CN102237093A - Echo hiding method based on forward and backward echo kernels - Google Patents
Echo hiding method based on forward and backward echo kernels Download PDFInfo
- Publication number
- CN102237093A CN102237093A CN2011101330467A CN201110133046A CN102237093A CN 102237093 A CN102237093 A CN 102237093A CN 2011101330467 A CN2011101330467 A CN 2011101330467A CN 201110133046 A CN201110133046 A CN 201110133046A CN 102237093 A CN102237093 A CN 102237093A
- Authority
- CN
- China
- Prior art keywords
- echo
- watermark
- signal
- frame
- audio
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses an echo hiding method based on forward and backward echo kernels. The method comprises the following steps of embedding a watermark, namely framing an audio carrier signal, importing forward and backward echoes of which the delay time is d into each frame of audio signal, and adding a time interval with a length of d between two frames of the audio carrier signal; and extracting the watermark, namely detecting watermarks of each frame of audio signal by a cepstrum method, extracting the watermarks according to the delay time d of the echoes, and removing the time interval between two frames of the audio carrier signal. Compared with the prior art, the echo hiding method has the advantages of eliminating signal loss during watermark embedding in the prior art and greatly increasing the signaling rate and the recovery rate by adding the time interval with the length equal to that of the delay time of the echoes between two frames of the audio carrier signal.
Description
Technical field
The present invention relates to a kind of echo hidden method, relate in particular to a kind of based on the echo hidden method of front and back to echo nuclear.Belong to field of information security technology.
Background technology
Along with science and technology development, people are more and more urgent to the demand of information security.In information security, the most important is the attack that prevents the assailant.Some active attack persons find can start immediately to attack after the security information.Generally speaking, in order to prevent assailant's attack, adopt the way of Information hiding usually.So-called Information hiding be exactly the Information hiding of maintaining secrecy in unclassified media data (as sound, image etc.), thereby make active attack person can't find hiding of information, meanwhile, want guarantee information concealing technology and encryption technology not to repel mutually, these information that are hidden are referred to as digital watermarking.From another aspect, even the assailant has found that hidden information also needs just can be hidden Info through detecting and deciphering two steps.Improve the security of a voice system, should note the following aspects.The one, voice bearer can not listened difference before and after should keeping embedding security information as far as possible.Like this, the assailant just can't determine whether to hide Info.Even the 2nd, is found to hide Info by the listener-in, can not must allow him extract easily and hide Info.The 3rd. the encryption method to security information can not be cracked easily.
Study and avoid the assailant to attack, at first will understand the human auditory system masking characteristics.The auditory masking characteristic of people's ear is divided into frequency masking characteristic and temporal masking characteristic.The temporal masking characteristic be meant a signal can by before and the signal that sends afterwards shelter.When mistiming and difference on the frequency were all very little, temporarily sheltering and sheltering simultaneously respectively increased.Just be based on based on the Information hiding system of echo that people's ear masking characteristics hides Info.Echo hiding utilized the auditory masking effect of people's ear, is a kind of effective audio-frequency information hidden method.The mode to add echo that its objective is embeds fresh information in original audio-frequency information, realize Information hiding.The mathematical model of echo nuclear is represented as formula (1):
(1)
Embed the sound of echo
Can be expressed as
With
Convolution,
With
Be respectively the unit impulse response of original sound signal and echo nuclear.Echo signal by
Be incorporated in the middle of the original sound, wherein,
Be time delay,
Be attenuation coefficient.Voice signal after the embedding echo is expressed as follows:
(2)
The concrete grammar that echo is hidden is: to one section sound signal data, be divided into some fragments that comprise identical number of samples earlier, each fragment time is about several to dozens of ms, and number of samples is designated as N.Every section is used for embedding 1 bit and hides Info.In the information telescopiny, every segment signal is used formula (3.2), select
, then in signal, embed the bit " 0 " that hides Info; Select
, then in signal, embed the bit " 1 " that hides Info.Time-delay
With
According to the human auditory system masking effect is that criterion is chosen.At last, all are contained the voice signal section that hides Info and be connected into continuous signal.
In fact the extraction of embedding information is exactly to determine the echo time-delay.To write voice signal all be a convolution composite signal because every section latent, directly determines that from time domain or frequency domain there is certain difficulty in the echo time-delay, can adopt convolution homomorphic filtering system to handle, and this convolution composite signal is become the additivity composite signal.The method of human cepstral analysis such as Bender is determined the echo time-delay.
