基于内容的数字音频水印技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机通信和网络技术的发展,多媒体数据的传输、处理、保存等变得十分方便快捷。同时也为非授权的拷贝、分发、篡改等提供了方便,这些非法的行为严重侵犯了数字媒体所有者的版权利益,同时数据的安全可信性也受到了很大的威胁。数字水印技术作为一种版权保护和内容真实性、完整性认证的技术手段,受到了学者们广泛的重视。本文主要研究了基于音频内容的数字水印技术,分别提出了用于数据完整性鉴定的脆弱音频水印算法和用于版权保护的鲁棒音频水印算法,主要创新性工作如下:
     1.利用信噪比自适应地计算水印嵌入强度,避免了现有一些水印算法通过反复实验确定合适水印嵌入强度的问题,在满足给定信噪比的情况下,水印嵌入强度可达到最大。此外,水印的嵌入和提取采用抖动量化,避免了经典量化方法的不足。抖动量通过混沌生成,混沌的白噪声特性加强了算法的安全性。
     2.提出了一种基于音频内容的NDCT域脆弱音频水印算法,算法从理论上推导了两次量化的量化步长间的数学关系式,避免现有算法通过反复实验确定合理量化步长的问题;水印由音频内容生成,可避免二值图像作为水印在传输过程中的安全问题;同时,NDCT矩阵元素由混沌序列通过线性函数产生,更进一步的加强了系统的安全性。算法在鉴定音频完整性的同时,还能定位恶意篡改位置。
     3.提出了一种基于比值的鲁棒音频水印算法。算法利用小波变换近似系数前后部分能量比的稳定性,通过量化两者比值的方法嵌入和提取水印。现有很多音频水印算法的鲁棒性容易受音频类型的影响,而本文提出的基于比值的音频水印算法基于音频内容而设计,其鲁棒性不受音频类型的限制,实验结果证明了算法的鲁棒性和与音频类型的无关性。
     4.在分析TSM、抖动和随机剪切等同步攻击过程和现有抗同步攻击音频水印算法不足之处的基础上,提出了基于音频全局特征量和均匀分帧的水印算法新思路。通过均匀分帧,避免同步位置的不断偏移;通过稳定的音频全局特征量,实现水印的生成、嵌入和提取。重新定义了均值的概念,定义了归一化重心的概念,并从理论和实验上分别证明了二者对TSM操作的稳定性。利用时域均值、小波域近似系数均值和归一化重心对同步攻击的稳定性,设计了3种抗同步攻击算法。实验结果证明该方案是有效的,与现有文献大多只能抵抗某一类同步攻击相比,本文的水印方案能很好地抵抗多种同步攻击。
With the rapid development of computer communication and network technique, the transmission, process and store of multimedia data become more and more convenient and quick. Simultaneously, it is easy to illegally copy, distribute and tamper. So the owner copyright of digital media should be protected, and the security and creditability of the multimedia data are threatened. Therefore, digital watermarking used as the technique of copyright protection and reliability authentication has been widely recognized by many researchers.
     This dissertation mainly focuses on designing the audio watermarking schemes. The fragile audio watermarking for data integrality authentication and robust audio watermarking algorithms for copyright protecting are proposed, respectively, The achieved innovative results are given as follows.
     1. The strength of watermarking is calculated adaptively by using SNR, and the right watermarking strength is gained by experiments over and over in existing algorithms can be avoided. On the condition of setting SNR, the maximum of the watermarking strength is obtained and the proposed algorithm can detect the watermark blindly. The dither quantization is used in embedding and extracting process and drawback of classical quantization method can be avoided. The dithering vector is generated by the chaotic system, and white noise property of chaos enhances the security of the algorithm.
     2. A fragile audio watermarking algorithm in NDCT domain content-based is proposed. The two quantization steps are deduced theoretically, the lackness that the appropriate quantization step is confirmed by multiple replication experiments in existing algorithms is avoided; the watermarking is generated by audio content and can avoid security problem of binary image watermarking in transmission; meanwhile, NDCT matrix elements are produced by linear function of chaotic sequences and it enhances system security furthermore. While authenticating audio integrity, the algorithm can also locate malicious tamper location.
