NDFT-based audio watermarking scheme with high robustness against malicious attack

被引:0
|
作者
Xie, Ling [1 ]
Zhang, Jiashu [1 ]
He, Hongjie [1 ]
机构
[1] SW Jiaotong Univ, Sichuan Key Lab Signal & Informat Proc, Chengdu 610031, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to public frequency points leading to weak robustness against malicious attack in DFT-based audio watermarking algorithm, a novel audio watermarking scheme based on nonuniform discrete Fourier transform (NDFT) is proposed to improve robustness against malicious attack in this paper. NDFT transform could set up random sampling points in frequency domain as desired rather than fixed frequency points in DFT. The characteristic of NDFT provides the possibility to hide embedding positions. In the NDFT-domain selectable frequency range which satisfies necessary requirements of audio watermarking scheme, the proposed scheme utilizes chaotic system to select embedding points for random and hidden embedding positions. Theoretical analysis and simulation results show that the proposed scheme not only guarantees robustness against common operations, but also further improves systemic security and robustness against malicious attack due to the secret embedding position.
引用
收藏
页码:374 / 381
页数:8
相关论文
共 50 条
  • [1] NDFT-based audio watermarking scheme with high security
    Xie, Ling
    Zhang, Jia-shu
    He, Hong-jie
    18TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 4, PROCEEDINGS, 2006, : 270 - +
  • [2] Audio watermarking based on NDFT
    Ali, Nasser
    Osrnan, Mahmoud. A.
    Magboub, Hussein M.
    Ben Musa, Khadiga A. B.
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 491 - 497
  • [3] NDFT-based Image Steganographic Scheme with Discrimination of Tampers
    Wang, Hongxia
    Fan, Mingquan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (12): : 2340 - 2354
  • [4] Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals
    Khan, Muhammad Khurram
    Xie, Ling
    Zhang, Jiashu
    DIGITAL SIGNAL PROCESSING, 2010, 20 (01) : 179 - 190
  • [5] An audio watermarking scheme based on an embedding strategy with maximized robustness to perturbations
    Baras, C
    Moreau, N
    Dymarski, P
    2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL IV, PROCEEDINGS: AUDIO AND ELECTROACOUSTICS SIGNAL PROCESSING FOR COMMUNICATIONS, 2004, : 357 - 360
  • [6] Towards increasing the robustness of image watermarking scheme against histogram equalization attack
    Saxena, Yikas
    Gupta, J. P.
    2007 IEEE 15TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS, VOLS 1-3, 2007, : 157 - +
  • [7] Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion
    Liu, Huajian
    Li, Yiyao
    Steinebach, Martin
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2013, 2013, 8099 : 95 - 104
  • [8] Robustness of Wavelet Domain Watermarking Against Scaling Attack
    Naderahmadian, Yashar
    Beheshti, Soosan
    2015 IEEE 28TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2015, : 1218 - 1222
  • [9] Increasing robustness of patchwork audio watermarking algorithm using attack characterization
    Cvejic, N
    Tujkovic, I
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, PROCEEDINGS, 2004, : 3 - 6
  • [10] A High Robust Audio Watermarking Scheme Based on Orthogonal Decomposition
    ZHANG Kang
    GAO Ge
    CHEN Yi
    SONG Dingyan
    LIU Ying
    Lü Bing
    WuhanUniversityJournalofNaturalSciences, 2016, 21 (02) : 139 - 144