Wherein,
With
Represent Fourier transform and inverse fourier transform respectively.So formula (3) can be expressed as form:
(4)
So,
Therefore, when echo was examined suc as formula (8), the cepstrum of voice signal was expressed as follows after the embedding echo:
(9)
In the formula (9),
Only exist
The integral multiple place nonzero value appears, so at the cepstrum domain of signal
In, echo delay
The place also peak value can occur, can determine to embed the delay size of echo in view of the above, is " 0 " or " 1 " thereby further determine to hide Info.
Compare with other audio-frequency information hidden methods (for example: LSB method, phase encoding, band spectrum modulation method), echo hiding has many advantages: 1. hidden algorithm is simple; 2. algorithm does not produce noise, and concealment effect is good; 3. sometimes because the introducing of echo forms stereophonic effect, make sound sound simpler and more honest; 4. extracting does not need original audio data when hiding Info, and can realize the blind Detecting that hides Info.But the weakness of this method also clearly, the embedding capacity is less, and (general secret information embedded quantity is 2b/s~64b/s, its size is relevant with transmission environment and parameter designing), extraction ratio is not very satisfactory, and interchannel noise, people can reduce the extraction accuracy rate for distorting all.
Sentience is not to comprise that echo is hidden in key property that all interior Information hiding based on audio frequency ought to possess.In echo was hidden implementation procedure, the amplitude of the echo of introducing had directly determined the not sentience that hides Info.
People such as Xu
(Xu. Proakis, Digital Communications. New York:McGraw-Hill, 2001.
)A kind of echo hidden method based on many echo nuclears is proposed on the basis of Bender primal algorithm.Promptly introduce the not sentience that a plurality of echo raisings by a small margin hide Info with many echo examining.But in the face of third-party malicious attack, the recovery rate that this method hides Info is unsatisfactory, and algorithm does not have stronger robustness.
Oh is at document
(Oh H2O, HyunWook Kim, JongWon Seok. Transparent and Robust Audio Watermarking with a New Echo Embedding Technique [C] .ICME, 2001. 3172320.
)In a kind of echo hidden method based on bipolarity echo nuclear has been proposed.This method is divided into two parts echo and coloration to the appreciable echo of people's ear.The former influences acoustical quality because the time of echo delay of introducing is excessive; The latter acoustically can be regarded as the colouration to original sound.Oh has studied the echo signal that embeds opposed polarity and number in the colouration territory to influence that original sound produced.Opposed polarity is in the formula (10)
Symbol.If
For positive number then claims echo is positive polarity; If
For negative then claims echo is negative polarity.The frequency response of the echo signal of opposed polarity and number is different.Embed in sound signal that two polarity are opposite, the echo of different delayed time, can strengthen the not sentience of echo.Huang has developed the method for Oh, has proposed a kind of echo hidden method of analyzing based on psychoacoustic model (Psychoacoustic model MPEG-1), and that has further improved the robustness of algorithm and echo can not perceptibility.But still there is defective in these class methods: the recovery rate that hides Info is lower, particularly introduces echo amplitude less the time.
Kim has proposed a kind of based on the echo hidden method of front and back to echo nuclear
(Hyoung Joong Kim, Yong Hee Choi. A Novel Echo2Hiding Scheme with Backward and Forward Kernels [J]. Circuits and Systems for Video Technology, 2003,13 (8): 8852889.).Proposed a kind of new echo " nuclear " in the method, this echo nuclear is identical by two delay times, but the opposite echo of direction is introduced factor formation, examines to echo before and after being called.Can be expressed as
Wherein
Claim the back to introduce the factor to echo,
Claim forward direction echo to introduce the factor.The result of study of Kim shows that when utilizing cepstral analysis detection of concealed information, the peak value size of corresponding echo position is subjected to the influence of three factors: what 1. play maximum decisive action is the cepstrum response of echo nuclear
2. the cepstrum of original sound signal response
The same peak value size that influences; 3. time delay
Direction the influence of peak value size also be can not be ignored.At identical original sound signal, the hidden algorithm to echo nuclear before and after adopting is guaranteeing well can not obtain the lower bit error rate that hides Info and detect under the prerequisite of sentience.But this method is in watermark embed process, and after raw tone and the echo stack, the signal that each frame obtains is
Voice signal, and every in theory frame signal should for
Summary of the invention
When technical matters to be solved by this invention is to overcome the watermark embedding of prior art existence, the deficiency of every frame signal meeting excalation, provide a kind of based on the echo hidden method of front and back to echo nuclear, this method can be eliminated the signal deletion in the watermark embed process.