     3. A robust audio watermarking algorithm based on ratio is designed. The watermark is embedded or extracted by quantizing the ratio. Today, many robust audio watermarking algorithms are coterminous with audio type. Because the proposed ratio-based algorithm is based on audio content, the robustness has nothing with audio type. The experimental results show the strong robustness.
     4. Synchronization attacks process of TSM, dithering, cropping and so on, and shortcomings that existed anti-synchronization attack audio watermarking methods are analyzed, and a new scheme based on audio global feature parameter and even dividing frames is proposed. By even dividing frames, synchronization place continuous offset can be avoided; the watermark are generated, embedded and extracted by stability of the audio global feature parameter. The mean in time domain is redefined, normalized center of gravity is defined and their stability for TSM manipulation is proved in theory and experiment. The stability of mean of wavelet approach coefficients has been proved by existed literature. The stability of the mean in the time domain, the mean of wavelet approach coefficients and normalized center of gravity for synchronization attacks is used for designing3algorithms against synchronization attack. Experimental results demonstrate the proposed scheme is effective. Compared with many algorithms that can only resist single type synchronization attack in existing literatures, the proposed watermarking algorithm can resist multi-type synchronization attacks.
引文
[1]D.R.Stinson著,冯登国译.密码学原理与实践(第二版).北京:电子工业出版社,2003.
    [2]王凤英,程震.网络与信息安全.北京:中国铁道出版社,2006.
    [3]Darko Kirovski and Henrique S.Malvar. Spread-Spectrum Watermarking of Audio Signals[J]. IEEE Transactions on signal processing,2003,51(4):1020-1033.
    [4]Shijun Xiang and Jiwu Huang. Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks[J]. IEEE Transactions on multimedia, 2007,9(7):1357-1372.
    [5]张宪海.数字水印技术在版权保护与内容认证中的应用研究.哈尔滨:哈尔滨工程大学博士学位论文,2006.
    [6]范明泉.数字图像水印与量化音频水印的若干关键技术研究[D].成都:西南交通大学博士学文论文,2010.
    [7]杜江.信息隐藏与数字水印技术研究[D].西安:西安电子科技大学博士学位论文,2001.
    [8]Fabien A.P. Petitcolas, Ross J.Anderson, Markus G. Kuhn. Information Hiding-a Survey [C]. Proceedings of the IEEE,1999,87(7):1062-1078.
    [9]张华熊.信息隐藏[D].杭州:浙江大学博士学位论文,2003.
    [10]Y. J. Hu, H. K. Lee, J. W. Li. DE-based Reversible Data Hiding with Improved Overflow Location Map[J]. IEEE Transactions on Circuits and Systems for Video Technology,2009, 19(2):250-260.
    [11]W.1. Tai, C. M. Yeh, C. C. Chang. Reversible Data Hiding Based on Histogram Modification of Pixel Differences [J]. IEEE Transactions on Circuits and Systems for Video Technology,2009,19(6):906-910.
    [12]Xue-Song Chen, Yong-Tian Yang, et al. An Audio Blind Watermarking Algorithm in Wavelet Domain Based on Chaotic Encryption[C]. Proceedings of the 2007 International Conference on Wavelet and Pattern Recognition,2007, pp470-473.
    [13]Charfeddine Maha, Elarbi Maher and Ben Amar Chokri. A Blind Audio Watermarking Scheme Based on Neural Network and Psychoacoustic Model with Error Correcting Code in Wavelet Domain[C]. International Conference on Communications, Control and Signal Processing,2008,1138-1143.
    [14]孙锐,蒋建国,杨兴明.基于小波包和心理声学模型的音频水印算法[J].系统仿真学报,2007,19(10):2248-2255.
    [15]Tang Xianghong, Yang Lianjie, et al. A Watermarking Algorithm Based on the SVD and Hadamard Transform [C]. International Conference on Communications, Circuits and Systems,2005,2:874-877.
    [16]王向阳,赵红,崔永瑞.一种新的混合域自适应数字音频水印算法[J].小型微型计算机系统,2006,27(2):316-319.
    [17]赵春晖,李福昌.一种新的自适应音频数字水印算法[J].哈尔滨工程大学学报,2003,24(3):317-320.
    [18]钮心忻,杨义先.基于小波变换的数字水印隐藏与检测算法[J].计算机学报,2000,23(1):21-27.
