A Robust Blind Audio Watermarking Scheme Based on Singular Value Decomposition and Neural Networks

被引:3
|
作者
Yang, Yu [1 ,2 ]
Lei, Min [1 ,2 ]
Liu, Huaqun [3 ]
Cai, Yongmei [4 ]
Lin, Guoyuan [5 ,6 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
[3] Beijing Inst Graph Commun, Sch Informat & Mech Engn, Beijing 102600, Peoples R China
[4] Xinjiang Univ Finance & Econ, Coll Comp Sci & Engn, Urumqi 830012, Peoples R China
[5] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Peoples R China
[6] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 211102, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Blind watermarking; singular value decomposition; neural networks; copyright protection;
D O I
10.1080/18756891.2013.870767
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper proposes a novel blind audio watermarking scheme based on singular value decomposition (SVD) and neural networks (NN), which makes use of memorization and adaptation capabilities of NN. Experimental results show that the proposed watermarking algorithm is strongly robust against several kinds of attacks such as noise addition, re-sampling, re-quantization, MP3 compression, replace and so on. Additionally, the proposed algorithm achieves signal-to-noise radio (SNR) values ranging from 21dB to 48dB for different watermarked sounds and embedded strengths. These results demonstrate that the proposed watermarking method is a suitable candidate for audio copyright protection.
引用
收藏
页码:865 / 873
页数:9
相关论文
共 50 条
  • [1] A Robust Blind Audio Watermarking Scheme Based on Singular Value Decomposition and Neural Networks
    Yu Yang
    Min Lei
    Huaqun Liu
    Yongmei Cai
    Guoyuan Lin
    [J]. International Journal of Computational Intelligence Systems, 2014, 7 : 865 - 873
  • [2] A robust audio watermarking scheme based on reduced singular value decomposition and distortion removal
    Wang, Jian
    Healy, Ron
    Timoney, Joe
    [J]. SIGNAL PROCESSING, 2011, 91 (08) : 1693 - 1708
  • [3] A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition
    Lei, Baiying
    Soon, Ing Yann
    Zhou, Feng
    Li, Zhen
    Lei, Haijun
    [J]. SIGNAL PROCESSING, 2012, 92 (09) : 1985 - 2001
  • [4] A blind audio watermarking based on singular value decomposition and quantization
    Maiti C.
    Dhara B.C.
    [J]. International Journal of Speech Technology, 2022, 25 (03) : 759 - 771
  • [5] Design of a blind quantization-based audio watermarking scheme using singular value decomposition
    Bhat, Vivekananda K.
    Das, Ashok Kumar
    Lee, Jong-Hyouk
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18):
  • [6] Robust Audio Watermarking Scheme Based on Short Time Fourier Transformation and Singular Value Decomposition
    Dhar, Pranab K.
    Khan, Mohammad I.
    Dhar, Sunil
    Kim, Jong-Myon
    [J]. SECURITY TECHNOLOGY, 2011, 259 : 128 - +
  • [7] A New Audio Watermarking Scheme Based on Singular Value Decomposition and Quantization
    Vivekananda Bhat K
    Indranil Sengupta
    Abhijit Das
    [J]. Circuits, Systems, and Signal Processing, 2011, 30 : 915 - 927
  • [8] A New Audio Watermarking Scheme Based on Singular Value Decomposition and Quantization
    Bhat, Vivekananda K.
    Sengupta, Indranil
    Das, Abhijit
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2011, 30 (05) : 915 - 927
  • [9] A Robust Blind Video Watermarking Scheme based on Discrete Wavelet Transform and Singular Value Decomposition
    Hammami, Amal
    Ben Hamida, Amal
    Ben Amar, Chokri
    [J]. VISAPP: PROCEEDINGS OF THE 14TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS, VOL 4, 2019, : 597 - 604
  • [10] A Region Specific Robust Watermarking Scheme Based on Singular Value Decomposition
    Singh, Priyanka
    Agarwal, Suneeta
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 117 - 123