Particularly, the present invention is by the following technical solutions:
A kind of based on the echo hidden method of front and back to echo nuclear, comprise watermark embedded part and watermark extracting part, the watermark embedded part comprises the step of the audio carrier signal being carried out the branch frame, and the introducing time-delay is the steps of the front and back of d to echo in each frame sound signal; Watermark extracting partly comprises the step of utilizing the cepstrum method that the watermark in each frame sound signal is detected, and the step of extracting watermark according to the time-delay d of echo;
Described watermark embedded part comprises that also to adding length between each frame of audio carrier signal be the step in the time interval of d;
Described watermark extracting part also comprises the step of removing the time interval between each frame of audio carrier signal.
The present invention has eliminated the signal deletion in the existing in prior technology watermark embed process by add the length and the time interval that the echo time-delay equates between each frame of audio carrier signal, has greatly improved the rate of delivering a letter and recovery rate.
Description of drawings
Fig. 1 is a watermark embedding principle synoptic diagram of the present invention;
The recovery rate of existing method and the inventive method compared when Fig. 2 changed for cell number, and wherein "---" is existing method, and "--" is the inventive method;
The recovery rate of existing method and the inventive method compared when Fig. 3 changed for attenuation rate, and wherein "---" is existing method, and "--" is the inventive method;
The recovery rate of existing method and the inventive method compared when Fig. 4 counted variation for time-delay, and wherein "---" is existing method, and "--" is the inventive method;
Fig. 5 is the robustness test result of the inventive method, wherein A is an original watermark, B1 is an original watermark by existing method transmission and the watermark that under fire do not obtain at receiving end under the situation, B2 is an original watermark by the inventive method transmission and in the watermark that does not under fire obtain under the situation, C1 is that original watermark passes through existing method transmission and attacks in the resulting watermark of receiving end through white Gaussian noise, C2 is that original watermark is attacked in the resulting watermark of receiving end by the inventive method transmission and through white Gaussian noise, D1 is that original watermark passes through existing method transmission and attacks in the resulting watermark of receiving end through resampling, D2 is that original watermark is attacked in the resulting watermark of receiving end by the inventive method transmission and through resampling, E1 is that original watermark passes through existing method transmission and attacks in the resulting watermark of receiving end through heavy filtering, and to be original watermark attack in the resulting watermark of receiving end by the inventive method transmission and through heavy filtering E2.
Embodiment
Below in conjunction with accompanying drawing technical scheme of the present invention is elaborated:
In existing watermark embedded mode, after raw tone and the echo stack, the signal that each frame obtains is
Voice signal, and every in theory frame signal should for
In the practical application than having lacked in theory
Part.In other words, this makes telescopiny lose theoretic accuracy.
In embedded mode of the present invention, as shown in Figure 1, by being the time interval of d to adding length between each frame of audio carrier signal, wherein d is the time-delay of echo, obtains in each frame
?
Signal, identical with the value of accurate Calculation in theory, avoided hiding signal error numerically with echo in theory.Though can reduce sound quality to a certain extent by improving later embedded mode, can greatly improve the rate of delivering a letter and recovery rate.And the sound quality that this mode reduces can remedy by hardware mode when hardware is realized.
In order to verify validity of the present invention, existing method and the inventive method are contrasted:
One, performance comparison:
The wave form song s that adopts 15s is as carrier, and sample frequency 22.05KHZ transmits with traditional and the inventive method respectively.Accompanying drawing 3-5 has shown contrast experiment's result.
As the carrier audio frequency, getting attenuation coefficient is 0.05 with s1, adopts time-delay 45 expressions " 1 ", and 55 expressions " 0 " of delaying time constantly change institute's transmit cell number, compare the recovery rate of classic method and the inventive method, and gained the results are shown in accompanying drawing 2.As can be seen, when transmitted first number was less than 30, the recovery rate of existing method and the inventive method was all lower, and discontented full border needs; When transmitted first number more than 30 the time, the recovery rate of the inventive method is apparently higher than existing method; Therefore, when cell number constantly changed, the recovery rate performance of the inventive method was better than existing method.