    [19]Nima Khademi Kalantari, Seyed Mohammad Ahadi, et al. A Robust Audio Watermarking Scheme Using Mean Quantization in the Wavelet Transform Domain[C]. IEEE International Symposium on Signal Processing and Information Technology,2007, pp198-201.
    [20]王向阳,祁薇.用于版权保护与内容认证的半脆弱音频水印算法[J].自动化学报,2007,33(9):936-940.
    [21]王宏霞.基于内容的自适应音频水印研究综述[J].西南交通大学学报,2009,44(3):430-447.
    [22]M. Kutter, S. K. Bhattacharjee, et al. Towards Second Generation Watermarking Schemes[C]. International Conference on Image Processing,1999, pp320-323.
    [23]付永庆,孙莹.一种新的基于小波变换的自适应量化音频水印算法[J].哈尔滨工程大学学报,2007,28(9):1052-1055.
    [24]Xiang-Yang Wang and Hong Zhao. A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT [J]. IEEE Transactions on signal processing,2006,54(12):4835-4840.
    [25]李南,商艳红,邹建成.基于Fibonacci变换的音频相位水印算法[J].北方工业大学学报,2005,21(3):2-5.
    [26]戴志强,愈一彪,颜祥等.一种基于多重统计量分析的文件语言信息隐藏算法[J].信号处理,2008,24(3):500-503.
    [27]http://www.ctr.columbia.edu/-dpwe/LabROSA/proceeds/icslp2000/pdf/00280.pdf.
    [28]C. S. Lu, H. Y. Liao, L. H. Chen. Multipurpose Audio Watermarking[C]. Proceedings of International Conference on Pattern Recognition,2000,282-285.
    [29]M. D. Swanson, B. Zhu, A. H. Tewfik, L. Boney. Robust Audio Watermarking Using Perceptual Masking[J]. IEEE Transactions on Signal Processing,1998, pp337-355.
    [30]M. Arnold. Audio Watermarking:Features, Applications and Algorithms. IEEE International Conference on Multimedia and Expo,2000, pp1013-1016.
    [31]李伟.鲁棒性数字音频水印算法研究[D].上海:复旦大学博士学位论文,2005.
    [32]孙水发.数字水印技术研究[D].杭州:浙江大学博士学位论文,2005.
    [33]张达治.数字水印算法研究[D].吉林:吉林大学博士学位论文,2006.
    [34]Hong Wang, Yi Sun, et al. Anti-Cropping Synchronization Audio Digital Watermark Algorithm Based on Watermark Sequence Number[C]. IEEE International Conference on Signal Processing,2006, pp2611-2614.
    [35]Mohamed F. Mansour and Ahmed H.Tewfik. Data Embedding in Audio Using Time-Scale Modification[J]. IEEE Transactions on speech and audio processing,2005, 13(3):432-439.
    [36]谢玲,张家树,和红杰.一种基于非均匀离散傅里叶变换的鲁棒音频水印算法[J].计算机学报,2006,29(9):1711-1721.
    [37]Mingquan Fan, Hongxia Wang. Centroid-based Robust Audio Watermarking Scheme[C]. IEEE International Conference on Audio, Language and Image Processing,2008, 476-479.
    [38]全笑梅,张鸿宾.基于小波包域听觉感知分析的统计音频水印算法[J].电子学报,2007,35(4):673-678.
    [39]王琦,李弼程等.基于恒定统计特征的数字音频水印技术[J].信息工程大学学报,2006,7(3):280-282.
    [40]林克正,钟媛,范波.基于小波域的鲁棒音频数字水印算法[J].哈尔滨理工大学学报,2010,15(4):81-85.
    [41]马翼平,韩纪庆.基于能量特性分块的DCT域自适应音频水印算法[J].信号处理,2006,519-522.
    [42]冯涛,韩纪庆.双声道音频水印的同步及盲检测算法[J].通信学报,2006,27(10):62-68.
    [43]冯涛,韩纪庆.基于听觉特性的音频水印能量估计及自适应嵌入算法研究[J].声学学报,2006,31(1):48-54.
    [44]陈娟,杨春芳,刘粉林.基于差值抖动调制的鲁棒数字水印[J].计算机工程与设计,2007,28(23):5653-5656.
