CN103208288A - Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm - Google Patents

Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm Download PDF

Info

Publication number
CN103208288A
CN103208288A CN2013100805434A CN201310080543A CN103208288A CN 103208288 A CN103208288 A CN 103208288A CN 2013100805434 A CN2013100805434 A CN 2013100805434A CN 201310080543 A CN201310080543 A CN 201310080543A CN 103208288 A CN103208288 A CN 103208288A
Authority
CN
China
Prior art keywords
watermark
coefficient
dwt
sigma
dct
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100805434A
Other languages
Chinese (zh)
Inventor
杨志疆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhangzhou Institute of Technology
Original Assignee
Zhangzhou Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhangzhou Institute of Technology filed Critical Zhangzhou Institute of Technology
Priority to CN2013100805434A priority Critical patent/CN103208288A/en
Publication of CN103208288A publication Critical patent/CN103208288A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a dual encryption based DWT-DCT domain audio public watermarking algorithm. The algorithm comprises a watermark embedding process and a watermark detection process. The watermark embedding process sequentially comprises dual encryption of a binary watermark image, segment treatment on an original voice frequency, DWT and DCT of each segment coefficient, quantization embedding, inversed discrete cosine transform (IDCT) and inversed discrete wavelet transform (IDWT) of a quantization coefficient, reorganization and obtaining of a voice frequency containing watermark information. The watermark detection process sequentially comprises segment treatment on an audio signal to be tested, DWT and DCT of each segment coefficient, summing of watermark reference values at corresponding positions of n watermark coefficient series, reconfiguration of a two-dimensional image, inverted scrambling treatment and obtaining of a restored watermark image. By the aid of the algorithm, the transparency of watermarks is effectively guaranteed, the miss ratio of watermarks is greatly reduced, and the robustness and the accuracy of the watermark detection are improved.