As the carrier audio frequency, the cell number of transmission is taken as 340 with s1, adopts time-delay 45 expressions " 1 ", 55 expressions " 0 " of delaying time.Constantly change attenuation coefficient, relatively the recovery rate of classic method and the inventive method compares, and gained the results are shown in accompanying drawing 3.As seen from the figure, when attenuation coefficient less than 0.1 the time, the recovery rate poor performance is few, can not satisfy actual needs but all be lower than 0.7; When attenuation coefficient greater than 0.1 the time, the recovery rate performance of the inventive method is better than existing method, and recovery rate satisfies practical application; Therefore, the inventive method more can satisfy practical application than existing method.
Getting the carrier audio frequency is s1, and the cell number that is passed is 340.If employing time-delay n point expression " 1 ", time-delay n+10 point is represented " 0 ", constantly changes the size of n, compares the recovery rate of classic method and the inventive method, and gained the results are shown in Figure 4.Can be obtained by figure: the recovery rate performance of the inventive method is better than existing method, can reach traditional inaccessiable high recovery rate; Therefore, the inventive method more can satisfy practical application requirements than existing method.
Two. the robustness test:
The wave form song that adopts 180s is as carrier, sample frequency 22.05KHZ, and the watermark name is taken as " digital watermarking ", and pixel is 99 * 95.Various attack is done in watermark detected robustness.Its result as shown in Figure 5, wherein A is an original watermark, B1 is an original watermark by existing method transmission and the watermark that under fire do not obtain at receiving end under the situation, B2 is an original watermark by the inventive method transmission and in the watermark that does not under fire obtain under the situation, C1 is that original watermark passes through existing method transmission and attacks in the resulting watermark of receiving end through white Gaussian noise, C2 is that original watermark is attacked in the resulting watermark of receiving end by the inventive method transmission and through white Gaussian noise, D1 is that original watermark passes through existing method transmission and attacks in the resulting watermark of receiving end through resampling, D2 is that original watermark is attacked in the resulting watermark of receiving end by the inventive method transmission and through resampling, E1 is that original watermark passes through existing method transmission and attacks in the resulting watermark of receiving end through heavy filtering, and to be original watermark attack in the resulting watermark of receiving end by the inventive method transmission and through heavy filtering E2.
Choose 100 width of cloth bianry images as experiment figure, get the 70th image and be embedded in the audio carrier, ask for former watermark and extract the normalized correlation coefficient of watermark as watermark.NC value (normalized correlation coefficient) is that the similarity of extracting watermark and original watermark is carried out quantitative evaluation.
NC value under table 1 various attack
? | A | B1 | B2 | C1 | C2 | D1 | D2 | E1 | E2 |
The NC value | 1 | 0.957 | 1 | 0.957 | 0.999 | 0.932 | 0.994 | 0.817 | 0.990 |
As can be seen from Table 1, under various attack, the NC value that the inventive method obtains is than traditional height.Therefore the inventive method is than the recovery rate height of existing method under various attack.
Table 2 is under the various attack, resulting SNR(signal to noise ratio (S/N ratio)) and the PSNR(Y-PSNR), be used for the robustness of measure algorithm.
SNR under table 2 various attack and PSNR value
? | A | B1 | B2 | C1 | C2 | D1 | D2 | E1 | E2 |
SNR | ∞ | 11.74 | ∞ | 11.74 | 38.87 | 9.75 | 19.63 | 5.68 | 17.73 |
PSNR | 87.86 | 11.65 | 87.86 | 11.65 | 39.73 | 9.72 | 20.34 | 5.58 | 18 |
As can be seen from Table 2, under various attack, the NC value that the inventive method obtains is than traditional height.Therefore the inventive method has more performance than existing method from the angle of SNR and PSNR.