    [45]王向阳,杨红颖,牛盼盼.性能优越的混合域数字音频盲水印算法[J].通信学报,2007,28(2):109-114.
    [46]王让定,陈金儿.采用量化MCLT变换系数的音频数字水印盲检算法[J].光电工程,2004,31(12):68-71.
    [47]项世军,黄继武,王永雄.一种抗D/A和A/D变换的音频水印算法[J].计算机学报,2006,29(2):308-316.
    [48]鲍德旺,杨红颖,祁薇,王向阳.基于音频特征的抗去同步攻击数字水印算法[J].中国图象图形学报,2009,14(12):2619-2622.
    [49]彭宏,王珣,王卫星等.基于音频特征的多小波域水印算法[J].计算机研究与发展,2010,47(2):216-222.
    [50]王让定,陈金儿.基于MCLT变换的音频数字水印技术[J].计算机研究与发展,2006,41(8):1398-1403.
    [51]李燕萍,唐振民,钱博.基于语音参数模型的抗同步攻击音频水印算法[J].计算机工程,2008,34(9):177-179.
    [52]陈铭,张茹,刘凡凡等.基于DCT域QIM的音频信息伪装算法[J].通信学报,2009,30(8):105-111.
    [53]谭良,吴波,刘震等.一种基于混沌和小波变换的大容量音频信息隐藏算法[J].电子学报,2010,38(8):1812-1818.
    [54]王慧琴,Ryouichi NISHIMURA, Yoiti SUZUKI.一种自适应音频数字水印算法的研究与仿真[J].系统仿真学报,2007,19(2):461-464.
    [55]Xiang-Yang Wang, Jun Wu. A Feature-based Robust Digital Image Watermarking Against Desynchronization Attacks[J]. International Journal of Automation and Computing,2007,4(4):428-432.
    [56]Foo Say Wei, Xue Feng, Li Mengyuan. A Blind Audio Watermarking Scheme Using Peak Point Extraction[C]. IEEE International Conference on Circuit and Systems,2005, pp4409-4412.
    [57]Rajkiran Ravula, Suresh Rai. A Robust Audio Watermarking Algorithm Based on Statistical Charecteristics and DWT+DCT[C]. IEEE International Conference on Wireless Communications Networking and Mobile Computing,2010, pp1-4.
    [58]D Kirovski and H. Malvar. Spread-Spectrum Watermarking of Audio Signals[J]. IEEE Transactions on Signal Processing,2003,51(4):1020-1033.
    [59]P. Bassia and I. Pitas. Robust Audio Watermarking in the Time Domain[J]. IEEE Transactions on multimedia,2001,3(2):232-241.
    [60]Yiqing Lin, Waleed H.Abdulla, Yide Ma. Audio Watermarking Detection Resistant to Time and Pitch Scale Modification[C]. IEEE International Conference on Signal Processing and Communications,2007, pp24-27.
    [61]Ryuki Tachaibana. Improve Audio Watermark Robustness Using Stretched Patterns Against Geometric Distortion[C]. IEEE International Conference on Multimedia,2002, pp647-654.
    [62]Chung-Ping Wu, Po-Chyi Su, C.-C. Jay Kuo. Robust and Efficient Digital Audio Watermarking Using Audio Content Analysis[C]. Proceedings of SPIE,2000,3971: 382-392.
    [63]Shijun Xiang, Jiwu Huang, Rui Yang, et al. Robust Audio Watermarking Based on Low-Order Zernike Moments[C]. IWDW,2006, pp226-240.
    [64]Koudai Hiratsuka, Kazuhiro Kondo, Kiyoshi Nakagawa. On the Accuracy of Estimated Synchronization Positions for Audio Digital Watermarks using the Modified Patchwork Algorithm on Analog Channels[C]. IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2008, pp628-631.
    [65]Zhang Li, Chen Li-min, Qian Gong-bin. Self-synchronization Adaptive Blind Audio Watermarking[C]. IEEE International Conference on Multi-Media Modeling,2006, pp381-384.
    [66]Wei Li, Xiangyang Xue, Peizhong Lu. Localized Audio Watermarking Technique Robust Against Time-Scale Modification[J]. IEEE Transactions on Multimedia,2006,8(1): 60-69.
