Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Digital audio watermarking method capable of resisting re-recording attack

A watermarking and audio technology, used in speech analysis, instruments, etc.

Inactive Publication Date: 2013-07-17
SHANGHAI UNIV
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can resist attacks such as color noise, MPEG encoding, multiple watermarking and resampling, but it is still not robust to "play-re-recording" attacks.
[0005] To sum up, the audio watermarking techniques mentioned above only consider watermark extraction from digital audio files, and they are robust to common attacks, but cannot resist "Play-re-record" attack
This is because when the watermarked digital audio is played by the hardware device and then recorded and digitized again, its waveform and spectrum will undergo major changes, and its attack strength is much greater than that of conventional signal processing, thus destroying the watermark information
Moreover, the time base and sampling rate in the re-digitization cannot be consistent with the original audio, so the synchronization of the watermark information cannot be realized by the usual method, and the watermark cannot be extracted from the re-recorded copy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital audio watermarking method capable of resisting re-recording attack
  • Digital audio watermarking method capable of resisting re-recording attack
  • Digital audio watermarking method capable of resisting re-recording attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0025] A kind of digital audio watermarking method of the present invention can resist re-recording attack, its process is as follows figure 1 As shown, the specific steps are as follows:

[0026] (1), Extract watermark synchronization reference point

[0027] (1-1) Divide the carrier audio signal into audio frames of equal length, and the number of audio frames is L, Each audio frame has B =256 sampling points;

[0028] (1-2) Extract the semitone features of each audio frame: each audio frame is transformed by FFT to obtain the spectral component of each frame, and an octave centered at 1kHz is taken from the spectral component, and the frequency range of 707Hz~1414Hz contains 12 semitones , expressing the semitone feature sequence of the carrier audio signal as C i*j , i Indicates the number of frames, the range is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital audio watermarking method capable of resisting re-recording attack. The method comprises the following steps of: 1, watermark synchronization reference point extraction: dividing a carrier audio signal into audio frames with equal length, extracting the 12-dimension semitone characteristics of each audio frame, and thus obtaining watermark synchronization reference points; 2, watermark embedding: coding watermark information to obtain a binary watermark bit coding sequence, dividing a carrier audio into a plurality of watermark synchronization units, dividing each watermark synchronization unit into a plurality of audio sample sections, and embedding a watermark into a frequency spectrum of a low-frequency domain of each audio sample section through binary coding; and 3, watermark extraction: during the watermark extraction, dividing each watermark synchronization unit into the corresponding audio sample sections according to synchronization reference points extracted by parameters for the watermark embedding, respectively calculating a mean value of the frequency spectrum in a low-frequency spectrum interval of each audio sample section, and extracting the audio section interval watermark bit of each mean value. According to the method, the embedding position of the watermark can be accurately determined, and the re-recording attack can be resisted. The method is high in robustness.

Description

technical field [0001] The invention relates to a digital audio watermarking method, in particular to a digital audio watermarking method which can resist re-recording attacks. Background technique [0002] Digital audio can be copied infinitely without distortion, and will be tampered with or replaced during transmission, so the invisible digital audio watermarking technology came into being. [0003] A successful invisible watermarking method must meet the two basic technical requirements of imperceptibility and robustness. For audio watermarking, imperceptibility is auditory transparency, and embedding watermarks in audio signals should not cause distortion that can be perceived by the human ear. Robustness means that after the audio signal is attacked and processed without destroying the sound quality, the digital watermark can still be reliably extracted and correctly identified. [0004] Digital audio watermarking methods are generally divided into two categories: ti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G10L19/018
Inventor 邹婷婷王朔中冯国婷
Owner SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products