    [101] F.J. Gonzalez-Serrano, H.Y. Molina-Bulla, J.J. Murillo-Fuentes, Independent component analysis applied to digital image watermarking[C]//Proc. IEEE Int. Conf. Acoust. Speech Signal Process. 2001 (ICASSP’01), vol. 3, 2001, pp. 1997–2000.
    [102] ITU Recommendation. Methods for the subjective assessment of small impairments in audio systems including multichannel sound system. ITU-R BS.1116-1, 1997.
    [103] ITU-R Rec. BS.1387. Methods for objective measurements of perceived audio quality[C]// International Telecommunications Union, Geneva, Switzerland, 1998.
    [104] T.Thiede, et at. PEAQ– The ITU Standard for Objective Measurement of Perceived Audio Quality [J]. Journal of the Audio Engineering Society. 2000, Vol.48, No.1&2, pp.3-29.
    [105] Lang, A., Dittmann, J.: Transparency and complexity benchmarking of audio watermarking algorithms issues[C]//Proceedings of 8th Workshop on Multimedia and Security, 2006, 190-201.
    [106] Vercellesi, G., Vitali, A., Zerbini, M.: MP3 audio quality for single and multiple encoding[C]//IEEE International Conference on Multimedia and Expo, 2007, 1279-1282.
    [107] Zhu B B, Swanson M D, Tewfik A H. When seeing isn’t believing [J]//IEEE Signal Processing Magazine, 2004, 21(2): 40-49.
    [108] Yeung M, Mintzer F. An invisible watermarking technique for image verification [C]//Proceeding of the IEEE International Conference on Image Processing, Santa Barbara, USA: IEEE, 1997, 2: 680-683.
    [109] Wu C P, Kuo C C. Fragile Speech Watermarking for Content Integrity Verification[C]//Proc. of IEEE International Symposium on Circuits and Systems. 2002.
    [110] Quan X M, Zhang H B. Perceptual Criterion Based Fragile Audio Watermarking Using Adaptive Wavelet Packets[C]//Proceedings of the 17th IEEE Conference on ICPR. 2004: 867-870.
    [111] Shamir, A., 1979. How to share a secret[J]. Communications of the Association for Computing Machinery 22 (11), 612–613.
    [112]周鸿飞,杨晓元,魏立线.基于Shamir秘密共享方案和零水印的音频水印算法计算机工程与应用[J]. 2007, 43(26) pp: 100-104.
    [113] Chang-Chou Lin, Wen-Hsiang Tsai, 2004. Secret image sharing with steganography and authentication [J]. The Journal of Systems and Software 73 (2004), 405–414.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700