    [67]Sylvain Beauget, Michale van der Veen, Aweke Lemma. Informed Detection of Audio Watermark for Resolving Playback Speed Modifications[C]. Proceedings of the 2004 Workshop on Multimedia and security,2004,117-123.
    [68]Shaoquan Wu, Jiwu Huang, Yun Q. Shi. Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission[J]. IEEE Transactions on Broadcasting,2005,51(1):69-76.
    [69].Xin Li and Hong Heather Yu. Transparent and Robust Audio Data Hiding in Cepstrum Domain[C]. IEEE International Conference on Multimedia and Expro,2000,397-400.
    [70]Jiwu Huang, Yong Wang, Yun Q. Shi. A Blind Audio Watermarking Algorithm with Self-Synchronization[C]. IEEE International Symposium on Circuits and Systems,2002, pp627-630.
    [71]Shuifa Sun, Sam Kwong. A Self-Synchronization Blind Audio Watermarking Algorithm[C]. Proceedings of Inernational Symposium on Intelligent Signal Processing and Communication Systems,2005, pp133-136.
    [72]Mohamed F. Mansour and Ahmed H. Tewfik. Audio Watermarking by Time-Scale Modification[C]. IEEE International Conference on Acoustics, Speech, and Signal Processing,2001,1353-1356.
    [73]Yousof Erfani, M.Sharam Moin and Mehdi Parviz. New Methods for Transparent and Accurate Echo Hiding by Using the Original Audio Cepstral Content[C]. IEEE International Conference on Computer and Information Science,2007, pp1087-1092.
    [74]Mehmet Celik, Gaurav Sharm, A.Murat Tekalp. Pitch and Duration Modification for Speech Watermarking[C]. IEEE International Conference on Acoustics, Speech, and Signal Processing,2005,2:17-20.
    [75]Abdellatif Zaidi, Remy Boyer, Pierre Duhamel. Audio Watermarking under Desynchronization and Additive Noise Attacks[J]. IEEE Transactions on Signal Processing,2006,54(2):570-584.
    [76]Mohammd A. Akhaee, Mohammad J. Saberian, Soheil Feizi, et al. Robust Audio Data Hiding Using Correlated Quantization with Histogram-Based Detector[J]. IEEE Transactions on Multimedia,2009,11(5):834-842.
    [77]温泉,王树勋,年贵君.DCT域音频水印:水印算法和不可感知性测度[J].电子学报,2007,35(9):1702-1705.
    [78]黄雄华,蒋伟贞,王宏霞等.基于比值的小波域数字音频盲水印算法[J].铁道学报,2011,33(5):66-71.
    [79]黄雄华,王宏霞.一种DCT域自适应音频水印算法[J].计算机应用研究,2009,26(8):2989-2991.
    [80]马翼平,韩纪庆.DCT域音频水印:嵌入对策和算法[J].电子学报,2006,34(7):1260-1264.
    [81]Sang-Kwang Lee, Yo-Sung Ho. Digital Audio Watermarking in the Cepstrum Domain[J]. IEEE Transactions on Consumer Electronics,2000,46(3):744-750.
    [82]Ling Xie, Jiashu Zhang, Hongjie He. Robust Audio Watermarking Scheme Based on Nonuniform Discrete Fourier Transform[C]. IEEE International Conference on Engineering of Intelligent Systems,2006, pp1-5.
    [83]王虹,孙毅.基于水印序号的裁剪音频数字水印算法[J].武汉理工大学学报,2008,32(3):481-484.
    [84]年桂君,王树勋,唐笑年.倒谱域自适应音频水印算法[J].吉林大学学报(信息科学版),2008,26(1):55-61.
    [85]王泳,黄继武,Yun Q. Shi快速重同步的有意义音频水印盲检测算法[J].计算机研究与发展,2003,40(2):215-220.
    [86]全笑梅,张鸿宾.用于篡改检测及认证的脆弱音频水印算法[J].电子与信息学报,2005,27(8):1187-1192.
    [87]王秋生,孙圣和,郑为民.数字音频信号的脆弱水印嵌入算法[J].计算机学报,2002,25(5):520-525.
    [88]Huang Xiong-hua. A Complex Cepstrum Fragile Audio Watermarking Algorithm[C]. IEEE International Conference on Genetic and Evolutionary Comuting,2009, pp231-234.