Three, carrying capacity test
Hide in the assessment test at STEP 2001 audio-frequency informations, the embedded quantity of hiding data 2 b/15 s is considered as satisfying the standard of sound works copy control; The embedded quantity that hides Info of 72 b/30 s is considered as the copyright management Passing Criteria.In the experiment, voice signal is carried out after the staging treating every section comprise 52 sampled points, and these six sections sampled voice frequencies of A, B, C, D, E and F all are 22.05 KHz, and the carrying capacity that hides Info of the inventive method is 400 bps, considerably beyond STEP 2001 standards.
Four, subjective assessment
In order to test the voice signal perceived quality that adopts after the distinct methods embedding hides Info, carried out following experiment: get 5 sections pop music A, B, C, D, E and F.20 mean aves student that is 24 years old no professional music background is play the voice signal that these five sections original sound signal and corresponding embedding thereof hide Info, allow they distinguish between the two difference and according to subjective discrimination (Subjective Difference Grades, SDG) marking, get its mean value, the results are shown in Table 3.
Table 3 is the test result of sentience not
From experimental result as can be seen, the SDG of the existing relatively method correspondence of the inventive method is weaker, but the reduction of audio quality is still within the acceptable scope.
Claims (1)
1. one kind based on the echo hidden method of front and back to echo nuclear, comprise watermark embedded part and watermark extracting part, the watermark embedded part comprises the step of the audio carrier signal being carried out the branch frame, and the introducing time-delay is the steps of the front and back of d to echo in each frame sound signal; Watermark extracting partly comprises the step of utilizing the cepstrum method that the watermark in each frame sound signal is detected, and the step of extracting watermark according to the time-delay d of echo; It is characterized in that,
Described watermark embedded part comprises that also to adding length between each frame of audio carrier signal be the step in the time interval of d;
Described watermark extracting part also comprises the step of removing the time interval between each frame of audio carrier signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101330467A CN102237093B (en) | 2011-05-23 | 2011-05-23 | Echo hiding method based on forward and backward echo kernels |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011101330467A CN102237093B (en) | 2011-05-23 | 2011-05-23 | Echo hiding method based on forward and backward echo kernels |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102237093A true CN102237093A (en) | 2011-11-09 |
CN102237093B CN102237093B (en) | 2012-08-15 |
Family
ID=44887679
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011101330467A Expired - Fee Related CN102237093B (en) | 2011-05-23 | 2011-05-23 | Echo hiding method based on forward and backward echo kernels |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102237093B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102509551A (en) * | 2011-11-23 | 2012-06-20 | 北京邮电大学 | Audio steganalysis algorithm based on variance of difference of sum cepstrum |
CN102916750A (en) * | 2012-10-22 | 2013-02-06 | 江苏科技大学 | Underwater sound covert communication method and system based on ship radiation noise |
CN103413552A (en) * | 2013-08-29 | 2013-11-27 | 四川大学 | Audio watermark embedding and extracting method and device |
CN106165015A (en) * | 2014-01-17 | 2016-11-23 | 英特尔公司 | For promoting the mechanism of echo based on the watermarking management transmitted for the content at communication equipment |
CN106601261A (en) * | 2015-10-15 | 2017-04-26 | 中国电信股份有限公司 | Digital watermark based echo inhibition method and system |
US10499151B2 (en) | 2015-05-15 | 2019-12-03 | Nureva, Inc. | System and method for embedding additional information in a sound mask noise signal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030037174A (en) * | 2001-11-02 | 2003-05-12 | 한국전자통신연구원 | Method and Apparatus of Echo Signal Injecting in Audio Water-Marking using Echo Signal |
CN101026659A (en) * | 2006-02-23 | 2007-08-29 | 中兴通讯股份有限公司 | Method for realizing echo time delay positioning |
JP4037689B2 (en) * | 2002-05-28 | 2008-01-23 | アロカ株式会社 | Ultrasonic image processing device |
CN101461257A (en) * | 2006-05-30 | 2009-06-17 | 微软公司 | Adaptive acoustic echo cancellation |
-
2011
