当前位置: X-MOL 学术Math. Probl. Eng. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Robust and Blind Audio Watermarking Algorithm in Dual Domain for Overcoming Synchronization Attacks
Mathematical Problems in Engineering Pub Date : 2020-11-21 , DOI: 10.1155/2020/2035747
Qiuling Wu 1, 2 , Aiyan Qu 1 , Dandan Huang 1
Affiliation  

How to effectively resist synchronization attacks is the most challenging topic in the research of robust watermarking algorithms. A robust and blind audio watermarking algorithm for overcoming synchronization attacks is proposed in dual domain by considering time domain and transform domain. Based on analysing the characteristics of synchronization attacks, an implicit synchronization mechanism (ISM) is developed in the time domain, which can effectively track the appropriate region for embedding and extracting watermarks. The data in this region will be subjected to discrete cosine transform (DCT) and singular value decomposition (SVD) in turn to obtain the eigenvalue that can be utilized to carry watermarks. In order to extract the watermark blindly, the eigenvalue will be quantized. Genetic algorithm (GA) is utilized to optimize the quantization step to balance both transparency and robustness. The experimental results confirm that the proposed algorithm not only withstands various conventional signal processing operations but also resists malicious synchronization attacks, such as time scale modification (TSM), pitch-shifting modification (PSM), jittering, and random cropping. Especially, it can overcome TSM with strength from −30% to +30%, which is much higher than the standard of the International Federation of the Phonographic Industry (IFPI) and far superior to the other algorithms in related papers.

中文翻译:

用于克服同步攻击的双域鲁棒盲音频音频水印算法

如何有效抵抗同步攻击是鲁棒水印算法研究中最具挑战性的主题。通过考虑时域和变换域,提出了一种在双域中克服同步攻击的鲁棒且盲目的音频水印算法。在分析同步攻击特征的基础上,提出了一种时域隐式同步机制(ISM),可以有效地跟踪嵌入和提取水印的适当区域。该区域中的数据将依次进行离散余弦变换(DCT)和奇异值分解(SVD),以获得可用于承载水印的特征值。为了盲目地提取水印,将对特征值进行量化。遗传算法(GA)用于优化量化步骤,以兼顾透明度和鲁棒性。实验结果证实,该算法不仅可以承受各种常规信号处理操作,而且还可以抵抗恶意的同步攻击,例如时标修改(TSM),音高变换修改(PSM),抖动和随机裁剪。尤其是,它可以克服强度为-30%至+ 30%的TSM,这远远高于国际唱片业联合会(IFPI)的标准,并且远远优于相关论文中的其他算法。实验结果证明,该算法不仅可以承受各种常规的信号处理操作,而且还可以抵抗恶意的同步攻击,例如时标修改(TSM),音高变换修改(PSM),抖动和随机裁剪。特别是,它可以克服强度为-30%至+ 30%的TSM,这远远高于国际唱片业联合会(IFPI)的标准,并且远远优于相关论文中的其他算法。实验结果证实,该算法不仅可以承受各种常规信号处理操作,而且还可以抵抗恶意的同步攻击,例如时标修改(TSM),音高变换修改(PSM),抖动和随机裁剪。特别是,它可以克服强度为-30%至+ 30%的TSM,这远远高于国际唱片业联合会(IFPI)的标准,并且远远优于相关论文中的其他算法。
更新日期:2020-11-22
down
wechat
bug