Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm

A double encryption, domain audio technology, applied in the field of image information security, can solve the problem of not effectively resisting watermark shearing attacks

Inactive Publication Date: 2013-07-17
ZHANGZHOU INST OF TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, chaotic encryption technology only changes the pixel value of the image, not the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm
  • Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm
  • Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0086] In order to verify the effectiveness of the watermarking algorithm of the present invention, we conduct simulation experiments under the environment of MATLAB7. The original audio signal of the experiment selects a monophonic digital audio signal with a sampling frequency of 44.1KHZ, a resolution of 16 bits, and a length of 9.75 seconds. The binary image of 32×32 is used as the original watermark image; among them, the number of selected coefficient segments n is 5, DWT (discrete wavelet transform) uses Daubechie-4 as wavelet base, DWT series L is 2, Arnold scrambling times is 9, Logistic chaotic sequence λ is 2, X 0 is 0.6.

[0087] The simulation results are as follows:

[0088] 1. The watermark algorithm of the present invention improves the security of the watermark. Such as figure 2 The result shown is the combination of sampling and chaos modulation of the binary watermark image. Visually, no useful information can be seen, and the image information becomes ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dual encryption based DWT-DCT domain audio public watermarking algorithm. The algorithm comprises a watermark embedding process and a watermark detection process. The watermark embedding process sequentially comprises dual encryption of a binary watermark image, segment treatment on an original voice frequency, DWT and DCT of each segment coefficient, quantization embedding, inversed discrete cosine transform (IDCT) and inversed discrete wavelet transform (IDWT) of a quantization coefficient, reorganization and obtaining of a voice frequency containing watermark information. The watermark detection process sequentially comprises segment treatment on an audio signal to be tested, DWT and DCT of each segment coefficient, summing of watermark reference values at corresponding positions of n watermark coefficient series, reconfiguration of a two-dimensional image, inverted scrambling treatment and obtaining of a restored watermark image. By the aid of the algorithm, the transparency of watermarks is effectively guaranteed, the miss ratio of watermarks is greatly reduced, and the robustness and the accuracy of the watermark detection are improved.

Description

technical field [0001] The invention relates to the technical field of image information security, in particular to a DWT-DCT domain audio public watermark algorithm based on double encryption. Background technique [0002] In recent years, the discourses about authentication watermarking at home and abroad are increasing day by day. Watermark preprocessing is a relatively common method to ensure the security of watermarks. Usually, the image scrambling method is used to make the image chaotic and play an encryption role. However, the image scrambling method is periodic, and if it continues to change according to the original method, it will The original watermark information is restored, so the security of this encrypted watermark is relative and has certain defects. [0003] Chaos phenomenon is a similar stochastic and deterministic process that occurs in nonlinear dynamical systems. The main features of chaotic sequence: (1) The form is simple. Only the parameters of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L19/018G06T1/00
Inventor 杨志疆
Owner ZHANGZHOU INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products