Description

Based on the open watermarking algorithm of the DWT-DCT territory audio frequency of double-encryption
Technical field
The present invention relates to image information safety technique field, relate in particular to the open watermarking algorithm of a kind of DWT based on double-encryption-DCT territory audio frequency.
Background technology
In recent years, the argumentation of relevant authenticating water-mark increases day by day both at home and abroad.The pre-service of watermark is more common assurance watermark security method menu; usually it is disorderly and unsystematic to adopt the method for image scrambling to make that image becomes; play the encryption effect; but the image scrambling method has periodically; continue by former method conversion; will restore original watermark information, so the security of this kind encrypted watermark is relative, certain defective be arranged.
Chaos phenomenon is similar at random, the deterministic process that occurs in the nonlinear dynamic system.The principal feature of chaos sequence: (1) form is simple.Only need chaotic maps parameter and starting condition just can conveniently generate, needn't store whole sequence by wasting space.(2) starting condition susceptibility.General different initial value, even quite approaching, the chaos locus sequence that iteration obtains is all inequality.(3) determinacy.As long as given identical initial value is arranged, its corresponding track is identical certainly.Generally provide the chaos sequence of one section finite length, illegal person is difficult to therefrom infer its starting condition.Therefore, digital picture and chaos sequence are carried out computing, with making digital picture also have the characteristics of chaos sequence, reach the purpose of image encryption.Yet the chaos encryption technology only changes the pixel value of image, does not change locations of pixels, can not resist the shearing attack of watermark effectively.
Summary of the invention
In order to overcome the deficiencies in the prior art, the objective of the invention is to propose a kind of shearing attack that has robustness, can effectively resist watermark, to the damage of original image less and the open watermarking algorithm of the transparent good DWT based on double-encryption of watermark-DCT territory audio frequency.
For achieving the above object, technical scheme of the present invention is: the open watermarking algorithm of a kind of DWT based on double-encryption-DCT territory audio frequency may further comprise the steps:
One, the telescopiny of watermark:
The definition original audio signal is A={a (i), 0≤i<Length}, and wherein, Length is the number of voice data, a (i) is the range value of i voice data;
The definition binary bitmap be W={W (i, j), 0≤i<M, 0≤j<N}, wherein, M, N represent the row, column number of watermark, W (i, j) { 0,1} represents the capable j row of the i grey scale pixel value of binary bitmap to ∈;
Its concrete telescopiny is as follows:
1) binary bitmap W M * NCarry out scramble and dimension-reduction treatment with the Arnold conversion, realize once encrypting; Carry out XOR with isometric Logistic chaos sequence then, realize superencipher, namely obtain the watermark W' behind the double-encryption M * N
2) original audio A is carried out staging treating, described segmentation process is:
Choosing element formation n segment length by great-jump-forward is L * M * N * 2 coefficients series IO (i), and wherein, L is the DWT number of transitions, and n * L * M * N * 2<Length;
3) every section coefficient is carried out L level DWT conversion, get CA L, CD L, CD L-1... CD 1, wherein, CA LBe the approximate component of L level, CD iIt is the details component;
4) to CA LCarry out dct transform, the Low Medium Frequency coefficient x (j) that chooses then after the conversion quantizes, and embeds the position with it as watermark and embed watermark information after encrypting, and described coefficient quantization process is as follows:
Make z (j)=[x (j)/Da]; Da is predefined quantization parameter,
If z (j) %2==W'(i), x (j)=z (j) * Da-Da/2 then;
Otherwise x (j)=z (j) * Da+Da/2;
Wherein, the computing of [] expression round, % represents complementation;
5) the coefficient x after quantizing is done idct transform and obtain CA ', and then carry out L level IDWT conversion, at last each section of moisture official seal breath replaced former coefficient of correspondence, namely obtain moisture official seal breath audio frequency;
Two, the testing process of watermark:
Step1: sound signal to be detected is carried out staging treating, and described segmentation process constitutes n section coefficient series for choose element by great-jump-forward;
Step2: each section coefficient is carried out the L level DWT conversion identical with watermark embed process, obtain the approximate component Ca of L level L
Step3: to Ca LCarry out dct transform, the Low Medium Frequency coefficient x ' that chooses after the conversion (i) calculates and obtains a watermark reference information value, and the formula of described calculating watermark reference information value is:
Figure BDA00002912424600021
Wherein, Represent to round up computing, % represents complementation;
Step4: the watermark reference value addition on the corresponding position of n watermark coefficient series, determine a corresponding watermark information position according to " ballot principle " then, described " ballot principle " is as follows:
If W ' is arranged 1(i)+W ' 2(i)+W ' 3(i)+...+W ' n(i)〉n/2 can judge that then corresponding watermark information is W " (i)=1, otherwise W " (i)=0;
Step5: repeat the operation of Step4, longly be M*N information series W up to obtaining one ", identical Logistic chaos sequence carries out XOR, the reconstruct two dimensional image when embedding then; re-use scramble template identical when the embedding random processing that is inverted, namely recover watermarking images w '.
Further optimization algorithm, the telescopiny of described watermark also comprises the step that the moisture official seal breath audio frequency that obtains is estimated, this evaluation procedure adopts the difference between signal to noise ratio snr evaluation original audio signal and the moisture official seal breath sound signal, and its judgement schematics is as follows:
SNR = 10 log 10 δ 2 D
Wherein, δ 2 = 1 N Σ i = 0 N - 1 ( x i - 1 N Σ i = 0 N - 1 x i ) 2 , D = 1 N Σ i = 0 N - 1 ( x i - x ^ i ) 2 , x iBe original audio, Moisture official seal breath audio frequency.
Further optimization algorithm comprises also in the testing process of described watermark that the watermarking images to recovering carries out the normalized crosscorrelation calculation procedure, and the formula that this normalized crosscorrelation calculates is as follows:
NC ( W ′ , W ) = Σ i = 0 P - 1 Σ j = 0 Q - 1 w ( i , j ) · w ′ ( i , j ) Σ i = 0 P - 1 Σ j = 0 Q - 1 w 2 ( i , j ) Σ i = 0 P - 1 Σ j = 0 Q - 1 w ′ 2 ( i , j )
When being 1, the NC value represents that wherein both are identical, extraction effect the best; The NC value is more little, and extraction effect is just more poor.
Adopt above technical scheme, the present invention utilizes the approximate component coefficient of DWT and DCT in the telescopiny of watermark Low Medium Frequency coefficient diminishes various that to attack be to have stable performance most, it organically combines the multiresolution characteristic of wavelet transform and the cumulative characteristic of discrete cosine transform, behind DWT repeatedly, choose approximate component, carry out dct transform again, choose the Low Medium Frequency coefficient of DCT at last as the position that watermark embeds, guaranteed the robustness of embed watermark information;
The present invention takes repeatedly embed watermark information of segmentation in the telescopiny of watermark in addition, has increased the embedding quantity of information of watermark with respect to prior art, and it effectively improves the robustness of watermark.
The method that watermark at present embeds is directly to add watermark information in original vector, and it is difficult to realize the blind Detecting of watermark.Watermark embed process of the present invention is realized by quantization parameter, and quantization parameter is chosen according to the audio carrier self-adaptation, has so both guaranteed the transparency of watermark, not needing to have realized original audio to participate in simultaneously in detecting the watermark process.
Be to determine every watermark signal by " ballot principle " when the present invention detects watermark, this also greatly reduces the loss of watermark, improves robustness and the accuracy rate of watermark detection.
Description of drawings
The present invention is further detailed explanation below in conjunction with the drawings and specific embodiments:
Fig. 1 is the schematic flow sheet of the watermark embed process of the open watermarking algorithm of DWT-DCT territory audio frequency that the present invention is based on double-encryption;
Fig. 2 is the schematic flow sheet of the watermark detection process of the open watermarking algorithm of DWT-DCT territory audio frequency that the present invention is based on double-encryption;
Fig. 3 is the original audio synoptic diagram of the embodiment of the invention 1;
Fig. 4 is the moisture official seal breath audio frequency synoptic diagram that the original audio of embodiment 1 Fig. 3 obtains behind double-encryption of the present invention;
Fig. 5 is the original watermark synoptic diagram of the embodiment of the invention 1;
Fig. 6 is the watermark synoptic diagram of original watermark after once encrypting of the embodiment of the invention 1;
Fig. 7 is the watermark synoptic diagram of original watermark behind superencipher of the embodiment of the invention 1;
Fig. 8 for the original watermark of embodiment 1 after being embedded into original audio after the algorithm for encryption of the present invention, through attacking, directly to containing the watermark synoptic diagram that the watermark audio detection goes out;
Fig. 9 carries out shear treatment to containing the watermark audio frequency, more detected watermark synoptic diagram for after general's original watermark similarly to Example 1 directly embeds original audio same among the embodiment 1 in the prior art;
Figure 10 be will the original watermark identical with embodiment 1 after algorithm for encryption of the present invention, embed with embodiment 1 in behind the same original audio, also the watermark audio frequency that contains that obtains is carried out identical shear treatment, more detected watermark synoptic diagram;
Figure 11 be will the original watermark identical with embodiment 1 after algorithm for encryption of the present invention, embed with embodiment 1 in behind the same original audio, the watermark audio frequency that contains that obtains is carried out low-pass filtering treatment, more detected watermark synoptic diagram;