    [89]范明泉,王宏霞.能区分图像内容或水印篡改的自恢复脆弱水印.西南交通大学学报,2008,43:799-805.
    [90]范明泉,王宏霞.基于音频内容的混合域脆弱水印算法[J].铁道学报,2010,32(1):118-122.
    [91]王宏霞,范明泉.基于质心的混合域半脆弱音频水印算法[J].中国科学:信息科学,2010,40(2):313-326.
    [92]Wang HongXia & Fan MingQuan. Centroid-based Semi-Fragile Audio Watermarking in Hybrid Domain[J]. Science China:Information Sciences,2010,53(3):619-633.
    [93]赵红,沈东升,朱元辉.一种抗裁剪的半脆弱音频水印算法[J].自动化学报,2008,34(6):647-651.
    [94]Rui Sun, Hong Sun and Tianren Yao. A SVD and Quantization Based Semi-fragile Watermarking Technique for Image Authenticatio[C]. IEEE International Conference on Signal Processing,2002, pp1592-1595.
    [95]林晓丹.基于音频统计特征的自适应水印方案[J].计算机应用与软件,2011,28(9):289-291.
    [96]Hong Peng, Jun Wang, Weixing Wang. An Adaptive Audio Watermarking Method Based on Local Audio Feature and support Vector Regression[C]. Proceddings of International Conference on Software Engineering, Artifical Intelligences, Netwoking and Parallel/Distributed Computiong,2009, pp381-384.
    [97]Pan-Pan Niu, Xiang-Yang Wang Ming-yu Lu. A New Audio Watermarking Scheme Robust to Desynchronization Attacks[C]. Proceddings of International Conference on Frontier of Computer Science and Technology,2010, pp233-238.
    [98]A.Trikel, G. Rankin, V. Schyndel R. et al. Electronic Watermark[C]. Proceedings of DICTA,1993, pp666-672.
    [99]I. K. Yeo, H. J. Kim. Modified patchwork algorithm:A Novel Audio Watermarking Scheme. IEEE Transactions on Speech and Audio Processing,2003,11(4):381-386.
    [100]H. O. Oh, J. W. Seok, J. W. Hong, D. H. Youn. New Echo Embedding Technique for Robust and Imperceptible Audio Watermarking. IEEE International Conference on Acoustics, Speech, and Signal Processing,2001,3:1342-1344.
    [101]冯涛,张磊,叶文喜等.音频水印中回声同步信号的性能分析[J].哈尔滨工业大学学报,2005,37(8):1025-1028.
    [102]Y. Erfani, S. Siahpoush. Robust Audio Watermarking Using Improved TS Echo Hiding. Digital Signal Processing,2009,19 (5):809-814.
    [103]Guhl D, Lu A, Bender W. Echo hiding. Proceedings of the First International Workshop on Information Hiding,1996, pp295-315.
    [104]B. S. Ko, R. Nishimura, Y. Suzuki. Time-spread Echo Method for Digital Audio Watermarking. IEEE Transactions on Multimedia,2005,7(2):212-221.
    [105]孙圣和,陆哲明,牛夏牧.数字水印技术及其应用.北京:科学出版社,2004.
    [106]I. J. Cox, M. L. Miller, J. A. Bloom. Watermarking Applications and Their Properties[C]. IEEE International Conference on Information Technology:Coding and Computing,2000, pp6-10.
    [107]Brian Chen, Gregory W. Wornell. Quantization Index Modulation:A Class of Provably Good Methods for Digital Watermarking and Information Embedding[J]. IEEE Transactions on Information Theory,2001,47(4):1423-1443.
    [108]I. J. Cox an J.-P. M. G. Linnartz. Some General Methods for Tampering with Watermarks[J]. IEEE Journal on Selected Area in Communications,1998,16:587-593.
    [109]J.-P. Linnartz, T. Kalker, and J. Haitsma. Detecting Electronic Watermarks in Digital Video[C]. IEEE International Conference on Acoustics, Speech, and Signal Processing, 1999,4:2071-2074.
    [110]http://www.ifpi.org.
    [111]SDMI Phase Ⅱ Screening Technology Ver 1. (2000). Online:http://www.sdmi.org/ down load/frwg00022401-ph2_cfpvl.0.pdf.