- 2011-05-23 CN CN2011101330467A patent/CN102237093B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20030037174A (en) * | 2001-11-02 | 2003-05-12 | 한국전자통신연구원 | Method and Apparatus of Echo Signal Injecting in Audio Water-Marking using Echo Signal |
JP4037689B2 (en) * | 2002-05-28 | 2008-01-23 | アロカ株式会社 | Ultrasonic image processing device |
CN101026659A (en) * | 2006-02-23 | 2007-08-29 | 中兴通讯股份有限公司 | Method for realizing echo time delay positioning |
CN101461257A (en) * | 2006-05-30 | 2009-06-17 | 微软公司 | Adaptive acoustic echo cancellation |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102509551A (en) * | 2011-11-23 | 2012-06-20 | 北京邮电大学 | Audio steganalysis algorithm based on variance of difference of sum cepstrum |
CN102916750A (en) * | 2012-10-22 | 2013-02-06 | 江苏科技大学 | Underwater sound covert communication method and system based on ship radiation noise |
CN102916750B (en) * | 2012-10-22 | 2014-11-05 | 江苏科技大学 | Underwater sound covert communication method and system based on ship radiation noise |
CN103413552A (en) * | 2013-08-29 | 2013-11-27 | 四川大学 | Audio watermark embedding and extracting method and device |
CN106165015A (en) * | 2014-01-17 | 2016-11-23 | 英特尔公司 | For promoting the mechanism of echo based on the watermarking management transmitted for the content at communication equipment |
CN106165015B (en) * | 2014-01-17 | 2020-03-20 | 英特尔公司 | Apparatus and method for facilitating watermarking-based echo management |
US10499151B2 (en) | 2015-05-15 | 2019-12-03 | Nureva, Inc. | System and method for embedding additional information in a sound mask noise signal |
US10856079B2 (en) | 2015-05-15 | 2020-12-01 | Nureva, Inc. | System and method for embedding additional information in a sound mask noise signal |
EP3826324A1 (en) | 2015-05-15 | 2021-05-26 | Nureva Inc. | System and method for embedding additional information in a sound mask noise signal |
US11356775B2 (en) | 2015-05-15 | 2022-06-07 | Nureva, Inc. | System and method for embedding additional information in a sound mask noise signal |
CN106601261A (en) * | 2015-10-15 | 2017-04-26 | 中国电信股份有限公司 | Digital watermark based echo inhibition method and system |
Also Published As
Publication number | Publication date |
---|---|
CN102237093B (en) | 2012-08-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102237093B (en) | Echo hiding method based on forward and backward echo kernels | |
Lei et al. | Robust SVD-based audio watermarking scheme with differential evolution optimization | |
Lin et al. | Audio watermark | |
Kalantari et al. | Robust multiplicative patchwork method for audio watermarking | |
Cvejic et al. | Audio watermarking using m-sequences and temporal masking | |
CN111091841B (en) | Identity authentication audio watermarking algorithm based on deep learning | |
Wang et al. | Centroid-based semi-fragile audio watermarking in hybrid domain | |
Cvejic et al. | Robust audio watermarking in wavelet domain using frequency hopping and patchwork method | |
CN110163787A (en) | Digital audio Robust Blind Watermarking Scheme embedding grammar based on dual-tree complex wavelet transform | |
Malik et al. | Robust audio watermarking using frequency-selective spread spectrum | |
CN102148034A (en) | Echo hiding based watermark embedding and extracting method | |
CN105895109B (en) | A kind of digital speech evidence obtaining and tamper recovery method based on DWT and DCT | |
Ngo et al. | Robust and reliable audio watermarking based on phase coding | |
Zhang et al. | Robust and transparent audio watermarking based on improved spread spectrum and psychoacoustic masking | |
Khademi et al. | Audio watermarking based on quantization index modulation in the frequency domain | |
Bhowal | Multilevel steganography to improve secret communication | |
Patel et al. | Secure transmission of password using speech watermarking | |
Fallahpour et al. | High capacity logarithmic audio watermarking based on the human auditory system | |
CN108665905B (en) | Digital voice resampling detection method based on frequency band bandwidth inconsistency | |
Li et al. | A novel audio watermarking in wavelet domain | |
Khan et al. | A new audio watermarking method based on discrete cosine transform with a gray image | |
Youssef | HFSA-AW: a hybrid fuzzy self-adaptive audio watermarking | |
Cvejic et al. | Fusing digital audio watermarking and authentication in diverse signal domains | |
Khademi et al. | Audio steganography by using of linear predictive coding analysis in the safe places of discrete wavelet transform domain | |
Zhao et al. | A spread spectrum audio watermarking system with high perceptual quality |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120815 Termination date: 20150523 |
|
EXPY | Termination of patent right or utility model |