Figure 12 be will the original watermark identical with embodiment 1 after algorithm for encryption of the present invention, embed with embodiment 1 in behind the same original audio, the watermark audio frequency that contains that obtains is added Gauss's white noise and handles, more detected watermark synoptic diagram;
Figure 13 be will the original watermark identical with embodiment 1 after algorithm for encryption of the present invention, embed with embodiment 1 in behind the same original audio, the watermark audio frequency that contains that obtains is added down-sampling and handles, more detected watermark synoptic diagram;
Figure 14 be will the original watermark identical with embodiment 1 after algorithm for encryption of the present invention, embed with embodiment 1 in behind the same original audio, the watermark audio frequency that contains that obtains is carried out the weight processing, more detected watermark synoptic diagram;
Figure 15 be will the original watermark identical with embodiment 1 after algorithm for encryption of the present invention, embed with embodiment 1 in behind the same original audio, the watermark audio frequency that contains that obtains is carried out the Mp3 compression and handles, more detected watermark synoptic diagram.
Embodiment
Shown in one of Fig. 1 to Figure 15, the open watermarking algorithm of a kind of DWT based on double-encryption of the present invention-DCT territory audio frequency may further comprise the steps:
One, the telescopiny of watermark:
The definition original audio signal is A={a (i), 0≤i<Length}, and wherein, Length is the number of voice data, a (i) is the range value of i voice data;
The definition binary bitmap be W={W (i, j), 0≤i<M, 0≤j<N}, wherein, M, N represent the row, column number of watermark, W (i, j) { 0,1} represents the capable j row of the i grey scale pixel value of binary bitmap to ∈;
Its concrete telescopiny is as follows:
1) binary bitmap W M * NCarry out scramble and dimension-reduction treatment with the Arnold conversion, realize once encrypting; Carry out XOR with isometric Logistic chaos sequence then, realize superencipher, namely obtain the watermark W' behind the double-encryption M * N
2) original audio A is carried out staging treating, described segmentation process is:
Choosing element formation n segment length by great-jump-forward is L * M * N * 2 coefficients series IO (i), and wherein, L is the DWT number of transitions, and n * L * M * N * 2<Length;
3) every section coefficient is carried out L level DWT conversion, get CA L, CD L, CD L-1... CD 1, wherein, CA LBe the approximate component of L level, CD iIt is the details component;
4) to CA LCarry out dct transform, the Low Medium Frequency coefficient x (j) that chooses then after the conversion quantizes, and embeds the position with it as watermark and embed watermark information after encrypting, and described coefficient quantization process is as follows:
Make z (j)=[x (j)/Da]; Da is predefined quantization parameter,
If z (j) %2==W'(i), x (j)=z (j) * Da-Da/2 then;
Otherwise x (j)=z (j) * Da+Da/2;
Wherein, the computing of [] expression round, % represents complementation;
5) the coefficient x after quantizing is done idct transform and obtain CA ', and then carry out L level IDWT conversion, recombinate at last, be about to the former coefficient of correspondence of each section replacement of moisture official seal breath, just obtained moisture official seal breath audio frequency;
Two, the testing process of watermark:
Step1: sound signal to be detected is carried out staging treating, and described segmentation process constitutes n section coefficient series for choose element by great-jump-forward;
Step2: each section coefficient is carried out the L level DWT conversion identical with watermark embed process, obtain the approximate component Ca of L level L
Step3: to Ca LCarry out dct transform, the Low Medium Frequency coefficient x ' that chooses after the conversion (i) calculates and obtains a watermark reference information value, and the formula of described calculating watermark reference information value is:
Figure BDA00002912424600051
Wherein,
Figure BDA00002912424600052
Represent to round up computing, % represents complementation;
Step4: the watermark reference value addition on the corresponding position of n watermark coefficient series, determine a corresponding watermark information position according to " ballot principle " then, described " ballot principle " is as follows:
If W ' is arranged 1(i)+W ' 2(i)+W ' 3(i)+...+W ' n(i)〉n/2 can judge that then corresponding watermark information is W " (i)=1, otherwise W " (i)=0;
Step5: repeat the operation of Step4, longly be M*N information series W up to obtaining one ", identical Logistic chaos sequence carries out XOR, the reconstruct two dimensional image when embedding then; re-use scramble template identical when the embedding random processing that is inverted, namely recover watermarking images w '.
Further optimization algorithm, the telescopiny of described watermark also comprises the step that the moisture official seal breath audio frequency that obtains is estimated, this evaluation procedure adopts the difference between signal to noise ratio snr evaluation original audio signal and the moisture official seal breath sound signal, and its judgement schematics is as follows:
SNR = 10 log 10 δ 2 D
Wherein, δ 2 = 1 N Σ i = 0 N - 1 ( x i - 1 N Σ i = 0 N - 1 x i ) 2 , D = 1 N Σ i = 0 N - 1 ( x i - x ^ i ) 2 , x iBe original audio, Moisture official seal breath audio frequency.
