• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Rangding, Jiang Gangyi, Chen Jin'er, and Zhu Bin. An New Method of Audio-Digital Watermarking Based on Trap Strategy[J]. Journal of Computer Research and Development, 2006, 43(4): 613-620.
Citation: Wang Rangding, Jiang Gangyi, Chen Jin'er, and Zhu Bin. An New Method of Audio-Digital Watermarking Based on Trap Strategy[J]. Journal of Computer Research and Development, 2006, 43(4): 613-620.

An New Method of Audio-Digital Watermarking Based on Trap Strategy

More Information
  • Published Date: April 14, 2006
  • The recent growth of network multimedia systems has increased the need for the protection of digital media. This is particularly important for the protection and enhancement of intellectual property rights. The ubiquity of digital media in Internet and digital library applications has called for new methods in digital copyright protection and new measures in data security. Digital watermarking techniques have been developed to meet the needs for these growing concerns and have become active areas of research. A new scheme for robust, high-quality embedded audio coding is presented in this paper, in which the effect of different attacks is taken into account and the trap strategy is designed. Trap strategy can assure that if the strong attack can removes the watermark embedded in audio, it destroys the watermarked audio as well, or else the watermark can be detected with very high response. Watermarks are embedded by quantizing audio's DCT coefficients using the trap strategy and extracted by different ways due to different attacks. The binary image used as watermark is embedded to audio pieces. De-synchronization attacks can be resisted in this algorithm, such as random clipping some audio samples, A/D and D/A conversion, low-pass filtering and so on. The extracted watermark can be identified directly. Compared with the former algorithm (cocktail watermarking) in the method, watermark is blind detected with a very high detector response. Experimental results demonstrate that this audio watermarking scheme is remarkably effective.
  • Related Articles

    [1]Wang Jiakai, Kong Yusheng, Chen Zhendong, Hu Jin, Yin Zixin, Ma Yuqing, Yang Qinghong, Liu Xianglong. Phonemic Adversarial Attack Against Audio Recognition in Physical World[J]. Journal of Computer Research and Development, 2025, 62(3): 751-764. DOI: 10.7544/issn1000-1239.202330445
    [2]Qin Zhen, Zhuang Tianming, Zhu Guosong, Zhou Erqiang, Ding Yi, Geng Ji. Survey of Security Attack and Defense Strategies for Artificial Intelligence Model[J]. Journal of Computer Research and Development, 2024, 61(10): 2627-2648. DOI: 10.7544/issn1000-1239.202440449
    [3]Shen Yijie, Li Liangcheng, Liu Ziwei, Liu Tiantian, Luo Hao, Shen Ting, Lin Feng, Ren Kui. Stealthy Attack Towards Speaker Recognition Based on One-“Audio Pixel” Perturbation[J]. Journal of Computer Research and Development, 2021, 58(11): 2350-2363. DOI: 10.7544/issn1000-1239.2021.20210632
    [4]Zhang Yingjun, Chen Kai, Zhou Geng, Lü Peizhuo, Liu Yong, Huang Liang. Research Progress of Neural Networks Watermarking Technology[J]. Journal of Computer Research and Development, 2021, 58(5): 964-976. DOI: 10.7544/issn1000-1239.2021.20200978
    [5]Wang Ting, Wang Na, Cui Yunpeng, Li Huan. The Optimization Method of Wireless Network Attacks Detection Based on Semi-Supervised Learning[J]. Journal of Computer Research and Development, 2020, 57(4): 791-802. DOI: 10.7544/issn1000-1239.2020.20190880
    [6]Ma Haiyan, Liang Yongquan, Ji Shujuan, Li Da. A Trust-Distrust Based Reputation Attacks Defending Strategy and Its Stability Analysis[J]. Journal of Computer Research and Development, 2018, 55(12): 2685-2702. DOI: 10.7544/issn1000-1239.2018.20170587
    [7]Lei Lingguang, Jing Jiwu, Wang Yuewu, Zhang Zhongwen. A Behavior-Based System Resources Access Control Scheme for Android[J]. Journal of Computer Research and Development, 2014, 51(5): 1028-1038.
    [8]Wang Xiangyang, Hou Limin, Yang Hongying. A Robust Watermarking Scheme Based on Image Feature and PseudoZernike Moments[J]. Journal of Computer Research and Development, 2008, 45(5): 772-778.
    [9]Liu Dong, Sun Ming, Zhou Mingtian. A Text Digital Watermarking Technology Based on Graph Theory[J]. Journal of Computer Research and Development, 2007, 44(10): 1757-1764.
    [10]Lou Oujun, Wang Xianghai, Wang Zhengxuan. Research on Quantization-Based Robust Video Watermarking Technique Against Geometrical Attacks[J]. Journal of Computer Research and Development, 2007, 44(7): 1211-1218.

Catalog

    Article views (669) PDF downloads (534) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return