    [112]International Telecommunication Union. Method for Objective Measurements of Perceived Audio Quality (PEAQ). ITU-R BS.1387-1, Geneva,1998-2001.
    [113]项世军.稳健音频水印研究[D].广州:中山大学博士学位论文,2006.
    [114]Li Wei, Xue XiangYang. An Audio Watermarking Technique That is Robust Against Random Cropping[J]. Computer Music Journal, MIT Press, USA,2003,27(4),58-68.
    [115]刘泉,高庆.基于DWT的自适应盲音频水印算法[J].武汉理工大学学报,2008,30(1):95-97.
    [116]刘瑞桢,谭铁牛.水印能量估计的一般性框架[J].计算机学报,2001,24(3):242-246.
    [117]Van Schyndel R, Tirkel A,Osbome C. A digital Watermark[C]. IEEE Proceeding on International Conference on Image Processing. Austin, Tex, IEEE Press,1994, pp86-90.
    [118]I. J. Cox., M. L. Miler. The First 50 Years of Electronic Watermarking [J]. Applied Signal Process.2002,56(2):225-230.
    [119]Hyoung Joong Kim, Audio Watermarking Techniques. Online:http://wwwiti.cs. unimagdeburgde /iti_amsl/lehre/05_SoSem/it-sec_v/scripte/audio watermarking techniques.pdf.
    [120]邓艺,赵险峰,冯登国.基于非均匀DCT的量化索引调制隐写[J].电子与信息学报,2010,32(2):323-328.
    [121]许德合,朱长青,王奇胜.利用QIM的DFT矢量空间数据盲水印模型[J].武汉大学学报·信息科学版,20]0,35(9):1100-1103.
    [122]George Tzanetakis, Georg Essl, Perry Cook. Audio Analysis Using the Discrete Wavelet Transform[C].
    [123]Lian S, Kanellopoulos D, Ruffo G. Recent Advances in Multimedia Information System Security[J]. Informatica,2009,33(1):3-24.
    [124]Ryuki Tachibana, Shuichi Shimizu, Taiga Nakamura, et al. An Audio Watermarking Method Robust Against Time-and Frequency-Fluctuation[C]. Proceedings of SPIE, 2001,4314:104-115.
    [125]Kim H J. Audio Watermarking Techniques[C]. Proceedings of the Pacific Rim Workshop on Digital Steganography. Kitaakyushu:ACM Press,2003, pp1-17.
    [126]Cveji C, Keskinarkaus A, Seppanen T. Audio Watermarking Using m-Sequences and Temporal Masking[C]. Proceedings of the 7th IEEE Workshop on Applications of Signal Processing to Audio and Acoustics. New York, NY.2001:227-230.
    [127]Antol. Z. Tirkel, C harles F Osborne, Ron G. van Schyndel. Image Watermarking -A Spread Spectrum Application. Proceedings of the IEEE International Symposium on Spread Spectrum Techniques and Applications. Mainz Germany,1996, pp785-789.
    [128]Cox I J, Kilian J, Leighton T. Secure Spread Spectrum Watermarking for Images, Audio and Video[C]. Proceddings of International Conference on Image Processing,1996, pp243-246.
    [129]Cox I J, Kilian J, Leighton T, T Shannoon. Secure Spread Spectrum Watermarking for Multimedia[J]. IEEE Transacition on Image Processing,1997,6(12):1673-1687.
    [130]王秋生,孙圣和.一种在数字音频信号中嵌入水印的新算法[J].声学学报,2001,26(5):464-467.
    [131]黄继武,Yun Q Shi,程卫东.DCT域图像水印:嵌入对策和算法[J].电子学报,2000,28(4):57-60.
    [132]JIANG Wei-zhen. Fragile Audio Watermarking Algorithm Based on SVD and DWT[C]. Proceddings of International Conference on Intelligent Computing and Integrated Systems,2010, pp83-86.
    [133]方宜彦.低复杂度音讯变速播放系统[D].台湾:台南科技大学硕士学位论文,2007.
    [134]Raul Martinez-Noriega et al. Self-Synchronous Time-Domain Audio Watermarking Based on Coded-Watermarks[C]. Proceddings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2010, pp135-138.
    [135]王向阳,牛盼盼.基于音频统计特性的数字水印嵌入算法[J].自动化学报,2008,34(8):1001-1003.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700