Further optimization algorithm comprises also in the testing process of described watermark that the watermarking images to recovering carries out the normalized crosscorrelation calculation procedure, and the formula that this normalized crosscorrelation calculates is as follows:
NC ( W ′ , W ) = Σ i = 0 P - 1 Σ j = 0 Q - 1 w ( i , j ) · w ′ ( i , j ) Σ i = 0 P - 1 Σ j = 0 Q - 1 w 2 ( i , j ) Σ i = 0 P - 1 Σ j = 0 Q - 1 w ′ 2 ( i , j )
When being 1, the NC value represents that wherein both are identical, extraction effect the best; The NC value is more little, and extraction effect is just more poor.
Embodiment 1
In order to verify the validity of watermarking algorithm of the present invention, we carry out emulation experiment under the MATLAB7 environment.It is 44.1KHZ that the original audio signal of experiment has been selected sample frequency for use, and resolution is 16 bits, and length is 9.75 seconds monophony digital audio and video signals, and the bianry image with 32 * 32 is original watermark image; Wherein, the coefficient hop count n that chooses is 5, DWT(wavelet transform) employing Daubechie-4 is wavelet basis, DWT progression L is that 2, Arnold scramble number of times is that the λ of 9, Logistic chaos sequence is 2, X 0Be 0.6.
Its simulation result is as follows:
One, watermarking algorithm of the present invention has improved the security of watermark.Be binary bitmap as shown in Figure 2 through the combine result of modulation of over-sampling and chaos, visually can't see any Useful Information, image information becomes disorderly and unsystematic, therefore, even it is watermarking algorithm is open, allow have a mind to or unintentionally the assailant detect the watermark information that contains, also can't obtain real watermarking images.
Two, the present invention is highly resistant to the sampling point cutting, guarantees the vision integrality of watermark.With the continuous audio frequency to be measured of 15000 sampled points of deletion of the watermark information after the present invention encrypts, adopt algorithm of the present invention that it is detected watermark to it then, its testing result and records NC=0.81704 as shown in figure 10.To be audio frequency to be measured 15000 sampled points of deletion continuously of the watermark information of not encrypting through the present invention that embeds equally when embed watermark, extraction result as Fig. 9, and record NC=0.63768, as seen adopt the encryption of algorithm of the present invention to strengthen the robustness of watermark.This is owing to used Arnold scramble and chaos method with watermark pretreatment in the algorithm, and the location of pixels of watermark and pixel value are changed, and when being subjected to local sampling point cutting and attacking, the impaired number of the information of the relevant position in the watermark just significantly reduces.
Be the original audio synoptic diagram as Fig. 3, as the moisture official seal breath audio frequency synoptic diagram of Fig. 4 for behind the double-encryption of algorithm of the present invention, obtaining among Fig. 3.Its as can be seen the waveform of signal after using this algorithm embed watermark, significantly do not change, and in also not significantly difference of audio frequency watermark and original audio acoustically, be difficult to feel the existence of watermark, it is transparent preferably that this illustrates that this watermark has.And audio frequency to be measured can accurately extract watermark under nothing is attacked, and it extracts result such as Fig. 8, and records NC=1.
Handle carry out following common signal through the sound signal of watermarking algorithm of the present invention, wherein
Carry out the design sketch of the watermark that extracts again after the low-pass filtering treatment as Figure 11, this low-pass filter is that length is that 8 rank cut-off frequency rates are the Butterworth low-pass filter of 2k Hz.
As the design sketch that adds the watermark that extracts again after Gauss's white noise is handled of Figure 12, the average of this white Gaussian noise is 0, and mean square deviation is 0.01.
The design sketch of the watermark that extracts again behind the down-sampling as Figure 13: original audio is resampled with 22.050kHz, use the 44.100kHz resampling again, recover audio frequency.
Design sketch as the watermark that extracts again after the weightization of Figure 14: original audio is quantified as 8bit from 16bit, is quantified as 16bit again.
The design sketch of the watermark that extracts again after the Mp3 compression as Figure 15: the Mp3 file with original audio boil down to position speed 56kbps (ratio of compression 12:1) reverts to the audio frequency identical with original audio frequency format then.
In sum, watermarking algorithm disclosed by the invention except having preferably the transparency, also has following three characteristics: one, security, adopt the method for image scrambling and chaos encryption that watermarking images is carried out double-encryption, guaranteed the security of watermark well; Two, robustness, taking full advantage of the multiresolution characteristic of DWT and the cumulative characteristic of DCT handles the audio frequency coefficient series of choosing, select DCT Low Medium Frequency coefficient to quantize embed watermark, guaranteed the robustness of watermark, three, publicity, watermark adopts coefficient quantization to embed, and the ballot principle is adopted in multiple embedding during extraction, do not need original audio to participate in, the real blind Detecting that realizes has good practical values.

