Centroid-based semi-fragile audio watermarking in hybrid domain

被引:0
|
作者
HongXia Wang
MingQuan Fan
机构
[1] Southwest Jiaotong University,School of Information Science and Technology
来源
关键词
semi-fragile audio watermarking; centroid; inaudibility; tamper detection;
D O I
暂无
中图分类号
学科分类号
摘要
Many previous (semi-) fragile audio watermarking schemes adopt binary images as watermarks, which reduce the security of watermarking systems. On the other hand, the content-based or feature-based second generation digital watermarking has limited applicability, and its partial feature points may be damaged by watermarking operations and various common signal processing. To overcome these problems, in this paper, a novel centroid-based semi-fragile audio watermarking scheme in hybrid domain is proposed. The theoretical lower limit of signal to noise ratio (SNR) for objective evaluation of the imperceptibility of watermarked audio signal is deduced, and the watermark embedding capacity and the tamper detection ability are theoretically analyzed. In the proposed scheme, first, the centroid of each audio frame is computed, then Hash function is performed on the obtained centroid to get the watermark, after that, the audio sub-band which carries centroid of audio frame is performed with discrete wavelet transform (DWT) and discrete cosine transform (DCT), and finally the encrypted watermark bits are embedded into the hybrid domain. Theoretical analysis and experimental results show that the proposed scheme is inaudible and applicable to different types of audio signals. Furthermore, its ability of tamper detection and tolerance against common signal processing operations are excellent. Comparing with the existing schemes, the proposed scheme can effectively authenticate the veracity and integrity of audio content, and greatly expand the applicability of the content-based audio watermarking scheme.
引用
收藏
页码:619 / 633
页数:14
相关论文
共 50 条
  • [31] Image Content Authentication System Based on Semi-Fragile Watermarking
    Cruz, Clara
    Reyes, Rogelio
    Nakano, Mariko
    Perez, Hector
    2008 51ST MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2008, : 306 - 309
  • [32] Wavelet-based semi-fragile watermarking with tamper detection
    Ding, K
    He, C
    Jiang, LG
    Wang, HX
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (03) : 787 - 790
  • [33] Tamper Detection of Electronic Bills based on Semi-Fragile Watermarking
    Xie, Yi
    Chen, Yixin
    Wang, Yulin
    PROCEEDINGS 2016 FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2016), 2016, : 41 - 44
  • [34] Semi-fragile watermarking for image authentication based on compressive sensing
    Du, Ling
    Cao, Xiaochun
    Zhang, Wei
    Zhang, Xinpeng
    Liu, Na
    Wei, Jianguo
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (05)
  • [35] A wavelet-based semi-fragile watermarking with recovery mechanism
    Tsai, Min-Jen
    Chien, Chih-Cheng
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 3033 - 3036
  • [36] DCT-based semi-fragile watermarking for image authentication
    Chen, Zhigang
    Zhu, Congxu
    2005 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2005, : 801 - 805
  • [37] Image authentication based on digital signature and semi-fragile watermarking
    Hong-Bin Zhang
    Cheng Yang
    Xiao-Mei Quan
    Journal of Computer Science and Technology, 2004, 19 : 752 - 759
  • [38] SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION
    Fei, Chuhong
    Kwong, Raymond
    Kundur, Deepa
    2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 141 - +
  • [39] Semi-Fragile Neural Network Watermarking Based on Adversarial Examples
    Yuan, Zihan
    Zhang, Xinpeng
    Wang, Zichi
    Yin, Zhaoxia
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024, 8 (04): : 2775 - 2790
  • [40] Semi-fragile image watermarking based on block mean difference
    Shin, DH
    Kim, JW
    Choi, JU
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 577 - 583