Claims (3)

1. based on the open watermarking algorithm of the DWT-DCT territory audio frequency of double-encryption, it is characterized in that: it may further comprise the steps:
One, the telescopiny of watermark:
The definition original audio signal is A={a (i), 0≤i<Length}, and wherein, Length is the number of voice data, a (i) is the range value of i voice data;
The definition binary bitmap be W={W (i, j), 0≤i<M, 0≤j<N}, wherein, M, N represent the row, column number of watermark, W (i, j) { 0,1} represents the capable j row of the i grey scale pixel value of binary bitmap to ∈;
Its concrete telescopiny is as follows:
1) binary bitmap W M * NCarry out scramble and dimension-reduction treatment with the Arnold conversion, realize once encrypting; Carry out XOR with isometric Logistic chaos sequence then, realize superencipher, namely obtain the watermark W' behind the double-encryption M * N
2) original audio A is carried out staging treating, described segmentation process is:
Choosing element formation n segment length by great-jump-forward is L * M * N * 2 coefficients series IO (i), and wherein, L is the DWT number of transitions, and n * L * M * N * 2<Length;
3) every section coefficient is carried out L level DWT conversion, get CA L, CD L, CD L-1... CD 1, wherein, CA LBe the approximate component of L level, CD iIt is the details component;
4) to CA LCarry out dct transform, the Low Medium Frequency coefficient x (j) that chooses then after the conversion quantizes, and embeds the position with it as watermark and embed watermark information after encrypting, and described coefficient quantization process is as follows:
Make z (j)=[x (j)/Da]; Da is predefined quantization parameter,
If z (j) %2==W'(i), x (j)=z (j) * Da-Da/2 then;
Otherwise x (j)=z (j) * Da+Da/2;
Wherein, the computing of [] expression round, % represents complementation;
5) the coefficient x after quantizing is done idct transform and obtain CA ', and then carry out L level IDWT conversion, at last each section of moisture official seal breath replaced former coefficient of correspondence, namely obtain moisture official seal breath audio frequency;
Two, the testing process of watermark:
Step1: sound signal to be detected is carried out staging treating, and described segmentation process constitutes n section coefficient series for choose element by great-jump-forward;
Step2: each section coefficient is carried out the L level DWT conversion identical with watermark embed process, obtain the approximate component Ca of L level L
Step3: to Ca LCarry out dct transform, the Low Medium Frequency coefficient x ' that chooses after the conversion (i) calculates and obtains a watermark reference information value, and the formula of described calculating watermark reference information value is:
Wherein,
Figure FDA00002912424500012
Represent to round up computing, % represents complementation;
Step4: the watermark reference value addition on the corresponding position of n watermark coefficient series, determine a corresponding watermark information position according to " ballot principle " then, described " ballot principle " is as follows:
If W ' is arranged 1(i)+W ' 2(i)+W ' 3(i)+...+W ' n(i)〉n/2 can judge that then corresponding watermark information is W " (i)=1, otherwise W " (i)=0;
Step5: repeat the operation of Step4, longly be M*N information series W up to obtaining one ", identical Logistic chaos sequence carries out XOR, the reconstruct two dimensional image when embedding then; re-use scramble template identical when the embedding random processing that is inverted, namely recover watermarking images w '.
2. the DWT based on double-encryption according to claim 1-DCT territory audio frequency discloses watermarking algorithm, it is characterized in that: the telescopiny of described watermark also comprises the step that the moisture official seal breath audio frequency that obtains is estimated, this evaluation procedure adopts the difference between signal to noise ratio snr evaluation original audio signal and the moisture official seal breath sound signal, and its judgement schematics is as follows:
SNR = 10 log 10 δ 2 D
Wherein, δ 2 = 1 N Σ i = 0 N - 1 ( x i - 1 N Σ i = 0 N - 1 x i ) 2 , D = 1 N Σ i = 0 N - 1 ( x i - x ^ i ) 2 , x iBe original audio,
Figure FDA00002912424500024
Moisture official seal breath audio frequency.
3. the DWT based on double-encryption according to claim 1-DCT territory audio frequency discloses watermarking algorithm, it is characterized in that: comprise also in the testing process of described watermark that the watermarking images to recovering carries out the normalized crosscorrelation calculation procedure, the formula that this normalized crosscorrelation calculates is as follows:
NC ( W ′ , W ) = Σ i = 0 P - 1 Σ j = 0 Q - 1 w ( i , j ) · w ′ ( i , j ) Σ i = 0 P - 1 Σ j = 0 Q - 1 w 2 ( i , j ) Σ i = 0 P - 1 Σ j = 0 Q - 1 w ′ 2 ( i , j )
When being 1, the NC value represents that wherein both are identical, extraction effect the best; The NC value is more little, and extraction effect is just more poor.
CN2013100805434A 2013-03-13 2013-03-13 Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm Pending CN103208288A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100805434A CN103208288A (en) 2013-03-13 2013-03-13 Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100805434A CN103208288A (en) 2013-03-13 2013-03-13 Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm

Publications (1)

Publication Number Publication Date
CN103208288A true CN103208288A (en) 2013-07-17

Family

ID=48755489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100805434A Pending CN103208288A (en) 2013-03-13 2013-03-13 Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm

Country Status (1)

Country Link
CN (1) CN103208288A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103442157A (en) * 2013-09-04 2013-12-11 上海理工大学 Image encryption method based on Arnold transformations and Henon chaotic system
CN104143173A (en) * 2014-07-24 2014-11-12 镇江市高等专科学校 Image self-adaption blind watermarking algorithm based on DWT-DCT
CN104810022A (en) * 2015-05-11 2015-07-29 东北师范大学 Time-domain digital audio watermarking method based on audio breakpoint
CN105304091A (en) * 2015-06-26 2016-02-03 信阳师范学院 Voice tamper recovery method based on DCT
CN105608661A (en) * 2015-12-28 2016-05-25 辽宁师范大学 Shear wave domain audio watermark embedding and detecting method based on robust QR decomposition
CN105895109A (en) * 2016-05-10 2016-08-24 信阳师范学院 Digital voice evidence collection and tamper recovery method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform)
CN106101821A (en) * 2016-06-21 2016-11-09 中国农业大学 The building method of dual zero watermarking and device in video
CN106504757A (en) * 2016-11-09 2017-03-15 天津大学 A kind of adaptive audio blind watermark method based on auditory model
CN110084733A (en) * 2019-04-19 2019-08-02 中国科学院自动化研究所 The embedding grammar and system of text image watermark, extracting method and system
CN111445377A (en) * 2020-03-26 2020-07-24 深圳Tcl数字技术有限公司 Audio processing method, device and storage medium
CN113704707A (en) * 2021-08-26 2021-11-26 湖南天河国云科技有限公司 Block chain-based audio tamper-proof method and device
CN115482142A (en) * 2022-09-27 2022-12-16 河北纬坤电子科技有限公司 Dark watermark adding method, extracting method, system, storage medium and terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000196861A (en) * 1998-12-25 2000-07-14 Sony Corp Method and device for signal processing, and recording medium
CN101101754A (en) * 2007-06-25 2008-01-09 中山大学 Steady audio-frequency water mark method based on Fourier discrete logarithmic coordinate transformation
CN101206861A (en) * 2007-12-25 2008-06-25 宁波大学 Method for imbedding digital music production authentication information and method for authentication of said production

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000196861A (en) * 1998-12-25 2000-07-14 Sony Corp Method and device for signal processing, and recording medium
CN101101754A (en) * 2007-06-25 2008-01-09 中山大学 Steady audio-frequency water mark method based on Fourier discrete logarithmic coordinate transformation
CN101206861A (en) * 2007-12-25 2008-06-25 宁波大学 Method for imbedding digital music production authentication information and method for authentication of said production

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨志疆 等: "一种基于双重加密的DWT-DCT域音频公开水印算法", 《计算机与数字工程》, vol. 40, no. 12, 20 December 2012 (2012-12-20) *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103442157A (en) * 2013-09-04 2013-12-11 上海理工大学 Image encryption method based on Arnold transformations and Henon chaotic system
CN104143173A (en) * 2014-07-24 2014-11-12 镇江市高等专科学校 Image self-adaption blind watermarking algorithm based on DWT-DCT
CN104810022B (en) * 2015-05-11 2018-06-15 东北师范大学 A kind of time domain digital audio water mark method based on audio breakpoint
CN104810022A (en) * 2015-05-11 2015-07-29 东北师范大学 Time-domain digital audio watermarking method based on audio breakpoint
CN105304091B (en) * 2015-06-26 2018-10-26 信阳师范学院 A kind of voice tamper recovery method based on DCT
CN105304091A (en) * 2015-06-26 2016-02-03 信阳师范学院 Voice tamper recovery method based on DCT
CN105608661A (en) * 2015-12-28 2016-05-25 辽宁师范大学 Shear wave domain audio watermark embedding and detecting method based on robust QR decomposition
CN105608661B (en) * 2015-12-28 2019-04-05 辽宁师范大学 Based on the robust QR shearing wave zone audio frequency watermark insertion decomposed and detection method
CN105895109A (en) * 2016-05-10 2016-08-24 信阳师范学院 Digital voice evidence collection and tamper recovery method based on DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform)
CN106101821A (en) * 2016-06-21 2016-11-09 中国农业大学 The building method of dual zero watermarking and device in video
CN106504757A (en) * 2016-11-09 2017-03-15 天津大学 A kind of adaptive audio blind watermark method based on auditory model
CN110084733A (en) * 2019-04-19 2019-08-02 中国科学院自动化研究所 The embedding grammar and system of text image watermark, extracting method and system
CN111445377A (en) * 2020-03-26 2020-07-24 深圳Tcl数字技术有限公司 Audio processing method, device and storage medium
CN113704707A (en) * 2021-08-26 2021-11-26 湖南天河国云科技有限公司 Block chain-based audio tamper-proof method and device
CN115482142A (en) * 2022-09-27 2022-12-16 河北纬坤电子科技有限公司 Dark watermark adding method, extracting method, system, storage medium and terminal

Similar Documents

Publication Publication Date Title
CN103208288A (en) Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm
Sadreazami et al. A study of multiplicative watermark detection in the contourlet domain using alpha-stable distributions
Sadreazami et al. Multiplicative watermark decoder in contourlet domain using the normal inverse Gaussian distribution
Qi et al. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization
Akhaee et al. Contourlet-based image watermarking using optimum detector in a noisy environment
Bhattacharyya et al. A robust image steganography using DWT difference modulation (DWTDM)
CN102156952B (en) Copyright-protection-service-oriented remote sensing image digital watermarking method
CN102592256B (en) Digital image watermark detection method based on support vector machine correction
Hamghalam et al. Geometric modelling of the wavelet coefficients for image watermarking using optimum detector
CN101004830A (en) Robust watermark technique of digital image selected from space domain of images
CN101556686A (en) Robust image watermark method based on local Tchebichef moment
CN109344578A (en) Based on the insertion of the audio frequency watermark of chaos and wavelet transformation, extracting method
Khalifa et al. A robust non-blind algorithm for watermarking color images using multi-resolution wavelet decomposition
CN106780281A (en) Digital image watermarking method based on Cauchy's statistical modeling
Yang et al. An audio zero-watermark scheme based on energy comparing
CN102523535B (en) Video stream and global positioning system (GPS) real-time registration and synchronous transmission method based on digital watermarking technology
Bi et al. NSCT domain additive watermark detection using RAO hypothesis test and Cauchy distribution
CN103886864A (en) Method for detecting quantitatively-embedded secret information for DWT domain fidelity compensation
CN102867513A (en) Pseudo-Zernike moment based voice content authentication method
CN100547609C (en) A kind of bittorrent Robust digital figure watermark embedding and detection method and device
CN107358072B (en) Vector map digital fingerprint copyright protection method based on I code and CFF code
CN101872466B (en) Watermark embedding method, and watermark detection method and device
Dutta et al. An efficient and secure digital image watermarking using features from iris image
Youssef et al. A robust steganography model using wavelet-based block-partition modification
Furon et al. Audio public key watermarking technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C05 Deemed withdrawal (patent law before 1993)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130717